Secure Integrated Sensing and Communication

نویسندگان

چکیده

This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied which (i) presence feedback enables transmitter to convey information, while simultaneously state estimation; one receivers treated as an eavesdropper whose should be estimated but remain oblivious part transmitted information. The abstracts challenges behind security for joint if views key attribute, e.g., location. For independent identically distributed states, perfect output feedback, when message kept secret, partial characterization secrecy-distortion region developed. exact either physically-degraded or reversely-physically-degraded. also extended situation entire secret. benefits approach compared separation-based secure state-sensing methods are illustrated with binary models.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

Fully Integrated Silicon Terahertz Transceivers for Sensing and Communication Applications

Fully Integrated Silicon Terahertz Transceivers for Sensing and Communication Applications

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

CryptoNET: Integrated Secure Workstation

In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and im...

متن کامل

A Secure Certificate for Secure Group Communication

Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal on selected areas in information theory

سال: 2023

ISSN: ['2641-8770']

DOI: https://doi.org/10.1109/jsait.2023.3275048