Filters








98 Hits in 7.7 sec

Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive filters

Hugo Reboredo, Vinay Prabhu, Miguel R. D. Rodrigues, Joao Xavier
2011 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
multiple-output (MIMO) wiretap channel.  ...  This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input  ...  and the input power to the channels vs. the secrecy constraint with P avg = 1.  ... 
doi:10.1109/icassp.2011.5947125 dblp:conf/icassp/ReboredoPRX11 fatcat:gwqpgtljjjbzpkjkwqc7lgmhlu

Filter design with secrecy constraints: Zero-forcing constraint at the legitimate receiver

Hugo Reboredo, Miguel R. D. Rodrigues, Joao Xavier
2012 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
We consider a general Multiple-Input Multiple-Output (MIMO) Gaussian wiretap scenario, where a Zero-Forcing (ZF) filter is used at the legitimate receiver, whilst the eavesdropper uses an optimal linear  ...  This paper considers the problem of filter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input  ...  CONCLUSIONS We have considered the problem of filter design with secrecy constraints in the classical wiretap scenario, where the objective is to design transmit and receive filters that minimize the MSE  ... 
doi:10.1109/spawc.2012.6292927 dblp:conf/spawc/ReboredoRX12 fatcat:gjcka66mfza2fkehhjtrfgl2uu

Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel

Hugo Reboredo, Joao Xavier, Miguel R. D. Rodrigues
2013 IEEE Transactions on Signal Processing  
This paper considers the problem of filter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a Gaussian multiple-input-multiple-output  ...  We consider a general MIMO Gaussian wiretap scenario, where the legitimate receiver uses a linear Zero-Forcing (ZF) filter and the eavesdropper receiver uses either a ZF or an optimal linear Wiener filter  ...  ACKNOWLEDGMENT The authors thank the anonymous reviewers for their valuable comments and suggestions that significantly contributed to improving the quality of the paper. M. R. D.  ... 
doi:10.1109/tsp.2013.2262275 fatcat:qna4tiieg5a5ti5j3twhayehza

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Akgun et al. consider a similar multiple-input single-output multiple-antenna eavesdropper (MISOME) wiretap channel, where the transmitter employs a zero-forcing beamforming (ZFBF) to eliminate the multiuser  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Zheng et al. investigate the joint transmit and receive beamforming design for a singleantenna input, multiple-antenna output, and multiple-antenna eavesdropper (SIMOME) wiretap channel with imperfect  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Cooperative Security at the Physical Layer: A Summary of Recent Advances

Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, Aylin Yener
2013 IEEE Signal Processing Magazine  
When the wiretap channel is degraded, i.e., the channel input X, Bob's channel output Y and Eve's channel output Z satisfy the Markov chain , X Y Z " " there is no need for channel prefixing, and V X =  ...  Thus, we observe that the Gaussian wiretap channel incurs a severe penalty for secrecy, having reduced its degrees of freedom from one to zero for secrecy.  ... 
doi:10.1109/msp.2013.2260875 fatcat:ff2hab5jpbabpgdtxpcaehf3am

Secure Degrees of Freedom of the Multiple Access Wiretap Channel with Multiple Antennas [article]

Pritam Mukherjee, Sennur Ulukus
2016 arXiv   pre-print
We consider a two-user multiple-input multiple-output (MIMO) multiple access wiretap channel with N antennas at each transmitter, N antennas at the legitimate receiver, and K antennas at the eavesdropper  ...  Our results show how the number of eavesdropper antennas affects the optimal sum s.d.o.f. of the multiple access wiretap channel.  ...  Introduction We consider the two-user multiple-input multiple-output (MIMO) multiple access wiretap channel where each transmitter has N antennas, the legitimate receiver has N antennas and the eavesdropper  ... 
arXiv:1604.03541v1 fatcat:r4orznn7hbg4xc5l6f2tvjlyja

Secrecy on the Physical Layer in Wireless Networks [chapter]

Eduard A., Anne Wolf, Sabrina Gerbracht
2010 Trends in Telecommunications Technologies  
Acknowledgement The authors want to thank Martin Mittelbach for his review of this chapter, critical comments and productive discussions.  ...  This is the secrecy rate of the non-degraded Gaussian wiretap channel with channel gains α and β.  ...  The corresponding channel input or output alphabets are written as X , Y and Z. x with x = √ x † x = ∑ n i=1 |x i | 2 , if www.intechopen.com In Wyner's degraded wiretap channel, Bob receives a signal  ... 
doi:10.5772/8472 fatcat:7jfjukti3ngarbdbdg5rsff3qq

An Artificial-noise Based Approach for the Secrecy Rate Maximization of MISO VLC Wiretap Channel with Multi-Eves

