Article
Computer Science, Information Systems
Weiwei Xu, Heng Zhang, Xianghui Cao, Ruilong Deng, Hongran Li, Jian Zhang
Summary: Investigated how to improve the security of wireless communication when UAVs are used as a wireless relay. Proposed an optimization problem and an iterative algorithm to maximize the average secrecy rate.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Asmaa Hamyani, Faissal El Bouanani, Youssef Miftah
Summary: This paper investigates the physical layer security of a multi-user jamming-assisted broadcast network in the presence of multiple eavesdroppers. Tight approximate and asymptotic expressions are derived to evaluate the system’s security, which reveals the most influential parameter on the system’s security and provides useful insights into the system’s secrecy.
Article
Computer Science, Hardware & Architecture
Zhangnan Wang, Yichen Wang
Summary: This paper analyzes how an intelligent malicious user adjusts attacking strategy to improve eavesdropping performance in wireless communication. Using a Stackelberg game model, the paper examines two equilibriums under different strategy spaces. Simulation results show that the proposed scheme can effectively defend against intelligent active eavesdroppers.
MOBILE NETWORKS & APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Wei Duan, Yancheng Ji, Jia Hou, Biting Zhuo, Miaowen Wen, Guoan Zhang
Summary: This article investigates a cooperative full-duplex device-to-device system with NOMA and P-DF, where the base station simultaneously transmits signals to all receiving nodes. Different scenarios are considered based on the locations of the users, with and without eavesdroppers. Different relay forwarding strategies are studied to improve symbol transmission efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Liang Zhou, Amita Nandal, Imran Shafique Ansari, Kemal Polat, Ladislav Polak, Arvind Dhaka, Jialing Zha, Adi Alhudhaif, Fayadh Alenezi
Summary: This paper calculates the optimum secrecy probability using a reduction function that optimizes the transfer rate of the user's signal and minimizes the transfer rate of the eavesdropper's signal for safe transmission. The approximated signal-to-noise ratios (SNRs) are accurately estimated using matrix theory and studied in relation to the outage probability. The precise secrecy outage probability is determined by making assumptions about channel correlation and investigating the secrecy performance of different diversity combining strategies.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Maymoona Hayajneh, T. Aaron Gulliver
Summary: This paper explores secure two-way relay communications by using an energy harvesting relay and a friendly jammer to reduce information leakage to eavesdroppers. The joint optimization of power splitting factor and transmit power is conducted to maximize the secrecy capacity. The positions of the relay, jammer, and eavesdropper are found to have an impact on the system's performance, with the secrecy capacity being higher when the relay is equidistant from the users and the jammer is closer to the eavesdropper.
Article
Engineering, Electrical & Electronic
Sunghyun Kim, Soheil Mohajer, Changho Suh
Summary: This study explores the potential of using a heterogeneous scenario for K-user parallel packet-erasure broadcast channels, where subchannels are categorized based on different outage probabilities. By applying coding across subchannels, the system can achieve optimality and significantly improve performance over existing schemes, especially when compared to per-subchannel extensions of state-of-the-art K-user schemes.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Liqiang Han, Yawei Wang, Xuemei Liu, Boyu Li
Summary: This study focuses on the secrecy performance of a free-space optical communication system over Fisher-Snedecor F-distribution turbulence fading channel. It analyzes the average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity with the influence of pointing error, atmospheric turbulence, and different detection techniques, providing exact closed-form expressions using Meijer's G-function. Monte Carlo simulations are used for validation.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Information Systems
Sidney J. Golstein, Francois Rottenberg, Francois Horlin, Philippe De Doncker, Julien Sarrazin
Summary: This study proposes a method for achieving physical layer security in SISO systems using OFDM and AN injection. By exploiting the frequency diversity in multipath channels, the secrecy of communication with a legitimate user is guaranteed. The study considers the handshake procedure between Alice and Bob, and provides mathematical expressions for the required signal-to-noise ratio and maximum CSI error in the presence of imperfect CSI.
Article
Telecommunications
Saif Ahmad, Mohd Javed Khan
Summary: This paper investigates the secrecy performance of a cooperative NOMA system with an untrusted user using a half-duplex amplify-and-forward relay. The performance is evaluated in terms of ergodic secrecy capacity (ESC) over Rayleigh fading environments. The results show that the cooperative NOMA system outperforms the cooperative orthogonal multiple access system in terms of ESC.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Woong Son, Hyunwoo Nam, Won-Yong Shin, Bang Chul Jung
Summary: This study investigates the secrecy outage probability of a downlink wiretap network and analyzes a closed-form expression of the SOP under an opportunistic feedback strategy. The results demonstrate that the SOP of the opportunistic feedback strategy approaches that of the full feedback strategy as the number of legitimate mobile stations increases. It is noteworthy that the SOP in a practical wiretap network setting with multiple potential eavesdroppers is mathematically characterized for the first time.
IEEE SYSTEMS JOURNAL
(2021)
Article
Chemistry, Analytical
Masoud Kaveh, Farshad Rostami Ghadi, Riku Jaentti, Zheng Yan
Summary: This paper investigates the impact of side information on the secrecy performance of backscatter communication systems. Analytical expressions are derived and validated through Monte Carlo simulations, showing that considering additional knowledge at the transmitter improves system performance and ensures reliable communication.
Article
Physics, Multidisciplinary
Maymoona Hayajneh, Thomas Aaron Gulliver
Summary: This paper investigates the security of two-way relay communications in the presence of a passive eavesdropper. The relay amplifies and forwards the received signals by relying solely on energy harvesting. The relay employs time switching to harvest energy and obtain user information, while a friendly jammer hinders the eavesdropping. The secrecy capacity is maximized using geometric programming, and the impact of imperfect channel state information at the eavesdropper is determined.
Article
Engineering, Electrical & Electronic
Maha Zohdy, Ali Tajer, Shlomo Shamai
Summary: The article focuses on the two-user interference channel and proposes a broadcast approach to interference management, where transmitters adapt their message into multiple encoded layers to accommodate different possible channel states without the need for instantaneous channel state information. Each receiver can opportunistically decode a subset of both transmitters' received layers based on the relative gain between direct and interfering channels, leading to the delineation of an average achievable rate region and the establishment of an upper bound on the gap between achievable sum-rate and sum-rate capacity.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2021)
Article
Telecommunications
Yuhang Yao, Syed A. Jafar
Summary: This article discusses the problem of linear computation broadcast (LCBC) setting, where data is stored at a server and users retrieve their desired linear functions using prior side-information. The capacity of LCBC and the exact capacity of 2-user LCBC with partially informed server are found.
IEEE COMMUNICATIONS LETTERS
(2022)