A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive filters
2011
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
multiple-output (MIMO) wiretap channel. ...
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input ...
and the input power to the channels vs. the secrecy constraint with P avg = 1. ...
doi:10.1109/icassp.2011.5947125
dblp:conf/icassp/ReboredoPRX11
fatcat:gwqpgtljjjbzpkjkwqc7lgmhlu
Filter design with secrecy constraints: Zero-forcing constraint at the legitimate receiver
2012
2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
We consider a general Multiple-Input Multiple-Output (MIMO) Gaussian wiretap scenario, where a Zero-Forcing (ZF) filter is used at the legitimate receiver, whilst the eavesdropper uses an optimal linear ...
This paper considers the problem of filter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input ...
CONCLUSIONS We have considered the problem of filter design with secrecy constraints in the classical wiretap scenario, where the objective is to design transmit and receive filters that minimize the MSE ...
doi:10.1109/spawc.2012.6292927
dblp:conf/spawc/ReboredoRX12
fatcat:gjcka66mfza2fkehhjtrfgl2uu
Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel
2013
IEEE Transactions on Signal Processing
This paper considers the problem of filter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input-multiple-output ...
We consider a general MIMO Gaussian wiretap scenario, where the legitimate receiver uses a linear Zero-Forcing (ZF) filter and the eavesdropper receiver uses either a ZF or an optimal linear Wiener filter ...
ACKNOWLEDGMENT The authors thank the anonymous reviewers for their valuable comments and suggestions that significantly contributed to improving the quality of the paper. M. R. D. ...
doi:10.1109/tsp.2013.2262275
fatcat:qna4tiieg5a5ti5j3twhayehza
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter ...
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
Akgun et al. consider a similar multiple-input single-output multiple-antenna eavesdropper (MISOME) wiretap channel, where the transmitter employs a zero-forcing beamforming (ZFBF) to eliminate the multiuser ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter ...
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
Zheng et al. investigate the joint transmit and receive beamforming design for a singleantenna input, multiple-antenna output, and multiple-antenna eavesdropper (SIMOME) wiretap channel with imperfect ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
Cooperative Security at the Physical Layer: A Summary of Recent Advances
2013
IEEE Signal Processing Magazine
When the wiretap channel is degraded, i.e., the channel input X, Bob's channel output Y and Eve's channel output Z satisfy the Markov chain , X Y Z " " there is no need for channel prefixing, and V X = ...
Thus, we observe that the Gaussian wiretap channel incurs a severe penalty for secrecy, having reduced its degrees of freedom from one to zero for secrecy. ...
doi:10.1109/msp.2013.2260875
fatcat:ff2hab5jpbabpgdtxpcaehf3am
Secure Degrees of Freedom of the Multiple Access Wiretap Channel with Multiple Antennas
[article]
2016
arXiv
pre-print
We consider a two-user multiple-input multiple-output (MIMO) multiple access wiretap channel with N antennas at each transmitter, N antennas at the legitimate receiver, and K antennas at the eavesdropper ...
Our results show how the number of eavesdropper antennas affects the optimal sum s.d.o.f. of the multiple access wiretap channel. ...
Introduction We consider the two-user multiple-input multiple-output (MIMO) multiple access wiretap channel where each transmitter has N antennas, the legitimate receiver has N antennas and the eavesdropper ...
arXiv:1604.03541v1
fatcat:r4orznn7hbg4xc5l6f2tvjlyja
Secrecy on the Physical Layer in Wireless Networks
[chapter]
2010
Trends in Telecommunications Technologies
Acknowledgement The authors want to thank Martin Mittelbach for his review of this chapter, critical comments and productive discussions. ...
This is the secrecy rate of the non-degraded Gaussian wiretap channel with channel gains α and β. ...
The corresponding channel input or output alphabets are written as X , Y and Z. x with x = √ x † x = ∑ n i=1 |x i | 2 , if
www.intechopen.com In Wyner's degraded wiretap channel, Bob receives a signal ...
doi:10.5772/8472
fatcat:7jfjukti3ngarbdbdg5rsff3qq
An Artificial-noise Based Approach for the Secrecy Rate Maximization of MISO VLC Wiretap Channel with Multi-Eves
2020
IEEE Access
In this paper, we consider improving the secure performance of multiple-input single-output visible light communication channel in the presence of multiple eavesdroppers with multiple photodiodes. ...
