نتایج جستجو برای: secrecy capacity

تعداد نتایج: 282274  

2017
Marcia Manuela Medrado Nunes Ugo Silva Dias

This paper presents a investigation on the performance of security under κ-μ shadowed fading channels using the Wyner’s classic wiretap model. A better fit was presented for the κ-μ shadowed fading channel curves in relation to other fading models, as Rayleigh and Nakagami-m. Results and analyses are obtained through the Secrecy Outage Probability, the Strictly Positive Secrecy Capacity and Ave...

Journal: :CoRR 2017
Xinyue Hu Caihong Kai Shengli Zhang Zhongyi Guo Jun Gao

This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidential information. For realizing secure communication between Alan and Bob, a novel two phases communication scheme is proposed: in Phase 1, Alan and Bob send art...

Journal: :CoRR 2015
David A. Karpuk Arsenia Chorti

Wireless network coding (WNC) has been proposed for next generation networks. In this contribution, we investigate WNC schemes with embedded strong secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite, uniform signal input distributions we compute the corresponding strong secrecy capacity, and m...

2013
Xiao-min Ran You-quan Mo Yu-lei Chen

In this paper, a resource allocation scheme based on physical layer security under non-ideal condition for OFDMA system is introduced. Firstly, the program uses the information security constructing an OFDMA system Wiretap Channel Model under non-ideal condition. Based on this model, artificial noise is generated for secure communications combatting passive multiple eavesdroppers. In order to m...

2007
Ali Shahzadi Masoud Ghoreishi Madiseh Ali A. Beheshti

Security of wireless transmission is a great challenge in secure communications. Classical methods are based on cryptographic algorithms. These methods require a secret key that must be generated securely between associated parties in communication. Another approach to security is based on wiretap channel concept and is applicable for wireless communications. Because of rather small secrecy cap...

2014
Yanfei Yan Ling Liu Cong Ling

Polar lattices, which are constructed from polar codes, are provably good for the additive white Gaussian noise (AWGN) channel. In this work, we propose a new polar lattice construction that achieves the secrecy capacity under the strong secrecy criterion over the mod-Λ Gaussian wiretap channel. This construction leads to an AWGN-good lattice and a secrecy-good lattice simultaneously. The desig...

Journal: :IEEE Transactions on Information Theory 2019

Journal: :Bulletin of Electrical Engineering and Informatics 2022

The rapid adoption of battery-free internet-of-things (IoT) sensors in multiple environments ranging from agriculture to wildlife surveillance, has seen increased research interest backscatter communication (BSC) technology. BSC is viewed as a potential technology enable the further spread sustainable IoT applications and scenarios where bulkier-sized battery-powered devices would be unsuitable...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید