To avoid or not to avoid CSI leakage in physical layer secret communication systems

TY Liu, PH Lin, SC Lin, YWP Hong… - IEEE …, 2015 - ieeexplore.ieee.org
… The ergodic secrecy rate is considered as the main performance criterion throughout this …
the channel estimation errors, we further discuss the trade-off between training and secret data …

Secrecy Analyses for Real Under Dual Correlated Nakagami- Fading Employing an Adaptive Encoder and a New Broadcasting Protocol

KN Le - IEEE Transactions on Vehicular Technology, 2018 - ieeexplore.ieee.org
… on the model’s secrecy performance under (i) a new channel fading environment, dual …
’s capacity estimated by the Source Cw, and the corresponding estimated secrecy capacity …

[引用][C] Secrecy Performance Analysis of a Cognitive Network for IoT over-Channels

J Li, H Zhao, M Johnson - Wireless Communications and Mobile Computing - Hindawi

Secrecy performance of full-duplex jamming and reception under I/Q imbalance

L Samara, R Hamila, N Al-Dhahir - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… analyze the secrecy performance from the perspective of node J. The secrecy performance
is … Moreover, we assume good estimates of the SI channel estimation with an error of −30 dB …

Physical layer secrecy and transmission resiliency of device-to-device communications

M Letafati, A Kuhestani, DWK Ng… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
channel state information (CSI), both the channel estimation (… , attacks both the channel
estimation procedure (leading to … secrecy rate (ESR) to characterize the secrecy performance of …

Control of wireless networks with secrecy

CE Koksal, O Ercetin, Y Sarikaya - IEEE/ACM Transactions on …, 2012 - ieeexplore.ieee.org
performance of the dynamic control algorithm with respect to several network parameters and
show that its performancechannel rates are not known perfectly, but estimated with some …

CSI-based versus RSS-based secret-key generation under correlated eavesdropping

F Rottenberg, TH Nguyen, JM Dricot… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… is symmetrical) samples the envelope of her channel estimate, the other parties do not lose
information by taking the envelopes of their own channel estimates. 4) We show that, in the …

Higher secrecy capacity by successive pilot contamination and jamming cancellation

A Ahmed, M Zia, N Bhatti, H Mahmood, HD Han - IEEE Access, 2022 - ieeexplore.ieee.org
… directed channel estimate is either noise or Eve’s channel He. We use channel estimate of
Eve … We provide insight on the impact of channel taps L on the performance of jamming data …

Transmit antenna selection for security enhancement in MIMO wiretap channels

N Yang, PL Yeoh, M Elkashlan… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
… antenna, rather than the channel estimates for all the antennas as in … channel is higher than
that of any eavesdropper’s channel. In this paper, we analyze the secrecy performance of the …

Secrecy Analysis of Uplink IM-OFDMA Systems in the Presence of IQ Imbalance

O Alaca, S Althunibat, S Yarkan… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
secrecy performance is conducted regarding IQI compensation based on a preamblebased
estimation … This section discusses the secrecy performance of IMOFDMA UL system in the …