Filters








5 Hits in 2.7 sec

Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems [article]

Mohamed Marzban, Ahmed El Shafie, Naofal Al-Dhahir
2021 arXiv   pre-print
Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols.  ...  We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers.  ...  Unlike [23] - [25] , we propose a secret-key assisted secure scheme that utilizes the sub-channel orthogonality of OFDM systems, allowing the simultaneous transmissions of data and secret key symbols  ... 
arXiv:2110.08707v1 fatcat:l25x7tmglzhjxojfhxjt76zwum

2018 IndexIEEE Wireless Communications LettersVol. 7

2018 IEEE Wireless Communications Letters  
., +, LWC Oct. 2018 832-835 A Secret-Key-Aided Scheme to Secure Transmissions From Single-Antenna RF-EH Source Nodes.  ...  ., LWC June 2018 308-311 F Fading channels A Secret-Key-Aided Scheme to Secure Transmissions From Single-Antenna RF-EH Source Nodes.  ... 
doi:10.1109/lwc.2018.2888676 fatcat:olfvetmkt5bt3c572e5y76b5pm

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered.  ...  WIRELESS SECRET KEY AGREEMENT We recall that the original secure communication system studied by Shannon was based on secret-key encryption.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered.  ...  WIRELESS SECRET KEY AGREEMENT We recall that the original secure communication system studied by Shannon was based on secret-key encryption.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs.  ...  The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  or the energy consumption required for sending one secret bit.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4