[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hu et al., 2019 - Google Patents

Covert transmission with a self-sustained relay

Hu et al., 2019

View PDF
Document ID
16208218748360294834
Author
Hu J
Yan S
Shu F
Wang J
Publication year
Publication venue
IEEE Transactions on Wireless Communications

External Links

Snippet

This paper examines the possibility, performance limits, and associated costs for a self- sustained relay to transmit its own covert information to a destination on top of forwarding the source's information. Since the source provides energy to the relay for forwarding its …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/022Site diversity; Macro-diversity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; Arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission

Similar Documents

Publication Publication Date Title
Hu et al. Covert transmission with a self-sustained relay
Hu et al. Covert communication achieved by a greedy relay in wireless networks
Cumanan et al. Physical layer security jamming: Theoretical limits and practical designs in wireless networks
Zhu et al. On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping
Hu et al. Covert communications without channel state information at receiver in IoT systems
Yan et al. Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems
Guo et al. Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks
Hu et al. Covert communication in wireless relay networks
Tao et al. Achieving covert communication in uplink NOMA systems via energy harvesting jammer
Shi et al. Hybrid cache placement for physical-layer security in cooperative networks
Yu et al. Jammer-aided secure communications for cooperative NOMA systems
Bi et al. Accumulate then transmit: Toward secure wireless powered communication networks
Ssettumba et al. Physical layer security enhancement for Internet of Things in the presence of co-channel interference and multiple eavesdroppers
Xu et al. Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks
Wang et al. Secure wireless powered cooperative communication networks with finite energy storage
Bai et al. On covert communication performance with outdated CSI in wireless greedy relay systems
Wu et al. Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks
Xu et al. Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks
Jiang et al. Security‐reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications
Chen et al. Covert Communication in Two-Hop Cooperative Cognitive Radio System
Liu et al. Joint decode-and-forward and jamming for wireless physical layer security with destination assistance
Wang et al. Probabilistic accumulate-then-transmit in wireless-powered covert communications
Jameel et al. Intercept probability analysis of wireless powered relay system in kappa-mu fading
Liu et al. Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection
Huang et al. Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection