An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective
Spectrum scarcity has been a major concern for achieving the desired quality of experience
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …
Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …
are believed as supporting technologies for building a smart city. The advancement and …
Secure integrated sensing and communication
This work considers the problem of mitigating information leakage between communication
and sensing in systems jointly performing both operations. Specifically, a discrete …
and sensing in systems jointly performing both operations. Specifically, a discrete …
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component
The wiretap channel model of Wyner is one of the first communication models with both
reliability and security constraints. Capacity-achieving schemes for various models of the …
reliability and security constraints. Capacity-achieving schemes for various models of the …
Short blocklength wiretap channel codes via deep learning: Design and performance evaluation
V Rana, RA Chou - IEEE Transactions on Communications, 2023 - ieeexplore.ieee.org
We design short blocklength codes for the Gaussian wiretap channel under information-
theoretic security guarantees. Our approach consists in decoupling the reliability and …
theoretic security guarantees. Our approach consists in decoupling the reliability and …
Transmitter actions for secure integrated sensing and communication
This work models a secure integrated sensing and communication (ISAC) system as a
wiretap channel with action-dependent channel states and channel output feedback, eg …
wiretap channel with action-dependent channel states and channel output feedback, eg …
Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming
We consider strongly secure communication over a discrete memoryless multiple access
wiretap channel with two transmitters. No degradation or symmetry assumptions are made …
wiretap channel with two transmitters. No degradation or symmetry assumptions are made …