Two-user Gaussian broadcast wiretap channel with common message and feedback: Revisit

H Yuan, Y Feng, C Yang, Z Zhuang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The two-user Gaussian broadcast wiretap channel with common message and feedback
(GBC-WTC-CM-F) is revisited. Traditionally, achievable secrecy rate of this model is …

Performance analysis of the wiretap channel with a friendly jammer under finite blocklength

U Somalatha, P Mohapatra… - 2022 IEEE Globecom …, 2022 - ieeexplore.ieee.org
In many real-time applications, timely delivery of data is essential along with guarantees of
reliability and secrecy. To address this problem, this work considers a Rayleigh fading …

Теоретико-информационное представление виртуализации сетевого канала перехвата

АД Синюк, ОА Остроумов, АА Тарасов - Информатика и …, 2023 - mathnet.ru
Сложнейшей задачей защищенных телекоммуникационных систем, использующих
симметричное шифрование, в связи с необходимостью предварительной и …

Performance analysis of a MIMO system with bursty traffic in the presence of energy harvesting jammer

S Allipuram, P Mohapatra, N Pappas… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper explores the role of multiple antennas in mitigating jamming attacks for the
Rayleigh fading environment with exogenous random traffic arrival. The jammer is assumed …

Physical‐Layer Secrecy for Ultrareliable Low‐Latency Communication

P Mohapatra, N Pappas - Physical‐Layer Security for 6G, 2024 - Wiley Online Library
In many real‐time applications, timely data delivery and guarantees of reliability and secrecy
are essential. In 5G and future wireless communication technology, it is required to support …

Deep Reinforcement Learning for Power Control in Secure Broadcast Channels

A Arvanitaki, G Stamatakis, N Carlsson… - … on Modeling and …, 2023 - ieeexplore.ieee.org
In this work, we investigate the dynamic power management problem in a two-user secure
broadcast channel scenario where the information at the source is kept in two separate …

The Impact of Secrecy on Stable Throughput and Delay

P Mohapatra, N Pappas - Physical‐Layer Security for 6G, 2024 - Wiley Online Library
With the emergence of 5G technology, there has been increased interest in exploring the
impact of secrecy on throughput and latency. Many forthcoming applications necessitate …

Delay performance of a two-user broadcast channel with security constraints

A Arvanitaki, N Pappas, P Mohapatra, N Carlsson - SN Computer Science, 2020 - Springer
In this paper, we consider the two-user broadcast channel with security constraints. We
assume that a source broadcasts packets to two receivers, and that one of them has secrecy …

Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints

G Smpokos, Z Chen, P Mohapatra, N Pappas - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we analyze the impact of caching on the performance of a cache enabled
system with heterogeneous traffic where one of the users need to be served with confidential …

Wireless caching helper system with heterogeneous traffic and secrecy constraints

G Smpokos, N Pappas, Z Chen… - 2019 IEEE 20th …, 2019 - ieeexplore.ieee.org
In this paper, we investigate and analyze the performance of a wireless system with caching
capabilities while imposing secrecy constraints at one of the users. A dedicated user with …