The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ambient Assisted Living (AAL) describes an ICT based environment that exposes personalized and context-aware intelligent services, thus creating an appropriate experience to the end user to support independent living and improvement of the everyday quality of life of both healthy elderly and disabled people. The social and economic impact of AAL systems have boosted the research activities that combined...
This work proposes the use of a unitary modulation scheme to enhance physical layer secrecy in multi-antenna wireless systems. The proposed scheme takes advantage of having only channel state information at the transmitter (CSIT) but not at the receiver and the eavesdropper. With CSIT, the transmitter can first take the LQ or singular value decomposition of the channel matrix and then replace its...
This paper investigates the joint robust beamforming and artificial noise design in two-user interference networks, where one of the two pairs is wiretapped by an external eavesdropper, and only imperfect eavesdropper's channel state information (ECSI) is available for the two pairs. Under individual transmission power constraint, our goal is to maximize the worst-case achievable secrecy rate of the...
In this work we study the reliability and secrecy performance achievable by practical low-density parity-check (LDPC) codes over the Gaussian wiretap channel. While several works have already addressed this problem in asymptotic conditions, i.e., under the hypothesis of codewords of infinite length, only a few approaches exist for the finite length regime. We propose an approach to measure the performance...
This work examines the properties of code sequences for the degraded scalar Gaussian broadcast channel with confidential messages (BCC) in terms of the behavior of the mutual information and minimum mean-square error (MMSE) functions for all signal-to-noise ratios (SNRs). More specifically, the work focuses on both completely secure code sequences, meaning that the transmitted message to the stronger...
We address the physical layer security question of whether a multiple antenna receiver can enhance the secrecy rate of the multiple-input multiple-output wiretap channel by transmitting artificial noise from some of its antennas to jam a multiple antenna eavesdropper. To answer this question we use a QoS-MMSE approach to formulate a global constrained optimisation problem that is efficiently solved...
We study the problem of secure transmission over a caching D2D network. In this model, end users can prefetch a part of popular contents in their local cache. Users make arbitrary requests from the library of available files and interact with each other to deliver requested contents from the local cache to jointly satisfy their demands. The transmission between the users is wiretapped by an external...
This paper investigates the Tomlinson-Harashima precoding (THP) design for secure communications in broadcast multiple-input multiple-output (MIMO) systems in the presence of a passive eavesdropper. We focus on optimizing the nonlinear transceiver to guarantee a certain Quality-of-Service (QoS) level for the intended receiver in terms of mean-squared-error (MSE). The scheme allocates the transmit...
Security issues in wireless networks have become a subject of growing interest in recent years due to the broadcast nature of wireless channels. In this paper, we investigate secure communication over a multi-antenna wiretap channel in the presence of randomly distributed eavesdroppers. In the fast fading environment, the overall performance of this channel is traditionally characterized by the ergodic...
In this paper we present a new code design technique which produces best equivocation codes (BEqC) with highest minimum distance for syndrome coding which have better secrecy than the best known error correcting codes (BKC). The best equivocation codes of highest minimum distance have been determined by using a combination of a code design technique based on extensions of the parity check matrix from...
In this paper, we investigate the secure transmission in the single-input multiple-output (SIMO) wireless systems. Motivated by the existing destination-feedback schemes, and the utilization of artificial noise, a novel destination-feedback based two-phase transmission strategy is proposed to secure the SIMO communications. In the first phase, the multiple-antenna destination transmits both artificial...
This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system is equipped with a full-duplex (FD) receiver in contrast to conventional frameworks where a half-duplex (HD) receiver is at hand. Conventionally, relays are used as jammer to reduce the signal quality received by the eavesdroppers so as to increase the secrecy transmission...
This paper studies the individual secrecy capacity region of the broadcast channel with receiver side information. First, an achievable rate region is established for the discrete memoryless case by employing superposition coding. Further, it is extended to the corresponding Gaussian case, where the individual secrecy capacity region is characterized in case of a weak or strong eavesdropper (compared...
Distributed cooperative spectrum sensing is an effective and feasible approach to detect primary users in Cognitive Radio Mobile Ad Hoc NETworks (CR-MANETs). However, due to the dynamic and interdependent characteristics of this approach, malicious attackers can interrupt the normal spectrum sensing more easily in open environments by spectrum sensing data falsification attacks. Meanwhile, attackers...
Network Coding has significantly shown the achievable throughput and robustness in wireless Networks. However, network coding-enabled networks are susceptible to pollution attacks where a small number of polluted messages will propagate due to recoding and corrupt bunches of legitimate messages. Several lightweight Homomorphic Message Authentication Code (HMAC) schemes have been proposed for protecting...
Virtual Private LAN Services (VPLS) is a widely utilized Layer 2 (L2) Virtual Private Network (VPN) architecture in industrial networks. In the last few years, VPLS networks gained an immense popularity as an ideal network architecture to interconnect industrial legacy SCADA (Supervisory Control and Data Acquisition) and process control devices over a shared network. However, legacy VPLS architectures...
Internet of Things (IoT) concept provides a number of opportunities to improve our daily lives while also creating a potential risk of increasing the vulnerability of personal information to security and privacy breaches. Data collected from IoT is usually offloaded to the Cloud which may further leave data prone to a variety of attacks if security and privacy issues are not handled properly. Anomaly...
The vast interconnectivity of devices in the Internet of Things (IoT) and Cyber-Physical systems under wireless environments facilitates information exchange, but challenges network security. In this paper, cooperative beamforming for secure communications is studied in wireless cyber-physical systems, where two legitimate devices communicate with the help of amplify-and-forward (AF) relays, and the...
Automotive industry is about to make a cutting-edge step in terms of vehicular technologies by letting vehicles communicate with each other and create an Internet of Things composed by vehicles, i.e., an Internet of Vehicles (IoV). In this context, information dissemination is very useful in order to support safe critical tasks and to ensure reliability of the vehicular system. However, the industrial...
Without doubt, the Internet of Things (IoT) is changing the way people and technology interact. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet. However, realising a network of physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.