J Zhang, L Fu, X Wang - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental, and …
J Zhang, L Fu, X Wang - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental and …
The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today's …
This chapter provides a comprehensive state-of-the-art description of the emerging field of physical layer security. We will consider wireless security from an information theoretic view …
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper …
R Zhang, C Comaniciu, HV Poor - IEEE Communications …, 2016 - ieeexplore.ieee.org
A new approach to the characterization of network connectivity under transmission rate and secrecy constraints is proposed, based on a rate-secrecy graph model. The proposed model …
X Cao, J Zhang, L Fu, W Wu… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and …
Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Exchange of crucial and confidential information leads to the unprecedented attention on the security problem in wireless networks. Even though the security has been studied in a …
CE Koksal, O Ercetin, Y Sarikaya - IEEE/ACM Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks and incorporate information theoretic secrecy as a quality-of-service constraint …