L Yin, H Haas - IEEE Journal on Selected Areas in …, 2017 - ieeexplore.ieee.org
… Moving from network informationtheory, recent works have evaluated the secrecy performance in multiuser wireless networks using mathematical tools from stochastic geometry [14], […
Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
… From the point of view of the informationtheory, the security … where a source sends the information to a legitimate receiver … the joint optimization of the physicallayersecurity and the end-…
TX Zheng, X Chen, C Wang, KK Wong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… in developing physicallayersecurity during the past decade, from the viewpoints of both informationtheory and signal processing. Early research on physicallayersecurity have been …
… This paper lays the groundwork for understanding the role of the direct link on the PHY layersecurity in the uplink of multi-user multi-relay networks, which stands as a major …
L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
… Physicallayersecurity techniques harness the intrinsic randomness at the physicallayer to create the “physical … In the next section, we will review the major physical-layersecurity …
… on both the theoretical and the practical aspects of physicallayersecurity. We first … information theoretic security are based on random codes. Achieving informationtheoreticalsecurity …
J Liu, A Ren, R Sun, X Du… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
… Physicallayer as the cornerstone of IoT, appears to be a promising direction for enhancing the security of IoT. As a consequence, we propose a novel chaotic physicallayersecurity …
HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
… In this paper, we investigate the physicallayersecurity of bidirectional (two-way) information transmission of two terminals with the help of multiple relay nodes in the presence of an …
M Di Renzo, M Debbahua - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
… of physicallayersecurity takes advantage of these characteristics for improving the security and … from common information,” IEEE Transactions on InformationTheory, vol. 39, no. 3, pp. …