Our goal is to design an optimal artificial-noise (AN) aided transmission strategy to maximize the achievable secrecy rate subject to both sum power constraint and peak amplitude constraint. ...
In [13] , it was found, for a SISO amplitude-constrained gaussian wiretap channel (such as VLC), the secrecy capacity can be obtained by discrete input with finite support. ...
doi:10.1109/access.2020.3046664
fatcat:uy3wvvqdmffgdpux3jpji2bjpm
An Overview of Key Technologies in Physical Layer Security
2020
Entropy
Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. ...
PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. ...
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations The following abbreviations are used in this manuscript: ...
doi:10.3390/e22111261
pmid:33287029
fatcat:ngkceebvprbbbkrwamjzqtwaci
A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends
[article]
2017
arXiv
pre-print
However, most of the advances in the design of high speed wireless multiple-input multiple output (MIMO) systems are based on information-theoretic principles that demonstrate how to efficiently transmit ...
, and MIMO wiretap channel. ...
For double-input multiple-output (DIMO) systems with
both PCSIT and SCSIT, an adaptive scheme switching between OSTBC and spatial multiplexing with
zero-forcing (ZF) receiver based on the average spectral ...
arXiv:1704.07611v1
fatcat:4gep4gnbefdytjdggniocdora4
Artificial Noise-Based Beamforming for the MISO VLC Wiretap Channel
2019
IEEE Transactions on Communications
This paper investigates the secrecy performance of the multiple-input single-output (MISO) visible light communication (VLC) wiretap channel. ...
The considered system model comprises three nodes: a transmitter (Alice) equipped with multiple fixtures of LEDs, a legitimate receiver (Bob) and an eavesdropper (Eve), each equipped with one photo-diode ...
However, the secrecy capacity of the new wiretap channel is known and Gaussian is optimal. ...
doi:10.1109/tcomm.2018.2889649
fatcat:3g2idnkwfnccvl6ibkjfkhwvhi
Performance Enhancement of Cognitive Radio Networks Using SINR-Based Cooperative Beamforming
2022
International Journal of Advanced Science and Engineering
The purpose of the design is to minimize the transmit power of a transmitter area, an eavesdropper, a primary receiver, and multiple secondary receivers were given with distinct Signal to Interference ...
The performance estimation of the proposed optimal approach is validated and compared using the computer simulations software with an accuracy of 99.8% of the existing methods. ...
In this method of information with beam-form designing, the nodes with Multi Input Single Output (MISO) are considered as a secondary network whose target is to improve the secret rate of single input ...
doi:10.29294/ijase.8.3.2022.2260-2267
fatcat:ycfdwo4swvh7tfplperbv3ribe
Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap Channel
[article]
2020
arXiv
pre-print
Finite-length codes are learned for the Gaussian wiretap channel in an end-to-end manner assuming that the communication parties are equipped with deep neural networks (DNNs), and communicate through binary ...
System performance is evaluated for different DNN architectures, designed based on the existing secure coding schemes, at the transmitter. ...
In order to comply with the BPSK-constrained wiretap channel, we force the DNN at the encoder to produce binary values, and send +1 an −1 through the channel. ...
arXiv:2003.10577v1
fatcat:h2lmp5bfpzdirj3kidblr4ebkq
Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption
2013
MILCOM 2013 - 2013 IEEE Military Communications Conference
superheterodyne design, the modified receiver offers intriguing security features. ...
the channel between Alice and Bob is static; and 2) Our physical-layer encryption scheme shows that by removing a filter that the wireless circuit community has long considered to be necessary in the ...
The preselector filter has long been considered a necessity in the receiver design in order to reject undesired image signals; we show that the removal of this filter does not necessarily render the receiver ...
doi:10.1109/milcom.2013.87
dblp:conf/milcom/ChiangH13a
fatcat:5ppxtog4hfbwxkflbm7vwmygoe
« Previous
Showing results 1 — 15 out of 98 results