[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yener et al., 2015 - Google Patents

Wireless physical-layer security: Lessons learned from information theory

Yener et al., 2015

View PDF
Document ID
3210790738652992390
Author
Yener A
Ulukus S
Publication year
Publication venue
Proceedings of the IEEE

External Links

Snippet

Physical-layer security utilizes resources of the transmission medium to guarantee secure communication against an adversary with unlimited computational power. Rooted in information theory, physical-layer security advocates for a foundational approach by …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; Arrangements for supplying electrical power along data transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION

Similar Documents

Publication Publication Date Title
Yener et al. Wireless physical-layer security: Lessons learned from information theory
Xie et al. Secure degrees of freedom of one-hop wireless networks
Aldaghri et al. Physical layer secret key generation in static environments
Mukherjee et al. Principles of physical layer security in multiuser wireless networks: A survey
He et al. Two-hop secure communication using an untrusted relay: A case for cooperative jamming
Tang et al. Interference assisted secret communication
Xie et al. Secure degrees of freedom of $ K $-user Gaussian interference channels: A unified view
Tekin et al. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
Wei et al. Polar coding for the general wiretap channel with extensions to multiuser scenarios
Zafer et al. Limitations of generating a secret key using wireless fading under active adversary
Wang et al. Cooperative key agreement for wireless networking: Key rates and practical protocol design
El Gamal et al. Achievable secrecy rate regions for the two-way wiretap channel
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Maji et al. Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link
Cohen et al. Wiretap channel with causal state information and secure rate-limited feedback
Xu et al. A general framework of wiretap channel with helping interference and state information
Li et al. Secrecy capacity region of a class of one-sided interference channel
Mamaghani et al. Security and reliability performance analysis for two‐way wireless energy harvesting based untrusted relaying with cooperative jamming
Che et al. Reliable, deniable and hidable communication: A quick survey
Xu et al. Rate regions for multiple access channel with conference and secrecy constraints
Kittichokechai et al. Secure source coding with action-dependent side information
He et al. Cooperative jamming: The tale of friendly interference for secrecy
Chung et al. On the capacity of overlay cognitive radios with partial cognition
Chen et al. Adding a helper can totally remove the secrecy constraints in a two-user interference channel
Sheikholeslami et al. Energy-efficient secrecy in wireless networks based on random jamming