نتایج جستجو برای: achievable secrecy rate region

تعداد نتایج: 1470136  

2008
Ghosheh Abed Hodtani

A simply described achievable rate region is obtained for the genie-aided cognitive radio channel using the Han-Kobayashi celebrated jointly decoding strategy for the interference channel and the Gel’fandPinsker coding scheme for channels with side information known at the transmitter, and then is simplified by Fourier-Motzkin elimination. The obtained achievable rate region (i) extends the Cho...

Journal: :IEEE Transactions on Information Theory 2015

Journal: :CoRR 2011
Mohammad Osmani-Bojd Assadallah Sahebalam Ghosheh Abed Hodtani

In this paper, we obtain a general achievable rate region and some certain capacity theorems for multiple-access relay channel (MARC), using decode and forward (DAF) strategy at the relay, superposition coding at the transmitters. Our general rate region (i) generalizes the achievability part of Slepian-Wolf multiple-access capacity theorem to the MARC, (ii) extends the Cover-El Gamal best achi...

In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...

Journal: :Defence Technology 2022

We consider a scenario where an unmanned aerial vehicle (UAV), typical system (UAS), transmits confidential data to moving ground target in the presence of multiple eavesdroppers. Multiple friendly reconfigurable intelligent surfaces (RISs) help secure UAV-target communication and improve energy efficiency UAV. formulate optimization problem minimize consumption UAV, subject mobility constraint...

Journal: :Computer Networks 2016
Pedro Henrique Juliano Nardelli Hirley Alves Carlos H. M. de Lima Matti Latva-aho

This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under secrecy constraint. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and then sent to the control unit. To reach the control unit, a message may travel through relay nodes, which form a multi-hop w...

Journal: :IET Communications 2014
Alberto Pittolo Andrea M. Tonello

This chapter digs into the secrecy provided and guaranteed at the physical layer, named physical layer security (PLS), over power line communication (PLC) channels for in-home networks. The PLC scenario peculiarities are briefly discussed in terms of channel characteristics and noise features. The effects of the channel properties on the performance are evaluated, in terms of the achievable sec...

Journal: :CoRR 2009
Yucel Altug Suleyman Serdar Kozat Mehmet Kivanç Mihçak

Abstract In this paper, we study single transceiver passive RFID networks by modeling the underlying physical system as a special cascade of a certain broadcast channel (BCC) and a multiple access channel (MAC), using a “nested codebook” structure in between. The particular application differentiates this communication setup from an ordinary cascade of a BCC and a MAC, and requires certain stru...

Journal: :IEEE Journal on Selected Areas in Communications 2022

This paper investigates the secrecy achievable region of multiple access wiretap (MAC-WT) channels where, besides confidential messages, users have also open messages to transmit. All these are intended for legitimate receiver (or Bob brevity) but only need be protected from eavesdropper (Eve). We first consider a discrete memoryless (DM) MAC-WT channel where both and Eve jointly decode their i...

Journal: :CoRR 2018
Bagus Santoso Yasutada Oohama

This paper proposed the application of post-encryption-compression (PEC) to strengthen the secrecy in the case of distributed encryption where the encryption keys are correlated to each other. We derive the universal code construction for the compression and the rate region where codes with achievability and secrecy are obtainable. Our main technique is to use affine encoders which are construc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید