نتایج جستجو برای: secrecy capacity

تعداد نتایج: 282274  

2013
Parthajit Mohapatra Chandra R. Murthy

This work presents novel achievable schemes for the 2-user symmetric linear deterministic interference channel with limited-rate transmitter cooperation and perfect secrecy constraints at the receivers. The proposed achievable scheme consists of a combination of interference cancelation, relaying of the other user’s data bits, time sharing, and transmission of random bits, depending on the rate...

2016
Özge Cepheli

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...

Journal: :IEEE Communications Letters 2017
Hongjiang Lei Imran Shafique Ansari Gaofeng Pan Basel Alomair Mohamed-Slim Alouini

In this work, we study the secrecy capacity of the classic Wyner’s model over the α− μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SN...

2010
Zhu Han Ninoslav Marina Mérouane Debbah Are Hjørungnes

Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investiga...

Journal: :IEEE Transactions on Wireless Communications 2023

In physical-layer security, secrecy capacity is an important performance metric. This work aims to determine the for indoor visible light communication system consisting of a transmitter, legitimate receiver and eavesdropping receiver. such system, both signal-independent noise signal-dependent are considered. Under nonnegativity average optical intensity constraints, lower upper bounds on deri...

2006
Yingbin Liang H. Vincent Poor

A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs, and hence may obtain t...

2016
Aditya Kumar Sahu Gandharba Swain

There has been a tremendous growth in Information and Communication technologies during the last decade. Internet has become the dominant media for data communication. But the secrecy of the data is to be taken care. Steganography is a technique for achieving secrecy for the data communicated in Internet. This paper presents a review of the steganography techniques based on least significant bi...

Journal: :CoRR 2017
Bin Dai

Secure and reliable transmission over communication channels is first characterized by Wyner’s wiretap channel (WTC) model. In recent years, the WTC with noiseless feedback (WTC-NF) attracts a lot attention, and it has been shown that the legal receiver’s feedback enlarges the secrecy capacity of the WTC. Even so, the current feedback strategy for the WTC mainly focuses on generating key used f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید