2022
DOI: 10.1109/twc.2022.3160051
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Covertness and Security in Broadcast Channels With Finite Blocklength

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 46 publications
0
15
0
Order By: Relevance
“…Super Eve: However, if some of those receivers are malicious, e.g., as internal attackers, they may collude with each others. Consider a worst case, where each Eve is able to share their received signal perfectly so that maximum-ratio combining (MRC) can be applied [19], [32]. Then, all N collusive Eves with channel gain of z e,n can be considered as a combined super Eve with channel gain z e,super = N n=1 z e,n .…”
Section: Special Cases: Multiple Evesmentioning
confidence: 99%
See 2 more Smart Citations
“…Super Eve: However, if some of those receivers are malicious, e.g., as internal attackers, they may collude with each others. Consider a worst case, where each Eve is able to share their received signal perfectly so that maximum-ratio combining (MRC) can be applied [19], [32]. Then, all N collusive Eves with channel gain of z e,n can be considered as a combined super Eve with channel gain z e,super = N n=1 z e,n .…”
Section: Special Cases: Multiple Evesmentioning
confidence: 99%
“…Adopting this bound, various performance metrics are proposed. For example, the authors in [19] employ the artificial noise technique to achieve both covertness and security. The secrecy transmission rate is applied directly as the metric to be maximized and an analytical approach to obtain the global optimum and an efficient approach to obtain the sub-optimum are proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the security of information transmission in uRLLC, many works have been studied to satisfy its strict requirements 11,28,32–34 . For example, Wang et al first designed practicable performance metrics to measure PLS and investigated the relationship among reliability, latency, and security 28 .…”
Section: Related Workmentioning
confidence: 99%
“…For the security of information transmission in uRLLC, many works have been studied to satisfy its strict requirements. 11,28,[32][33][34] For example, Wang et al first designed practicable performance metrics to measure PLS and investigated the relationship among reliability, latency, and security. 28 Then Yu et al designed two new performance metrics to measure PLS and discussed the role of UAV and cooperative communications in uRLLC scenarios.…”
Section: Related Workmentioning
confidence: 99%