Everlasting Secrecy by Exploiting Non-idealities of the Eavesdropper’s Receiver in Disadvantaged Wireless Environments
نویسنده
چکیده
EVERLASTING SECRECY BY EXPLOITING NON-IDEALITIES OF THE EAVESDROPPER’S RECEIVER IN DISADVANTAGED WIRELESS ENVIRONMENTS
منابع مشابه
Everlasting Secrecy by Exploiting Eavesdropper's Receiver Non-Idealities
EVERLASTING SECRECY BY EXPLOITING EAVESDROPPER’S RECEIVER NON-IDEALITIES
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملOn the security of cooperative cognitive radio networks with distributed beamforming
This paper investigates the secrecy performance of amplify-and-forward (AF)-relaying cooperative cognitive radio networks (CCRNs) over Rayleigh-fading channels. Specifically, we consider practical passive eavesdropping scenarios, where the channel state information of the eavesdropper’s link is not available at the secondary transmitter. In order to avoid interfering with the primary receiver a...
متن کاملIndividual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding. We first evaluate individual secrecy performance under an arbitrary SIC order by deriving closed-form expressions with respect to secrecy outage probability and effect...
متن کاملWiretap and Gelfand-Pinsker Channels Analogy and its Applications
A framework of analogy between wiretap channels (WTCs) and state-dependent point-to-point channels with noncausal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good (reliable and secure) sequence of wiretap codes is shown to induce a good (reliable) sequence of codes for a corresponding GPC. Consequently, the framework enables exploiting existi...
متن کامل