Yener et al., 2015 - Google Patents
Wireless physical-layer security: Lessons learned from information theoryYener et al., 2015
View PDF- Document ID
- 3210790738652992390
- Author
- Yener A
- Ulukus S
- Publication year
- Publication venue
- Proceedings of the IEEE
External Links
Snippet
Physical-layer security utilizes resources of the transmission medium to guarantee secure communication against an adversary with unlimited computational power. Rooted in information theory, physical-layer security advocates for a foundational approach by …
- 238000004891 communication 0 abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yener et al. | Wireless physical-layer security: Lessons learned from information theory | |
Xie et al. | Secure degrees of freedom of one-hop wireless networks | |
Aldaghri et al. | Physical layer secret key generation in static environments | |
Mukherjee et al. | Principles of physical layer security in multiuser wireless networks: A survey | |
He et al. | Two-hop secure communication using an untrusted relay: A case for cooperative jamming | |
Tang et al. | Interference assisted secret communication | |
Xie et al. | Secure degrees of freedom of $ K $-user Gaussian interference channels: A unified view | |
Tekin et al. | The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming | |
Wei et al. | Polar coding for the general wiretap channel with extensions to multiuser scenarios | |
Zafer et al. | Limitations of generating a secret key using wireless fading under active adversary | |
Wang et al. | Cooperative key agreement for wireless networking: Key rates and practical protocol design | |
El Gamal et al. | Achievable secrecy rate regions for the two-way wiretap channel | |
Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
Maji et al. | Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link | |
Cohen et al. | Wiretap channel with causal state information and secure rate-limited feedback | |
Xu et al. | A general framework of wiretap channel with helping interference and state information | |
Li et al. | Secrecy capacity region of a class of one-sided interference channel | |
Mamaghani et al. | Security and reliability performance analysis for two‐way wireless energy harvesting based untrusted relaying with cooperative jamming | |
Che et al. | Reliable, deniable and hidable communication: A quick survey | |
Xu et al. | Rate regions for multiple access channel with conference and secrecy constraints | |
Kittichokechai et al. | Secure source coding with action-dependent side information | |
He et al. | Cooperative jamming: The tale of friendly interference for secrecy | |
Chung et al. | On the capacity of overlay cognitive radios with partial cognition | |
Chen et al. | Adding a helper can totally remove the secrecy constraints in a two-user interference channel | |
Sheikholeslami et al. | Energy-efficient secrecy in wireless networks based on random jamming |