Generalized Interference Alignment—Part II: Application to Wireless Secrecy
نویسندگان
چکیده
منابع مشابه
Generalized Interference Alignment - Part II: Application to Wireless Secrecy
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdropping due to the broadcast nature of the wireless propagation medium. Recent works have proposed the use of interference to reduce eavesdropping capabilities in wireless wiretap networks. However, the concurrent effect of interference on both eavesdropping receivers (ERs) and legitimate receivers (LRs)...
متن کاملStrong Secrecy in Wireless Network Coding Systems from Structured Interference
Wireless network coding (WNC) has been proposed for next generation networks. In this contribution, we investigate WNC schemes with embedded strong secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite, uniform signal input distributions we compute the corresponding strong secrecy capacity, and m...
متن کاملPerfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...
متن کاملStrong Secrecy for Wireless Channels
Recent theoretical a potential to signifi information-theoreti concerns, which we community that a s bits from a block o protected data. Even information bits can information-theoreti weak notion of secre ultimate secrecy ra namely one which b bridge the existing security, we present criterion. As in the formulation. The ex
متن کاملSecrecy in Security Protocols as Non Interference
Non Interference 8] has been proposed for modelling and analysing information ow in systems. In 4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of 4,7] by showing that NDC can be al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Signal Processing
سال: 2016
ISSN: 1053-587X,1941-0476
DOI: 10.1109/tsp.2015.2474295