iCoding: Countermeasure against interference and eavesdropping in wireless communications

Z Li, Y Zhu, KG Shin - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, interference
management (IM) and security/privacy in data transmission have become critically important …

Constructive interference based secure precoding

MRA Khandaker, C Masouros… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Recent advances in interference exploitation showed that exploiting knowledge of
interference constructively can improve the receive signal-to-interference and noise ratio …

Interference recycling: Exploiting interfering signals to enhance data transmission

Z Li, J Chen, KG Shin, J Liu - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, the demand for higher
data rate and more concurrent transmissions has been continually increasing. Due to the …

Interference exploitation for secure communications: Error rate and secrecy analysis

A Salem, C Masouros - … on Personal, Indoor and Mobile Radio …, 2020 - ieeexplore.ieee.org
Interference exploitation has recently been shown to provide significant security benefits in
multiuser communication systems. In this technique, the known interference is designed to …

Rethinking secure precoding via interference exploitation: A smart eavesdropper perspective

Q Xu, P Ren, AL Swindlehurst - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Based on the concept of constructive interference (CI), multiuser interference (MUI) has
recently been shown to be beneficial for communication secrecy. A few CI-based secure …

On the secrecy capacity of 2-user Gaussian Z-interference channel with shared key

P Mohapatra - arXiv preprint arXiv:2105.08975, 2021 - arxiv.org
In this paper, the role of secret key with finite rate is studied to enhance the secrecy
performance of the system when users are operating in interference limited scenarios. To …

DeepIC: Coding for interference channels via deep learning

K Chahine, N Ye, H Kim - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
The two-user interference channel is a model for multi one-to-one communications, where
two transmitters wish to communicate with their corresponding receivers via a shared …

Secure retrospective interference alignment

M Seif, R Tandon, M Li - Entropy, 2019 - mdpi.com
In this paper, the K-user interference channel with secrecy constraints is considered with
delayed channel state information at transmitters (CSIT). We propose a novel secure …

[HTML][HTML] SCIM: Incorporating secure communication and interference management in one operation

Z Li, P Lyu, J Li, Z Chang, J Liu, Z Yan - Digital Communications and …, 2023 - Elsevier
Due to the broadcast nature of wireless communications, users' data transmitted wirelessly
is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum …

Energy-and cost-efficient physical layer security in the era of IoT: The role of interference

Z Wei, C Masouros, F Liu… - IEEE …, 2020 - ieeexplore.ieee.org
IoT is emerging as the future evolution of the Internet, aiming to provide connectivity for
everyone and everything. Since IoT is expected to carry important and private information, a …