نتایج جستجو برای: achievable secrecy rate region

تعداد نتایج: 1470136  

Journal: :CoRR 2014
Samah A. M. Ghanem Munnujahan Ara

Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small si...

Journal: :CoRR 2016
Tulika Agrawal Samar Agnihotri

We consider a class of Gaussian layered networks where a source communicates with a destination through L intermediate relay layers with N nodes in each layer in the presence of a single eavesdropper which can overhear the transmissions of the nodes in any one layer. The problem of maximum secrecy rate achievable with analog network coding for a unicast communication over such layered wireless ...

Journal: :Entropy 2014
Xinxing Yin Zhi Xue

Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it s...

Journal: :CoRR 2017
Matthias Frey Igor Bjelakovic Slawomir Stanczak

Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. We then refine the approach in order to obtain some novel results on the second-order achievable rates. Establishing a conceptually simple converse proof for resolvability over the memoryless MAC, which rel...

2008
Ashish Khisti

The Gaussian wiretap channel model is studied when there are multiple antennas at the sender, the receiver and the eavesdropper and the channel matrices are fixed and known to all the terminals. The secrecy capacity is characterized using a Sato type upper bound. A computable characterization of the capacity is provided. The secrecy capacity is studied in several interesting regimes. The high S...

Journal: :CoRR 2009
Mohamed Abdel Latif Ahmed Sultan Hesham El Gamal

This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple A...

Journal: :CoRR 2011
John Tadrous Mohammed Nafie

An achievable rate region is obtained for a primary multiple access network coexisting with a secondary link of one transmitter and a corresponding receiver. The rate region depicts the sum primary rate versus the secondary rate and is established assuming that the secondary link performs rate-splitting. The achievable rate region is the union of two types of achievable rate regions. The first ...

2010
Aly El Gamal O. Ozan Koyluoglu Moustafa Youssef Hesham El Gamal

This work considers the two-way wiretap channel in which two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, where each node can transmit and receive simultaneously, we obtain new achievable secrecy rate regions based on the idea of allowing the two users to jointly optimize their channel prefixing d...

Journal: :IEEE Transactions on Vehicular Technology 2023

The artificial noise (AN) aided channel quality indicator (CQI) mapped generalized spatial modulation (GSM) philosophy is proposed for improving the security of legitimate links. Given randomness CQI, eavesdroppers cannot successfully decode confidential information. We analyse both secrecy rate as well eavesdropper's error and reveal that scheme outperforms its CQI-mapped counterpart. Theoreti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید