Article
Physics, Multidisciplinary
Eduard Jorswieck, Pin-Hsun Lin, Karl-Ludwig Besser
Summary: This paper investigates the dependency structures in the fading channels of a wiretap system and shows that positive zero-outage secrecy rates (ZOSR) are achievable when the legitimate and eavesdropper channels are statistically dependent. The authors consider the system parameters and channel gains to characterize these dependency structures and propose a conjecture about achieving maximum ZOSR. They also solve the zero-outage secrecy capacity (ZOSC) for channels with finite alphabets and continuous channel gains. The results suggest that the legitimate link needs to have an advantage in terms of antennas and average channel gains to obtain positive ZOSR.
Article
Telecommunications
Saeid Pakravan, Ghosheh Abed Hodtani
Summary: Analyzing wireless communication performances using information-theoretic results is important in practice. This paper obtains achievable secrecy rate and outer bound on secrecy capacity for a discrete alphabet and memoryless wiretap channel with non-causal knowledge at the transmitter. Extending the results to a continuous alphabet wireless wiretap channel, the impact of side information on secrecy coverage region is analyzed, showing that side information increases the coverage region.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Computer Science, Theory & Methods
Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai
Summary: This paper presents a feedback scheme for Gaussian multi-user wiretap channels, showing its capacity and secrecy capacity achievements. The outer bounds on secrecy capacity regions are derived, and numerical results demonstrate the rate gains from feedback.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Computer Science, Theory & Methods
Farshad Rostami Ghadi, Ghosheh Abed Hodtani
Summary: This paper investigates the performance analysis of physical layer security in a Rayleigh fading wiretap channel with correlated channel coefficients using Copula theory. Closed-form expressions for key metrics are derived and the impact of channel correlation is evaluated in various scenarios. Results show that the effect of correlated fading on physical layer security performance can be beneficial or detrimental depending on the dependency structure between the main and eavesdropper channels.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Physics, Multidisciplinary
Daniel Harman, Karl Knapp, Tyler Sweat, Philip Lundrigan, Michael Rice, Willie Harrison
Summary: This study analyzes the potential for secure communication in a real-world scenario by using channel sounding measurements. The results show that secrecy capacity is highly affected by environmental changes.
Article
Computer Science, Information Systems
Nazmul Hassan Juel, A. S. M. Badrudduza, S. M. Riazul Islam, Sheikh Habibul Islam, Milton Kumar Kundu, Imran Shafique Ansari, Md. Munjure Mowla, Kyung-Sup Kwak
Summary: This paper investigates the secrecy performance of a mixed RF-FSO system, provides an analytical method for analyzing the secrecy performance of the mixed RF-FSO system, and validates the accuracy of the proposed model through numerical simulations.
Article
Telecommunications
A. S. M. Nafis, A. S. M. Badrudduza, Z. Borshon, M. K. Kundu, M. Z. Sarkar
Summary: This paper investigates the secrecy performance analysis of a multicast network over mixed fading scenarios, focusing on preventing malicious eavesdropping attacks by illegitimate receivers. By deriving probability density functions for single-input-multiple-output multicast scenarios and obtaining closed-form expressions for performance matrices, the study explores how antenna diversity and the number of users can improve secrecy levels. The best secure scenario is found when multicast channels experience Rician fading while eavesdropper channels undergo Rayleigh fading, with analytical expressions validated through Monte-Carlo simulations.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Ankit Dubey, Mark F. Flanagan
Summary: Node selection is a simple technique that enhances the physical layer security in wireless communication systems. We evaluate the closed-form expression for the ergodic secrecy rate (ESR) in the optimal source-destination pair selection scheme. We also compare the results for the sub-optimal source-destination pair selection scheme and demonstrate the effect of channel correlation on the ESR.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Physics, Multidisciplinary
Manos Athanasakos, George Karagiannidis
Summary: This paper introduces a technique based on polar coding for the primitive relay wiretap channel, allowing the relay to intelligently decide whether to cooperate or not for information-theoretic security.
Article
Computer Science, Information Systems
Ehsan Asadi Kangarshahi, Albert Guillen i Fabregas
Summary: A single-letter upper bound for the mismatched-decoding capacity of discrete memoryless channels was derived in the paper. It was shown that the error probability tends to one exponentially when the rate exceeds this upper bound, and that the multiletter version of the bound cannot be improved.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2021)
Article
Engineering, Electrical & Electronic
Karl-Ludwig Besser, Eduard A. Jorswieck
Summary: With future technologies, the amount of sensitive data transmitted wirelessly will increase, raising questions about secure data transmission. Information-theoretic security has gained increasing attention besides cryptography. This study investigates upper and lower bounds on secrecy outage probability for slowly-fading wiretap channels with arbitrary dependency structures, considering cases with and without channel state information at the transmitter and the legitimate receiver.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Telecommunications
Zhipeng Liu, Yinghui Ye, Xiaoli Chu, Haijian Sun
Summary: This letter proposes a tag selection strategy to optimize the ergodic secrecy capacity and the secrecy outage probability for a multi-tag self-powered BackCom network in the presence of an eavesdropper.
IEEE COMMUNICATIONS LETTERS
(2022)
Article
Physics, Multidisciplinary
Rongwo Xu, Leiming Sun, Jianhua Ji, Ke Wang, Yufeng Song
Summary: The paper discusses how to quantitatively evaluate the physical layer security in fiber-optic wiretap channels. The traditional metric, secrecy capacity, can only qualitatively evaluate the security and cannot quantify the security of imperfect systems. By analyzing the information leakage rate in an optical CDMA network using wiretap code, the physical layer security can be quantitatively evaluated.
Article
Computer Science, Information Systems
Anelia Somekh-Baruch
Summary: We introduce a new analysis technique to derive an upper bound on the mismatch capacity of a memoryless channel. Our bound is obtained by considering a multicast transmission over a broadcast channel and is tighter than previous results. Additionally, we detect equivalence classes of channel-metric pairs and prove the relationship with the matched capacity.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Chemistry, Analytical
Suneel Yadav, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee, Adao Silva
Summary: The study investigated the secrecy performance of a cognitive radio vehicular network, deriving exact expressions for secrecy outage probability and ergodic secrecy capacity over double-Rayleigh fading. It was shown that a full secrecy diversity of 1 can be achieved when the average channel gain of the main link approaches infinity. Additionally, the analysis revealed a scaling law for the ergodic secrecy capacity as a function of the average channel gains of the main and wiretap links. Numerical and simulation results confirmed the analytical findings.
Article
Computer Science, Information Systems
Jinho Choi
Summary: This article examines 2-step random access approaches with fast retrial in machine-type communication, deriving an analytical method to obtain the Quality-of-Service exponent for the distribution of queue length to meet QoS requirements in terms of access delay. Simulation results confirm the accuracy of the derived analytical approach in providing a good approximation of the QoS exponent.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Lin Bai, Jiexun Liu, Quan Yu, Jinho Choi, Wei Zhang
Summary: In this paper, a massive MIMO based grant-free random access scheme with resolution of preamble collision for massive access is proposed. Analytic expressions of success probability of the proposed collision resolution with conjugate beamforming (CB) and zero-forcing beamforming (ZFB) are derived, and simulation results verify the effectiveness of the proposed protocol.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jinho Choi
Summary: This paper explores grant-free random access with massive MIMO systems, finding that performance is mainly determined by the probability of preamble collision. A method to reduce preamble collision without increasing the number of preambles is proposed using superpositioned preambles, with analysis and simulation confirming increased success probability while maintaining the same spectral efficiency as conventional methods.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2021)
Article
Telecommunications
Jiaxing Wang, Rui Han, Lin Bai, Tao Zhang, Jianwei Liu, Jinho Choi
Summary: This article proposes a UAV-aided communication scheme to enhance the QoS of edge users and studies a machine learning based channel estimation scheme. The Max-SINR based beamforming compensation scheme successfully eliminates inter-BS interference.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2021)
