A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
[图书][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver
wiretap channel in which a transmitter wants to have confidential communication with an …
wiretap channel in which a transmitter wants to have confidential communication with an …
Secrecy in cooperative relay broadcast channels
E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We investigate the effects of user cooperation on the secrecy of broadcast channels by
considering a cooperative relay broadcast channel. We show that user cooperation can …
considering a cooperative relay broadcast channel. We show that user cooperation can …
Secure degrees of freedom of one-hop wireless networks
We study the secure degrees of freedom (dof) of one-hop wireless networks by considering
four fundamental wireless network structures: 1) Gaussian wiretap channel; 2) Gaussian …
four fundamental wireless network structures: 1) Gaussian wiretap channel; 2) Gaussian …
Secure Degrees of Freedom of -User Gaussian Interference Channels: A Unified View
We determine the exact sum secure degrees of freedom (dof) of the K-user Gaussian
interference channel. We consider three different secrecy constraints: 1) K-user interference …
interference channel. We consider three different secrecy constraints: 1) K-user interference …
[PDF][PDF] Secrecy capacity of a class of broadcast channels with an eavesdropper
E Ekrem, S Ulukus - EURASIP Journal on Wireless Communications and …, 2009 - Springer
We study the security of communication between a single transmitter and many receivers in
the presence of an eavesdropper for several special classes of broadcast channels. As the …
the presence of an eavesdropper for several special classes of broadcast channels. As the …
A secure communication game with a relay helping the eavesdropper
In this work, a four-terminal complex Gaussian network composed of a source, a destination,
an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) …
an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) …
[PDF][PDF] Secrecy capacity of a class of orthogonal relay eavesdropper channels
The secrecy capacity of relay channels with orthogonal components is studied in the
presence of an additional passive eavesdropper node. The relay and destination receive …
presence of an additional passive eavesdropper node. The relay and destination receive …
Secure degrees of freedom region of the two-user MISO broadcast channel with alternating CSIT
P Mukherjee, R Tandon… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The two user multiple-input single-output (MISO) broadcast channel with confidential
messages (BCCM) is studied, in which the nature of channel state information at the …
messages (BCCM) is studied, in which the nature of channel state information at the …