Physical-Layer Security 2011
DOI: 10.1017/cbo9780511977985.004
|View full text |Cite
|
Sign up to set email alerts
|

Fundamentals of information theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…26 for MIMO Gaussian channels. The compound MIMO wiretap channel above with uncertainty sets [4] and [5] is not degraded and is one of the few examples for which the secrecy capacity has been established for the nondegraded case:…”
Section: [5]mentioning
confidence: 99%
See 1 more Smart Citation
“…26 for MIMO Gaussian channels. The compound MIMO wiretap channel above with uncertainty sets [4] and [5] is not degraded and is one of the few examples for which the secrecy capacity has been established for the nondegraded case:…”
Section: [5]mentioning
confidence: 99%
“…For the reasons noted above, wireless physical layer security has become a major research topic in recent years, and considerable progress has been made in understanding the fundamental ability of the physical layer to support secure communications and in determining the consequent limits of this ability (3,4). In particular, it has been shown that the two principal properties of radio transmission-namely, diffusion and superpositioncan be exploited to provide data confidentiality through several mechanisms that degrade the ability of potential eavesdroppers to gain information about confidential messages.…”
mentioning
confidence: 99%
“…The secrecy capacity of the Gaussian wiretap channel in the presence of eavesdroppers distributed according to a certain point process can be expressed as the difference between the capacity of the legitimate and the eavesdropper channel [44], [45]. Mathematically, the secrecy capacity C s is given by…”
Section: Probability Of Non-zero Secrecy Capacity Characterisationmentioning
confidence: 99%
“…Recently, the research on information-theoretic security has promised new opportunities to achieve high security with low processing costs -without requiring expensive cryptographic algorithms. For instance, secrecy coding [4] and intentional jamming [5] solutions have been proposed for controlling signal-to-noise ratio towards potential eavesdroppers without interfering legitimate transmissions. Further, radio access technologies, such as frequency hopping and interleaving, can be secured by keeping hopping sequences and scrambling keys confidential [6].…”
Section: Security In Wireless Communicationmentioning
confidence: 99%