The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect...
This paper investigates the Tomlinson-Harashima precoding (THP) design for secure communications in broadcast multiple-input multiple-output (MIMO) systems in the presence of a passive eavesdropper. We focus on optimizing the nonlinear transceiver to guarantee a certain Quality-of-Service (QoS) level for the intended receiver in terms of mean-squared-error (MSE). The scheme allocates the transmit...
In this paper we study secure communications with weak secrecy constraint in a cognitive radio channel, where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The primary's secrecy rate and the transmission scheme should be kept unchanged whether the secondary users transmit or not. We derive the achievable rate of the discrete memoryless multi-phase...
In this paper we present a new code design technique which produces best equivocation codes (BEqC) with highest minimum distance for syndrome coding which have better secrecy than the best known error correcting codes (BKC). The best equivocation codes of highest minimum distance have been determined by using a combination of a code design technique based on extensions of the parity check matrix from...
This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system is equipped with a full-duplex (FD) receiver in contrast to conventional frameworks where a half-duplex (HD) receiver is at hand. Conventionally, relays are used as jammer to reduce the signal quality received by the eavesdroppers so as to increase the secrecy transmission...
This document reviews the main design decisions that have been made for the physical layer design of the Device-to-Device (D2D) synchronization signals and channels as part of the 3GPP Release-12 specification work. The intention is to provide some context and background to the agreed design decisions because this rationale will not be described in the 3GPP specifications.
This paper presents a secure beamforming design to prevent eavesdropping on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The devices communicate via a trusted relay which performs physical layer network coding (PNC), and multiple eavesdroppers are trying to intercept the device information. The beamforming design is based on minimizing mean square error of the D2D communication...
In this paper we address the diffusion of useful information in generalized networks each consisting of a wireless physical substrate and a social network overlay. Contrary to previous works, we consider the effect of user interest and features thereof on the spreading dynamics of useful information within these complex wireless-social networks, e.g., how interest periodicity affects the diffusion...
In this paper, we propose an energy efficient cross-layer design framework for transmitting Markov modulated Poisson process (MMPP) traffic over Nakagami-m fading channel with delay demands. The adaptive modulation and coding (AMC) is used at physical layer. We first investigate the stationary distribution of this system. With the stationary distribution and the AMC transmission mode, we derive the...
In this paper, the resource allocation for multiuser wiretap Orthogonal Frequency-Division Multiplexing(OFDM) systems is investigated to improve the system power efficiency. In such a multiuser wiretap OFDM system, one legitimate transmitter (Alice), multiple legitimate receivers (Bobs), and one eavesdropper (Eve) are simultaneously considered. The time-domain artificial noise (AN) is firstly involved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.