Articles with "secrecy capacity" as a keyword



Photo by markusspiske from unsplash

Secrecy Capacity of Two-Hop Relay Assisted Wiretap Channels

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3754-2

Abstract: Incorporating the physical layer characteristics to secure communications has received considerable attention in recent years. Moreover, cooperation with some nodes of network can give benefits of multiple-antenna systems, increasing the secrecy capacity of such channels.… read more here.

Keywords: secrecy rate; secrecy capacity; capacity; relay ... See more keywords
Photo by headwayio from unsplash

Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4787-x

Abstract: Classical time reversal (TR) pre-filtering has been considered as one of the key physical layer security techniques for wireless communication applications in the last decade. This paper proposes a secrecy capacity achievable time reversal pre-filter… read more here.

Keywords: reversal pre; communication; secrecy; secrecy capacity ... See more keywords

Secrecy Capacity of Diffusive Molecular Communication Under Different Deployments

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3152605

Abstract: Currently, the physical layer security is considered as one of the most suitable security techniques in Diffusive Molecular Communication (DMC) because of ease to implement. A recent piece of literature has presented the Secrecy Capacity… read more here.

Keywords: secrecy capacity; communication; molecular communication; capacity diffusive ... See more keywords
Photo from wikipedia

Higher Secrecy Capacity by Successive Pilot Contamination and Jamming Cancellation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3229615

Abstract: We present a secure transmission method for orthogonal frequency division multiplexing (OFDM) signaling between legitimate nodes (Alice and Bob) communicating in time-division duplex (TDD) mode under an active attack. An active eavesdropper carries out pilot… read more here.

Keywords: secrecy capacity; contamination; pilot; pilot contamination ... See more keywords
Photo by christianw from unsplash

Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE/CAA Journal of Automatica Sinica"

DOI: 10.1109/jas.2023.123393

Abstract: This paper is concerned with the problem of finite-horizon energy-to-peak state estimation for a class of networked linear time-varying systems. Due to the inherent vulnerability of network-based communication, the measurement signals transmitted over a communication… read more here.

Keywords: secrecy capacity; state; encryption decryption; state estimation ... See more keywords
Photo by jareddrice from unsplash

Secrecy Performance of Backscatter Communications With Multiple Self-Powered Tags

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3201031

Abstract: Backscatter communication (BackCom) networks are vulnerable to eavesdropping, while its secrecy performance has not been sufficiently studied. In this letter, we propose a tag selection strategy to optimize the ergodic secrecy capacity (ESC) and the… read more here.

Keywords: backscatter; secrecy capacity; self powered; secrecy performance ... See more keywords
Photo by hollymandarich from unsplash

Secrecy Capacity of IRS-Assisted Terahertz Wireless Communications With Pointing Errors

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2023.3246169

Abstract: This letter considers an intelligent reflecting surface (IRS)-assisted terahertz (THz) communication system in the presence of an arbitrary number of colluding/non-colluding eavesdroppers (Eves). Although the instantaneous channel state information (CSI) of the legitimate user (Bob)… read more here.

Keywords: secrecy capacity; assisted terahertz; pointing errors; irs assisted ... See more keywords
Photo from wikipedia

The Secrecy Capacity of Gaussian MIMO Channels With Finite Memory

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2017.2648742

Abstract: In this paper, we study the secrecy capacity of Gaussian multiple-input multiple-output (MIMO) wiretap channels (WTCs) with a finite memory, subject to a per-symbol average power constraint on the MIMO channel input. MIMO channels with… read more here.

Keywords: capacity; mimo; capacity gaussian; secrecy capacity ... See more keywords

On the Secrecy Capacity of Hybrid FSO-mmWave Wiretap Channels

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3148238

Abstract: Hybrid Free-Space Optical (FSO) and millimeter Wave (mmWave) systems have emerged as a promising candidate for high data rate wireless transmissions due to the unique complementary properties against the different channel and environment conditions. Consequently,… read more here.

Keywords: capacity hybrid; secrecy capacity; hybrid fso; fso mmwave ... See more keywords
Photo from wikipedia

On the Secrecy Capacity of a Full-Duplex Wirelessly Powered Communication System

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Wireless Communications"

DOI: 10.1109/twc.2019.2936201

Abstract: In this paper, we investigate the secrecy capacity of a point-to-point, full-duplex (FD) wirelesly powered communication system in the presence of a passive eavesdropper (EVE). The considered system is comprised of an energy transmitter (ET),… read more here.

Keywords: secrecy capacity; full duplex; system; communication ... See more keywords
Photo by sunburned_surveyor from unsplash

On the Binary Input Gaussian Wiretap Channel with/without Output Quantization

Sign Up to like & get
recommendations!
Published in 2017 at "Entropy"

DOI: 10.3390/e19020059

Abstract: In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of… read more here.

Keywords: capacity; input gaussian; secrecy capacity; channel ... See more keywords