Results 11 to 20 of about 139,119 (288)
Rate-Distortion Theory for Secrecy Systems [PDF]
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary.
Cuff, Paul, Schieler, Curt
core +3 more sources
Secrecy Rate Optimization for Secure Multicast Communications [PDF]
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications.
Cumanan, Kanapathippillai +3 more
openaire +2 more sources
Secure broadcasting : The secrecy rate region [PDF]
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate ...
Ghadamali Bagherikaram +2 more
openaire +1 more source
Enhancing secrecy rates in a wiretap channel
Submitted to a journal for possible publication. Part of the paper was presented in 2013 IEEE International Conference on Communications Workshop on Physical Layer Security (ICC), Budapest ...
Shahid M. Shah, Vinod Sharma
openaire +3 more sources
Outage constrained secrecy rate maximization using cooperative jamming [PDF]
We consider a Gaussian MISO wiretap channel, where a multi-antenna source communicates with a single-antenna destination in the presence of a single-antenna eavesdropper. The communication is assisted by multi-antenna helpers that act as jammers to the eavesdropper.
Luo, Shuangyu +2 more
openaire +2 more sources
Secrecy & Rate Adaptation for secure HARQ protocols [PDF]
This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdrop-per. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions.
Le Treust, Maƫl +2 more
openaire +1 more source
Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface [PDF]
This paper aims to investigate the benefit of using intelligent reflecting surface (IRS) in multi-user multiple-input single-output (MU-MISO) systems, in the presence of eavesdroppers. We maximize the weighted sum secrecy rate by jointly designing the secure beamforming (BF), the artificial noise (AN), as well as the phase shift of the IRS.
Hehao Niu +5 more
openaire +2 more sources
Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers [PDF]
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network.
Chu Z, Xing H, Johnston M, Le Goff S
openaire +2 more sources
Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access [PDF]
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security in a single-input single-output (SISO) NOMA system consisting of a transmitter, multiple legitimate users and an eavesdropper.
Zhang, Yi +3 more
openaire +3 more sources
Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks
Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor Networks (WSNs). We therefore, by developing the classical wire-tap channel,
Guanxiong Jiang +5 more
doaj +1 more source

