A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… the needed channel advantage for secure communications. This notion is one that rejuvenated the field of information-theoretic security, or, physical-layersecurity. In the remainder of …
HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
… physicallayer, thereby allowing more traditional methods of data protection to be applied. … historical account of the use of informationtheory to characterize secrecy more generally and …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… security researches. Reference [160] discussed both physicallayer and upper layersecurity issues in cognitive radio networks by introducing security threats and their countermeasures…
… realise physicallayersecurity as well as a randomised hash function construction, for which we show theoretical … In this regime we use standard informationtheoretical terminology and …
… By utilizing physical-layersecurity, it is possible to design a decentralized … physicallayer security is to exploit the physical characteristics of the wireless channel to provide secure …
… that purely defines the fundamental limits of PLS measures from an informationtheory point of view. It was proposed by Claude Shannon in 1949 [34]. Shannon defined the channel …
… physicallayersecurity in multiuser wireless networks. The essential premise of physicallayer security … Readers interested in going beyond the treatment of physicallayersecurity offered …
… input constraints and designing secure transmission schemes under this … physicallayer security. With this motivation, this paper reviews recent developments on physicallayersecurity …
C Wang, HM Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
… -wide physicallayersecurity performance of the downlink transmission in an mmWave cellular network under a stochastic geometry framework. We first study the secure connectivity …