A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication
[article]
2021
arXiv
pre-print
This paper explores a new secure wireless communication paradigm where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical ...
Finally, numerical results are provided to illustrate the achievable performances under the new secure communication paradigm. ...
CONCLUSION This paper explores a new secure wireless communication paradigm, where the physical layer security technology is applied to ensure both the covertness and secrecy of the communication. ...
arXiv:2008.00147v2
fatcat:nart2pvdf5ayxpvdegaeonoywe
Secrecy Energy-Efficient UAV Communication via Trajectory Design and Power Control
2021
Wireless Communications and Mobile Computing
This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for unmanned aerial vehicle- (UAV-) to-ground wireless communication system, in which a fixed-wing UAV tries to transmit ...
covert information to a terrestrial legitimate destination receiver with multiple terrestrial eavesdroppers. ...
Acknowledgments This work was partly supported by the Foundation for Distinguished Young Talents ...
doi:10.1155/2021/9969311
fatcat:l6o3xue2rbgrzo6m262xbozajm
Intelligent Reflecting Surface for Wireless Communication Security and Privacy
[article]
2021
arXiv
pre-print
the theories of physical layer security and covert communications, respectively. ...
Intelligent reflection surface (IRS) is emerging as a promising technique for future wireless communications. ...
In this article, we demonstrated its potential in achieving wireless communication security and privacy by summarizing some major benefits brought by IRS into physical layer security and covert communications ...
arXiv:2103.16696v2
fatcat:a53am5wfyjf2rpi4tltir6fjuy
From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
2021
Sensors
As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. ...
security) and LPD (low probability of detection) issues. ...
Acknowledgments: The authors would like to express their great appreciation to the Sensors journal Editors and anonymous Reviewers for their valuable suggestions, which have improved the manuscript quality ...
doi:10.3390/s21082752
pmid:33924708
fatcat:tyktdyteone4vdbqdcrl7dzej4
Safeguarding MTC at the Physical Layer: Potentials and Challenges
2020
IEEE Access
5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm. ...
In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios. ...
.: Safeguarding MTC at the PHY: Potentials and Challenges
FIGURE 1 . 1 Security threats and requirements for secure and covert wireless communications. ...
doi:10.1109/access.2020.2996383
fatcat:espxiyuqnfgcvgw2yxy4p24vxy
Context-Aware Security for 6G Wireless The Role of Physical Layer Security
[article]
2022
arXiv
pre-print
The combination of these enhanced traits can give rise to a new breed of context-aware security protocols, following the quality of security (QoSec) paradigm. ...
The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization. ...
In parallel, as we move gradually away from the standard client-server networking paradigm and enter a new era of truly end-to-end (E2E) quality of service (QoS), service level agreements (SLAs) in the ...
arXiv:2101.01536v2
fatcat:q2wy5rpeefdufiupcxr42yhlyi
PHY-Aided Secure Communication via Weighted Fractional Fourier Transform
2018
Wireless Communications and Mobile Computing
In addition, by adding phase rotation (PR) factors to each branch of the WFRFT system, a new unitary matrix with the encryption properties is constructed, and hence, the satellite communications secrecy ...
A weighted fractional Fourier transform (WFRFT) based on channel state information (CSI), aiming to safeguard the physical (PHY) layer security of wireless communication system, is proposed. ...
Acknowledgments This work is supported by the National Natural Science Foundation of China under Grant 61571460, Grant 61671475, and Grant 60972042 and in part by the National Post-Doctoral Program for ...
doi:10.1155/2018/7963451
fatcat:gf42ll62ifa6rms63qdjs43cae
Wireless Information-Theoretic Security - Part I: Theoretical Aspects
[article]
2006
arXiv
pre-print
Practical schemes for wireless information-theoretic security are presented in Part II, which in some cases comes close to the secrecy capacity limits given in this paper. ...
In sharp contrast with known results for Gaussian wiretap channels (without feedback), our contribution shows that in the presence of fading information-theoretic security is achievable even when the eavesdropper ...
This is the case, for example in a Time Division Multiple Access (TDMA) environment, when Eve is not a covert eavesdropper, but simply another user interacting with the wireless network, thus sending communication ...
arXiv:cs/0611120v1
fatcat:bhwyaxchxvharfbybfx4p5p22q
Physical Layer Security for UAV Communications in 5G and Beyond Networks
[article]
2021
arXiv
pre-print
In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective. ...
Recently, physical layer security (PLS), which exploits the inherent randomness of the wireless channels for secure communications, has been introduced to UAV systems as an important complement to the ...
jamming power to maximize the eavesdropping rate. 4) Covert Communications and Wireless Surveillance: Covert communications and wireless surveillance have been widely investigated for UAV systems. ...
arXiv:2105.11332v1
fatcat:d6oidecjcbaxrdz3kezdjxpypa
Guest Editorial Special Issue on UAV Communications in 5G and Beyond Networks—Part II
2021
IEEE Journal on Selected Areas in Communications
SECURITY IN UAV COMMUNICATION NETWORKS The article "Optimal transmit power and flying location for UAV covert wireless communications" jointly optimizes the flying location and wireless communication transmit ...
power for a UAV conducting covert operations. ...
doi:10.1109/jsac.2021.3090897
fatcat:22i7u6tzevb6vgdrwflhzsv34u
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
Hero examined the utility of space-time block coding for covert communications in [33] , and designed CSI-informed transmission strategies to achieve either a low probability of intercept (defined in ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
Hero examined the utility of space-time block coding for covert communications in [33] , and designed CSI-informed transmission strategies to achieve either a low probability of intercept (defined in ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Energy- and Cost-Efficient Physical Layer Security in the Era of IoT: The Role of Interference
2020
IEEE Communications Magazine
Covert communication [7] Cooperative jamming [2] Anti-attack [1] Graph theory [2] Beamforming [4] Compressed sensing [5] Bit flipping [5] PHY encryption [6] Constellation rotation [5] Noise aggregation ...
Zhongxiang Wei, Christos Masouros, and Fan Liu are with University College London; Symeon Chatzinotas and Björn Ottersten are with the University of Luxembourg. ...
Since IoT is expected to carry important and private information, a high level of PHY security is critical for wireless communications in IoT, as a complement for traditional security techniques that are ...
doi:10.1109/mcom.001.1900716
fatcat:kdqwnk7qfba3zc5bpk5zejys7y
Anonymous Networking Amidst Eavesdroppers
2008
IEEE Transactions on Information Theory
The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. ...
Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. ...
The throughput-anonymity tradeoff we obtain reiterates the known paradigm of inverse relationship between communication rate and secrecy in covert channels. ...
doi:10.1109/tit.2008.921660
fatcat:kys2qj3z2vb4jfu34qd33csc34
A Repeated Games-Based Secure Multiple-Channels Communications Scheme for Secondary Users with Randomly Attacking Eavesdroppers
2019
Applied Sciences
In this paper, we focus on improving the secrecy performance of CR communications in a decentralized, multiple-channel manner while various eavesdroppers (EVs) try to listen to their private information ...
In the paper, we propose a repeated games-based scheme that can provide the best channel for the SU to avoid eavesdropping attacks and also minimize interference from other SUs that compete for the same ...
To address these emerging issues, researchers have been developing new paradigms in network design. ...
doi:10.3390/app9050868
fatcat:mztcg4pydjhk7glrbp7sgrhq2q
« Previous
Showing results 1 — 15 out of 279 results