2020
DOI: 10.1109/twc.2020.2973083
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security in the Finite Blocklength Regime Over Fading Channels

Abstract: This paper studies physical-layer secure transmissions from a transmitter to a legitimate receiver against an eavesdropper over slow fading channels, taking into account the impact of finite blocklength secrecy coding. A comprehensive analysis and optimization framework is established to investigate secrecy throughput for both single-and multiantenna transmitter scenarios. Both adaptive and non-adaptive design schemes are devised, in which the secrecy throughput is maximized by exploiting the instantaneous and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 39 publications
0
10
0
Order By: Relevance
“…1 In this work, it is assumed that the jamming signals are able to behave as a Gaussian pseudo-random sequence or utilize deterministic waveforms similar to the structure of the desired signal as in [22], [23], [24]. Then, all the jamming signals are known to the legitimate receivers and the transmitter, which means that the jamming signals do not affect the receiving quality of the legitimate users.…”
Section: Organizationmentioning
confidence: 99%
“…1 In this work, it is assumed that the jamming signals are able to behave as a Gaussian pseudo-random sequence or utilize deterministic waveforms similar to the structure of the desired signal as in [22], [23], [24]. Then, all the jamming signals are known to the legitimate receivers and the transmitter, which means that the jamming signals do not affect the receiving quality of the legitimate users.…”
Section: Organizationmentioning
confidence: 99%
“…where ρ S = P S σ 2 and σ 2 signifies the noise power. 1 In this work, it is assumed that the jamming signals is able to be a Gaussian pseudo-random sequence, or utilizes deterministic waveforms similar to the structure of the desired signal as [20], [21], [22]. Then all the jamming signals are known for the legitimate receivers and the transmitter, which means that the jamming signals do not affect the receiving quality of the legitimate users.…”
Section: System Modelmentioning
confidence: 99%
“…In this work, the AN impact on the system performance was analyzed and also the optimal blocklength that maximizes the secrecy throughput was found. The impact of finite blocklength secrecy coding on the design of secure transmission in a wiretap channel was explored in [15]. Specifically, an optimization problem was defined, which aimed at maximizing the secrecy throughput considering various blocklengths, code rates, and transmission policies.…”
Section: A Related Work and Motivationsmentioning
confidence: 99%