The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the possibility of the use of suprathreshold stochastic resonance system in the physical layer security scheme. The suprathreshold stochastic resonance (SSR) array is used as a preprocessor at the front-end of the legitimate receiver, which reduces the noise in the receiving signal. Analysis in two cases are given, which are (1) the eavesdropper uses the minimum error...
Conventional methods of codebook design in limited-feedback multi-antenna systems aim to quantize the single-user channel but without considering secrecy requirements. Thus, the information leakage is inevitably aggravated due to the eavesdropping behaviors in limited-feedback multiple-input single-output single-antenna- eavesdropper (MISOSE) systems. To reduce the information leakage without any...
Pilot spoofing attack is a serious threat to timedivision duplex (TDD) orthogonal frequency division multiplexing (TDD-OFDM) system. By employing identical pilot tones as a legitimate receiver, an adversary can contaminate the uplink channel estimation between a transceiver pair. To solve this problem, we in this paper propose an independent component analysis (ICA) based channel estimation and identification...
Secure the cooperative transmission is studied for an automatic repeat request (ARQ)-based wireless network against a jamming-aided eavesdropper. The eavesdropper utilizes the jamming attack to assist its eavesdropping by forcing the legitimate transmitter to retransmit its confidential messages under poor wiretap channel quality. Then, utilizing these retransmission opportunities, the eavesdropper...
Secure wireless communication has always been a hot research topic due to the vulnerabilities associated with wireless channel. Physical layer aspects to secure wireless communication, based on the information-theoretic security and signal processing methods have gained much recognition over the last decade. Specifically, artificial noise (AN) methods are assumed to be good means for providing security...
Aiming at providing secure provisioning for the primary system, in this paper, we propose an energy harvesting based cooperative communication (EHCC) scheme which will protect the primary confidential message from eavesdropping under the constraint of the secondary quality-of-service (QoS) requirement. To do so, the secondary receiver (SR) firstly transmits jamming signal to protect the primary transmission...
In the underlay cognitive radio network, the secondary users are allowed to transmit concurrently with the primary users , which shows great potential to relieve the spectrum scarcity problem. However, it raises significant security issues at the physical layer due to the spectrum sharing approach. Different from most present research, in this paper we study the secure communication problem between...
Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric...
Security issue is of paramount importance yet significant challenge for wireless communications, and this problem can be even more intricate when facing with a full-duplex adversary. In this paper, we investigate the physical layer security of a legitimate transmission link in the presence of a full-duplex active eavesdropper, who is capable to perform eavesdropping and jamming simultaneously. The...
Guaranteeing the secure delivery is a critical yet challenging issue in wireless transmission. In this paper, a secure delivery scheme that utilizing the dynamic fountain code design is proposed. Using fountain-coded transmission, the transmitter continuously sends fountain packets until the legitimate receiver successfully recovers the original data from a sufficient number of fountain packets. Secure...
In this paper, we propose a joint amplify-and-forward (AF)-based channel estimation and user selection (J-ACES) scheme for multi-user MIMO (MU-MIMO) systems. Firstly, without channel state information (CSI) quantization, the transmitter estimates the downlink CSI for each receiver by adopting AF-based CSI feedback mechanism, in which the receiver amplifies and feeds back its own received downlink...
Resource allocation is a critically important issue for cognitive networks, because it needs to not only meet the quality-of-service (QoS) requirements for the secondary users (SU), but also protect the QoS of primary users (PU) from degradation. In this paper, we develop the optimal power allocation scheme for the cognitive network, which can satisfy the QoS requirements of SUs and PUs simultaneously...
Finite-resolution digital receiver is recently considered as a potential way to Ultra Wide Band (UWB) communication systems due to its ability of mitigating the challenge of Analog-Digital Converter (ADC). In this paper, the effects of narrowband interference (NBI) are investigated when finite-resolution digital receiver is used for Impulse Radio-UWB (IR-UWB) system. It is shown that finite-resolution...
Using directional antennas in mobile ad-hoc networks can greatly improve the spatial reuse and the transmission range. However, it also introduces new kinds of problems arising from directivity. One major problem is deafness. In this paper, we propose a new directional MAC protocol with advance notice strategy, called AN-DMAC (Advance Notice Directional MAC). Each node in AN-DMAC maintains a LIT (Local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.