Ge Shi, Yong Li, Wei Cheng, Xiang Gao, Wenjie Zhang
2020 IEEE Access  
In this paper, we consider improving the secure performance of multiple-input single-output visible light communication channel in the presence of multiple eavesdroppers with multiple photodiodes.  ...  Our goal is to design an optimal artificial-noise (AN) aided transmission strategy to maximize the achievable secrecy rate subject to both sum power constraint and peak amplitude constraint.  ...  In [13] , it was found, for a SISO amplitude-constrained gaussian wiretap channel (such as VLC), the secrecy capacity can be obtained by discrete input with finite support.  ... 
doi:10.1109/access.2020.3046664 fatcat:uy3wvvqdmffgdpux3jpji2bjpm

An Overview of Key Technologies in Physical Layer Security

Abraham Sanenga, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, Joseph Monamati Chuma
2020 Entropy  
Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided.  ...  PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel.  ...  Conflicts of Interest: The authors declare no conflict of interest. Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/e22111261 pmid:33287029 fatcat:ngkceebvprbbbkrwamjzqtwaci

A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends [article]

Yongpeng Wu, Chengshan Xiao, Zhi Ding, Xiqi Gao, Shi Jin
2017 arXiv   pre-print
However, most of the advances in the design of high speed wireless multiple-input multiple output (MIMO) systems are based on information-theoretic principles that demonstrate how to efficiently transmit  ...  , and MIMO wiretap channel.  ...  For double-input multiple-output (DIMO) systems with both PCSIT and SCSIT, an adaptive scheme switching between OSTBC and spatial multiplexing with zero-forcing (ZF) receiver based on the average spectral  ... 
arXiv:1704.07611v1 fatcat:4gep4gnbefdytjdggniocdora4

Artificial Noise-Based Beamforming for the MISO VLC Wiretap Channel

Mohamed Amine Arfaoui, Hajar Zaid, Zouheir Rezki, Ali Ghrayeb, Anas Chaaban, Mohamed-Slim Alouini
2019 IEEE Transactions on Communications  
This paper investigates the secrecy performance of the multiple-input single-output (MISO) visible light communication (VLC) wiretap channel.  ...  The considered system model comprises three nodes: a transmitter (Alice) equipped with multiple fixtures of LEDs, a legitimate receiver (Bob) and an eavesdropper (Eve), each equipped with one photo-diode  ...  However, the secrecy capacity of the new wiretap channel is known and Gaussian is optimal.  ... 
doi:10.1109/tcomm.2018.2889649 fatcat:3g2idnkwfnccvl6ibkjfkhwvhi

Performance Enhancement of Cognitive Radio Networks Using SINR-Based Cooperative Beamforming

P. Suresh Kumar, G. Nirmala, S. Manimegalai, H. Arulvedi
2022 International Journal of Advanced Science and Engineering  
The purpose of the design is to minimize the transmit power of a transmitter area, an eavesdropper, a primary receiver, and multiple secondary receivers were given with distinct Signal to Interference  ...  The performance estimation of the proposed optimal approach is validated and compared using the computer simulations software with an accuracy of 99.8% of the existing methods.  ...  In this method of information with beam-form designing, the nodes with Multi Input Single Output (MISO) are considered as a secondary network whose target is to improve the secret rate of single input  ... 
doi:10.29294/ijase.8.3.2022.2260-2267 fatcat:ycfdwo4swvh7tfplperbv3ribe

Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap Channel [article]

Alireza Nooraiepour, Sina Rezaei Aghdam
2020 arXiv   pre-print
Finite-length codes are learned for the Gaussian wiretap channel in an end-to-end manner assuming that the communication parties are equipped with deep neural networks (DNNs), and communicate through binary  ...  System performance is evaluated for different DNN architectures, designed based on the existing secure coding schemes, at the transmitter.  ...  In order to comply with the BPSK-constrained wiretap channel, we force the DNN at the encoder to produce binary values, and send +1 an −1 through the channel.  ... 
arXiv:2003.10577v1 fatcat:h2lmp5bfpzdirj3kidblr4ebkq

Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption

Jerry T. Chiang, Yih-Chun Hu
2013 MILCOM 2013 - 2013 IEEE Military Communications Conference  
superheterodyne design, the modified receiver offers intriguing security features.  ...  the channel between Alice and Bob is static; and 2) Our physical-layer encryption scheme shows that by removing a filter that the wireless circuit community has long considered to be necessary in the  ...  The preselector filter has long been considered a necessity in the receiver design in order to reject undesired image signals; we show that the removal of this filter does not necessarily render the receiver  ... 
doi:10.1109/milcom.2013.87 dblp:conf/milcom/ChiangH13a fatcat:5ppxtog4hfbwxkflbm7vwmygoe
« Previous Showing results 1 — 15 out of 98 results