Article
Engineering, Electrical & Electronic
Jie Ding, Daiming Qu, Pei Liu, Jinho Choi
Summary: This paper proposes a novel solution based on machine learning and mMIMO to address the preamble collision problem in GFRA, which effectively mitigates mutual interference among collided RA UEs by identifying and utilizing neighboring APs for data decoding. Simulation results demonstrate high performance in preamble multiplicity estimation and significant improvement in resolving preamble collisions in GFRA.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jinho Choi
Summary: The research shows that the 2-step CDMA-based random access approach outperforms the conventional 2-step approach with orthogonal channel allocations in improving spectral efficiency, allowing for increased performance of MTC by successfully transmitting more data packets per unit time. This is supported by simulation results.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jun-Bae Seo, Bang Chul Jung, Hu Jin, Jinho Choi
Summary: This paper investigates the stability region of hybrid uplink non-orthogonal multiple access (NOMA) in conjunction with non-cooperative game, examining the convexity of the stability region at the mixed-strategy Nash equilibrium (NE) and how it changes depending on the parameters of users' payoff.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Jinho Choi
Summary: This article explores the use of GPR and DAS for data collection in Internet-of-Things systems, demonstrating how active sensor selection and prediction feedback can improve data interpolation efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jinho Choi
Summary: This study investigates data-aided sensing for distributed detection in wireless sensor networks, proposing a node selection criterion based on J-divergence to ensure reliable decision-making with minimal decision delay. Simulation results confirm that the J-divergence based DAS can provide reliable decisions with fewer sensors compared to other approaches.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Information Systems
Seungnam Han, Yonggu Lee, Jinho Choi, Euiseok Hwang
Summary: This study proposes a lightweight physical layer aided authentication and key agreement (PL-AKA) protocol for IoT, aiming to reduce signaling overhead in core networks. Experimental results demonstrate a significant reduction in signaling overhead compared to traditional methods, indicating the potential for practical and efficient implementation in large-scale IoT networks.
Article
Chemistry, Analytical
Jihyun Choi, Luiggi Cantos, Jinho Choi, Yun Hee Kim
Summary: Intelligent reflecting surfaces (IRSs) have emerged as a promising solution for enhancing performance in 6G networks. This research focuses on optimizing the reflection pattern of an IRS to maximize the sum rate in an uplink NOMA network. The study proposes different optimization methods for IRSs of varying sizes.
Article
Computer Science, Information Systems
Jinho Choi, Jihong Park, Shiva Pokhrel
Summary: This paper proposes a resource allocation approach, called explore-before-talk (EBT), to improve the data rate of machine-type communication (MTC) by exploiting multichannel selection diversity. By optimizing the exploration-exploitation trade-off and utilizing multichannel selection diversity gain during data packet transmission, EBT achieves a higher mean data rate while satisfying the same outage constraint compared to a conventional MTC protocol without exploration.
JOURNAL OF COMMUNICATIONS AND NETWORKS
(2021)
Article
Computer Science, Information Systems
Jinho Choi
Summary: This study proposes a multichannel random access scheme based on NOMA to support different types of devices in IoT, and uses two-sided learning to improve the learning speed of DD devices. Simulation results demonstrate that two-sided learning can enhance the learning speed of DD devices and enable the proposed NOMA-based random access approach to achieve near maximum throughput.
Article
Computer Science, Information Systems
S. M. Abu Adnan Abir, Adnan Anwar, Jinho Choi, A. S. M. Kayes
Summary: The Internet of Things (IoT) is rapidly emerging and plays a crucial role in smart energy grid systems. The article discusses the improvements brought by IoT to energy systems, focusing on different IoT technologies and security vulnerabilities, as well as exploring the potential of advanced technologies in enhancing the effectiveness of smart energy systems.
Article
Engineering, Electrical & Electronic
Jinho Choi
Summary: This paper proposes a random access method with layered preambles (RALP) based on power-domain non-orthogonal multiple access (NOMA) to support devices with two different priorities. By deriving closed-form expressions for preamble detection performance, a certain performance guarantee is provided for devices with higher priority.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2021)