Secure Integrated Sensing and Communication
نویسندگان
چکیده
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied which (i) presence feedback enables transmitter to convey information, while simultaneously state estimation; one receivers treated as an eavesdropper whose should be estimated but remain oblivious part transmitted information. The abstracts challenges behind security for joint if views key attribute, e.g., location. For independent identically distributed states, perfect output feedback, when message kept secret, partial characterization secrecy-distortion region developed. exact either physically-degraded or reversely-physically-degraded. also extended situation entire secret. benefits approach compared separation-based secure state-sensing methods are illustrated with binary models.
منابع مشابه
Secure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملFully Integrated Silicon Terahertz Transceivers for Sensing and Communication Applications
Fully Integrated Silicon Terahertz Transceivers for Sensing and Communication Applications
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملCryptoNET: Integrated Secure Workstation
In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and im...
متن کاملA Secure Certificate for Secure Group Communication
Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2023
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2023.3275048