نتایج جستجو برای: achievable secrecy rate region

تعداد نتایج: 1470136  

2015
Qiuming Liu Li Yu Zuhao Liu Jun Zheng

This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation theory, a set of connected highways and information pipelines is established; while for the secrecy constraint, the concept of secrecy zone is...

2016
Azzam Al-nahari Mukarram Al-jamali Mohammed AlKhawlani

The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesd...

2006
Ting He Lang Tong

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a sch...

Journal: :CoRR 2013
Pin-Hsun Lin Chien-Li Su Hsuan-Jung Su

In wiretap channels the eavesdropper's channel state information (CSI) is commonly assumed to be known at transmitter, fully or partially. However, under perfect secrecy constraint the eavesdropper may not be motivated to feedback any correct CSI. In this paper we consider a more feasible problem for the transmitter to have eavesdropper's CSI. That is, the fast fading multiple-antenna Gaussian ...

2013
Maksym A. Girnyk Frederic Gabry Mikko Vehkaperä Lars K. Rasmussen Mikael Skoglund

With the growth of wireless networks, security has become a fundamental issue in wireless communications due to the broadcast nature of these networks. In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate. Unfortunately, the direct solution to finding ergodic secrecy rates is prohibitive...

2006
Ruoheng Liu Ivana Marić Predrag Spasojević Roy D. Yates

Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, we derive inner and outer bounds for the achievable rate regions for these two communication systems.

Journal: :IEEE Transactions on Information Theory 2021

In this work, lossy distributed compression of a pair correlated sources is considered. Conventionally, Shannon's random coding arguments - using randomly generated unstructured codebooks whose blocklength taken to be asymptotically large are used derive achievability results. However, in some multi-terminal communications scenarios, codes with constant finite certain architectures leads improv...

2012
FREDERIC GABRY

The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today’s communications. A promising direction towards achieving secure communications is information theoretic secrecy, which is an approach exploiting the randomness of the channels to ensure secrecy. Based on this approach, t...

Journal: :CoRR 2016
Lei Yu Houqiang Li Weiping Li

This paper investigates joint source-channel secrecy for Gaussian broadcast communication in Shannon cipher system. We use a recently proposed secrecy measure, list secrecy, to measure secrecy, in which an eavesdropper is allowed to produce a list of reconstruction sequences and the secrecy is measured by the minimum distortion over the entire list. For achievability part, we propose a novel jo...

Journal: :CoRR 2010
Xiang He Aylin Yener

The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subjec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید