نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

Journal: :CoRR 2017
Dan He Yuan Luo

The secrecy capacity problems over the general arbitrarily varying wiretap channel, with respect to the maximal decoding error probability and strong secrecy criterion, are considered, where the channel state sequence may be known or unknown at the receiver. In the mean time, it is always assumed that the channel state sequence is known at the eavesdropper and unknown at the transmitter. Capaci...

Journal: :CoRR 2016
Parthajit Mohapatra Chandra R. Murthy Jemin Lee

This paper derives outer bounds on the secrecy capacity region of the 2-user Z interference channel (Z-IC) with rate-limited unidirectional cooperation between the transmitters. First, the model is studied under the linear deterministic setting. The derivation of the outer bounds on the secrecy capacity region involves careful selection of the side information to be provided to the receivers an...

Journal: :EURASIP J. Wireless Comm. and Networking 2017
Kai-Wei Jiang Tao Jing Zhen Li Yan Huo Fan Zhang

We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding. We first evaluate individual secrecy performance under an arbitrary SIC order by deriving closed-form expressions with respect to secrecy outage probability and effect...

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

Journal: :Entropy 2017
Chao Qi Yanling Chen A. J. Han Vinck

In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian wiretap channel is derived for the case when both the legitimate receiver and the eavesdropper have unquantized outputs. In particular, comput...

Journal: :CoRR 2018
Sarah Kamel Mireille Sarkiss Michele A. Wigger Ghaya Rekaya-Ben Othman

This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers, where weak receivers, respectively strong receivers, have same erasure probabilities and cache sizes. The lower bounds are achieved by schemes that meticulously combine joint cache-channel coding with wiretap coding and key...

2016
Qian Yu Liau Chee Yen Leow Zhiguo Ding

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full...

Journal: :Entropy 2014
Xinxing Yin Zhi Xue

Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it s...

Journal: :IEEE Trans. Communications 2017
Yahia R. Ramadan Hlaing Minn Ahmed S. Ibrahim

Millimeter-wave large-scale antenna systems typically apply hybrid analog-digital precoders to reduce hardware complexity and power consumption. In this paper, we design hybrid precoders for physical-layer security under two types of channel knowledge. With full channel knowledge at transmitter, we provide sufficient conditions on the minimum number of RF chains needed to realize the performanc...

2009
Sennur Ulukus S. Ulukus

The broadcast nature of wireless communications leads to two concepts: cooperation and secrecy. The basis for both cooperation and the potential lack of secrecy is the over-heard information at the unintended parties, which wireless communication channel provides for free. It is well-established that users can help increase each others’ rates by intelligently using their over-heard information....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید