Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter [PDF]
In this paper, we propose two feedback coding schemes for the action-dependent wiretap channel with noncausal state at the transmitter. The first scheme follows from the already existing secret key based feedback coding scheme for the wiretap channel ...
Haonan Zhang, Linman Yu, Bin Dai
doaj +2 more sources
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code [PDF]
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu +4 more
doaj +2 more sources
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper [PDF]
This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any jamming strategy subject ...
Rémi A. Chou, Aylin Yener
doaj +2 more sources
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel [PDF]
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on
Guangfen Xie, Bin Dai
doaj +2 more sources
Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel [PDF]
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications.
Daniel Harman +5 more
doaj +2 more sources
On Best Erasure Wiretap Codes: Equivocation Matrices and Design Principles [PDF]
Physical-layer security can aid in establishing secure telecommunication networks including cellular, Internet of Things, and telemetry networks, among others. Channel sounding techniques and/or telemetry systems for reporting channel conditions, coupled
Willie K. Harrison +3 more
doaj +2 more sources
Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution [PDF]
This paper studies the secrecy capacity of an n-dimensional Gaussian wiretap channel under a peak power constraint. This work determines the largest peak power constraint R¯n, such that an input distribution uniformly distributed on a single sphere is ...
Antonino Favano +2 more
doaj +2 more sources
Encoding Individual Source Sequences for the Wiretap Channel [PDF]
We consider the problem of encoding a deterministic source sequence (i.e., individual sequence) for the degraded wiretap channel by means of an encoder and decoder that can both be implemented as finite-state machines.
Neri Merhav
doaj +2 more sources
Smoothing of Binary Codes, Uniform Distributions, and Applications [PDF]
The action of a noise operator on a code transforms it into a distribution on the respective space. Some common examples from information theory include Bernoulli noise acting on a code in the Hamming space and Gaussian noise acting on a lattice in the ...
Madhura Pathegama, Alexander Barg
doaj +2 more sources
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels. As the first model, we consider the degraded multireceiver wiretap channel where
Ekrem Ersen, Ulukus Sennur
doaj +10 more sources

