Results 11 to 20 of about 139,119 (288)

Rate-Distortion Theory for Secrecy Systems [PDF]

open access: yesIEEE Transactions on Information Theory, 2013
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary.
Cuff, Paul, Schieler, Curt
core   +3 more sources

Secrecy Rate Optimization for Secure Multicast Communications [PDF]

open access: yesIEEE Journal of Selected Topics in Signal Processing, 2016
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications.
Cumanan, Kanapathippillai   +3 more
openaire   +2 more sources

Secure broadcasting : The secrecy rate region [PDF]

open access: yes2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate ...
Ghadamali Bagherikaram   +2 more
openaire   +1 more source

Enhancing secrecy rates in a wiretap channel

open access: yesDigital Communications and Networks, 2020
Submitted to a journal for possible publication. Part of the paper was presented in 2013 IEEE International Conference on Communications Workshop on Physical Layer Security (ICC), Budapest ...
Shahid M. Shah, Vinod Sharma
openaire   +3 more sources

Outage constrained secrecy rate maximization using cooperative jamming [PDF]

open access: yes2012 IEEE Statistical Signal Processing Workshop (SSP), 2012
We consider a Gaussian MISO wiretap channel, where a multi-antenna source communicates with a single-antenna destination in the presence of a single-antenna eavesdropper. The communication is assisted by multi-antenna helpers that act as jammers to the eavesdropper.
Luo, Shuangyu   +2 more
openaire   +2 more sources

Secrecy & Rate Adaptation for secure HARQ protocols [PDF]

open access: yes2013 IEEE Information Theory Workshop (ITW), 2013
This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdrop-per. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions.
Le Treust, MaĆ«l   +2 more
openaire   +1 more source

Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface [PDF]

open access: yesIEEE Transactions on Communications, 2021
This paper aims to investigate the benefit of using intelligent reflecting surface (IRS) in multi-user multiple-input single-output (MU-MISO) systems, in the presence of eavesdroppers. We maximize the weighted sum secrecy rate by jointly designing the secure beamforming (BF), the artificial noise (AN), as well as the phase shift of the IRS.
Hehao Niu   +5 more
openaire   +2 more sources

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2016
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network.
Chu Z, Xing H, Johnston M, Le Goff S
openaire   +2 more sources

Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access [PDF]

open access: yesIEEE Communications Letters, 2016
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security in a single-input single-output (SISO) NOMA system consisting of a transmitter, multiple legitimate users and an eavesdropper.
Zhang, Yi   +3 more
openaire   +3 more sources

Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor Networks (WSNs). We therefore, by developing the classical wire-tap channel,
Guanxiong Jiang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy