The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The potential of full-duplex in communication design has been recently considered for emerging technologies such as 5G. Moreover, full-duplex can play a crucial role in upcoming secure communication scenarios too. However, results in the literature are limited and only explore scenarios, where the wireless channel is used either for key generation or for secure messaging. Our first contribution is...
It is well-known that wireless channel reciprocity together with fading can be exploited to generate a common secret key between two legitimate communication partners. This can be achieved by exchanging known deterministic pilot signals between both partners from which the random fading gains can be estimated and processed. However, the entropy and thus quality of the generated key depends on the...
Secure wireless communication has always been a hot research topic due to the vulnerabilities associated with wireless channel. Physical layer aspects to secure wireless communication, based on the information-theoretic security and signal processing methods have gained much recognition over the last decade. Specifically, artificial noise (AN) methods are assumed to be good means for providing security...
In this paper, we investigate the physical-layer security for a wireless two-hop relay network in the presence of channel estimation errors when estimating the channel state information (CSI) of the main links (from the source via relays to the destination) and wiretap links (from the source and relays to the eavesdropper). The eavesdropper can not only overhear the confidential signals transmitted...
In this paper, we consider a cooperative relay network consisting of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of multiple eavesdroppers, which intend to tap confidential messages transmitted by both the source and the relays. We propose a so-called secrecy maximization oriented relay selection (SMORS) scheme to improve the physical-layer security of wireless...
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1. User 1 tunes its transmission power in order to maximize its secrecy rate as well as...
In this paper, we propose an opportunistic user selection criterion to obtain a multiuser diversity gain for secure communication. At the same time, we also propose a strategy for utilizing a small base station in heterogeneous networks as a helper or a jammer adaptively. Our approach is to maximize the secrecy achievable rate based on an analytically derived lower bound instead of the original objective...
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key generation method that exploits the physical layer properties of the multipath channel in orthogonal frequency division multiplexing (OFDM) systems with time division duplexing (TDD), and in...
Nowadays networking is secure because we encrypt the confidential messages with the underlying assumption that adversaries in the network are computationally bounded. For traditional routing or network coding, routers know the contents of the packets they receive. Networking is not secure any more if there are eavesdroppers with infinite computational power at routers. Our concern is whether we can...
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical characteristics of wireless channels, which has recently attracted a lot of research attentions. In this paper, we consider the physical-layer security in...
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides an overview of the main properties of...
The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-layer has already been established and provides...
The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of the wireless networks. In this paper, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, which let the attacker's signal...
Motivated by recent developments in physical-layer security and stochastic geometry, we aim to characterize the fundamental limits of secure communication in wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, we define the secure communication graph (s-graph) from the point of view of information-theoretic security. For...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.