A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems
[article]
2021
arXiv
pre-print
Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. ...
We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. ...
Unlike [23] - [25] , we propose a secret-key assisted secure scheme that utilizes the sub-channel orthogonality of OFDM systems, allowing the simultaneous transmissions of data and secret key symbols ...
arXiv:2110.08707v1
fatcat:l25x7tmglzhjxojfhxjt76zwum
2018 IndexIEEE Wireless Communications LettersVol. 7
2018
IEEE Wireless Communications Letters
., +, LWC Oct. 2018 832-835 A Secret-Key-Aided Scheme to Secure Transmissions From Single-Antenna RF-EH Source Nodes. ...
., LWC June 2018 308-311 F Fading channels A Secret-Key-Aided Scheme to Secure Transmissions From Single-Antenna RF-EH Source Nodes. ...
doi:10.1109/lwc.2018.2888676
fatcat:olfvetmkt5bt3c572e5y76b5pm
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. ...
WIRELESS SECRET KEY AGREEMENT We recall that the original secure communication system studied by Shannon was based on secret-key encryption. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. ...
WIRELESS SECRET KEY AGREEMENT We recall that the original secure communication system studied by Shannon was based on secret-key encryption. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs. ...
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
or the energy consumption required for sending one secret bit. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4