Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Physical layer security in slow fading wiretap channels is often guaranteed by constraining the secrecy outage probability (SOP) below a maximum tolerable value. In this paper, we propose a new nonadaptive (NADP) transmission scheme for maximizing the secrecy throughput by using adjustable transmit power based on the instantaneous channel state information (CSI) of the main channel under an SOP constraint...
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and passive eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their own information...
In this paper, we investigate physical-layer security in a wireless ad hoc network in which a large number of legitimate transmitter-receiver pairs coexist with randomly distributed eavesdroppers; each legitimate receiver works in either half-duplex (HD) or full-duplex (FD) mode. We aim to increase the number of secure links per unit area in the network of interest by determining the allocation between...
The artificial noise (AN) aided beamforming design in the MISOME (multiple-input, single-output, multiple-eavesdropper) wiretap channel is studied from the perspective of secrecy outage. Unlike many existing works which directly adopted the traditional null-space AN scheme, we start with a general assumption on the structure of the transmit signal, and seek to find the optimal structure by solving...
In this paper, we investigate the impact of relative distance and large-scale fading of legitimate user and eavesdropper on the artificial noise (AN) assisted secrecy scheme in a multiple-input single-output (MISO) wiretap channel. We show that AN does not always improve the achievable ergodic secrecy rate (ESR), and provide an exact signal-to-noise ratio (SNR) threshold below which AN does not work...
Backscatter wireless communication is an emerging technique widely used in passive radio frequency identification (RFID) systems. Recently, the requirement of a high data rate, data reliability, and secure transmission is becoming the main driving force for the development of RFID systems, which motivates the introduction of multiple-input multiple-output (MIMO) schemes and physical layer security...
This paper comprehensively studies the secure decode-and-forward (DF) relaying transmission in slow fading channels. To maximize the secrecy throughput under a secrecy outage probability constraint, we propose three adaptive transmission schemes (ATSs) with different complexity and flexibility, and design system parameters according to the instantaneous channel state information of the legitimate...
The design of artificial-noise-aided secure transmission over multiple-input, single-output, and multi-antenna eavesdropper (MISOME) slow fading channels is addressed in this paper. We consider the scenario where the messages sent by N-antenna transmitter are overheard by a K-antenna eavesdropper. The instantaneous channel state information of the eavesdropper's channel is assumed to be unknown to...
In this paper, we investigate the secure transmission in the single-input multiple-output (SIMO) wireless systems. Motivated by the existing destination-feedback schemes, and the utilization of artificial noise, a novel destination-feedback based two-phase transmission strategy is proposed to secure the SIMO communications. In the first phase, the multiple-antenna destination transmits both artificial...
The secrecy outage of a two-user slow fading broadcast channel is studied in this paper. We consider the scenario where independent and confidential messages are transmitted to each user using superposition coding in the presence of an external eavesdropper. We assume the instantaneous channel state information (CSI) of the eavesdropper's channel is not available and the secrecy outage can be claimed...
In this paper, we investigate the secrecy performance of matched-filter (MF) and zero-forcing (ZF) precoding in a multiuser massive multiple-input multiple-output (MIMO) system with a multi-antenna passive eavesdropper. For the two precoding schemes, we find that the equivalent wiretap channels are similar and thus the eavesdropper achieves the approximate same sum-rate. Closed-form expressions of...
We investigate the physical layer security of a multiple-input single-output (MISO) channel in the presence of a multi-antenna passive eavesdropper. Traditionally, artificial noise (AN) scheme is an efficient security strategy without the channel state information (CSI) of the eavesdropper. In this paper, we propose and analyze an efficient security scheme called the artificial fast fading (AFF) scheme...
In this paper, we investigate the security issue of a two-hop amplify-and-forward MIMO wireless relay networks in the existence of a multi-antenna eavesdropper. The optimal scheme to achieve the secrecy capacity involves a non-convex optimization and is still an open problem. Aiming to find an efficient way to enhance the secrecy rate, we propose a suboptimal joint source and relay linear precoding...
The issue of physical layer security of the wireless single-input multiple-output (SIMO) system is addressed in this paper. We proposed a two-step transmission approach to improve the secrecy rate with perfect knowledge of channel state information. In the first step, the destination which has multiple antennas generates a random message and transmits it to the source which has a single antenna. The...
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid cooperative relaying and jamming scheme to enhance the security of a two-way relay network, where some intermediate nodes help to relay the signal to the legitimate terminals via distributed...
Securing the wireless transmissions in the physical layer is a new perspective of security. In a wireless relay system, cooperative beamforming and jamming are two efficient schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, in most works these two techniques are used in phase II of the cooperative transmission, which leaves the phase I out of protection...
Abstract-In this paper, we address the physical-layer security of two-way (bi-directional) transmissions of two terminals with the help of multiple relay nodes in the presence of an eavesdropper, where each node in the network is only equipped with single antenna. The secrecy sum rate is used as the metric of security, which is the rate difference between the legitimate information exchange between...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.