The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This letter studies the physical-layer security of a multi-antenna transmission system in the presence of Poisson distributed eavesdroppers. The transmission secrecy outage probability (TSOP) is adopted to evaluate the security. We derive an accurate integral expression as well as a closed-form upper bound on TSOP for the noncolluding eavesdroppers' case and a closed-form solution for the colluding...
The issue of physical layer security of the wireless single-input multiple-output (SIMO) system is addressed in this paper. We proposed a two-step transmission approach to improve the secrecy rate with perfect knowledge of channel state information. In the first step, the destination which has multiple antennas generates a random message and transmits it to the source which has a single antenna. The...
This paper presents physical layer security communication scheme for the wireless wire-tap channel. We investigate the feasibility of using the channel state information (CSI) as the key to encrypt the sending message. The inherent uncertainty and reciprocity of the time-variant wireless channel helps the sender to prevent the eavesdropper from getting any useful information without taking the risk...
Securing the wireless transmissions in the physical layer is a new perspective of security. In a wireless relay system, cooperative beamforming and jamming are two efficient schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, in most works these two techniques are used in phase II of the cooperative transmission, which leaves the phase I out of protection...
Security is an important issue in wireless communication systems as the wireless channel is unguided. Cryptographic techniques in the wired communication may be used to secure the wireless communication, but the characteristics of radio channel are not exploited efficiently. This paper proposes a simple key generation method for securing wireless communication. It assumes that each terminal is equipped...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.