Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Physical layer security game: how to date a girl with her boyfriend on the same table
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Secure communication in the low-SNR regime: a characterization of the energy-secrecy tradeoff
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Wireless physical-layer security: the case of colluding eavesdroppers
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secure diversity-multiplexing tradeoffs in MIMO relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
A real orthogonal space-time coded UWB scheme for wireless secure communications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
A Novel Approach for Physical Layer Cryptography in Wireless Networks
Wireless Personal Communications: An International Journal
A note on information-theoretic secret key exchange over wireless channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Secure joint source-channel coding for quasi-static fading channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A novel framework for message authentication in vehicular communication networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure physical layer key generation schemes: performance and information theoretic limits
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Design and implementation of physical layer private key setting for wireless networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
Training sequence design for discriminatory channel estimation in wireless MIMO systems
IEEE Transactions on Signal Processing
Physical layer security game: interaction between source, eavesdropper, and friendly jammer
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Physical Layer Cryptography and Cognitive Networks
Wireless Personal Communications: An International Journal
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Hi-index | 754.90 |
Network security is important for information protection in open, secure, or covert communications. One such requirement is to achieve high-rate communications between clients, e.g., terminals or sensors, in the network while hiding information about the transmitted symbols, signal activity, or other sensitive data from an unintended receiver, e.g., an eavesdropper. For wireless links, the single-user capacity advantages of deployment of multiple antennas at the transmitter is well known. One of the principal conclusions of this paper is that proper exploitation of space-time diversity at the transmitter can also enhance information security and information-hiding capabilities. In particular, we show that significant gains are achievable when the transmitter and the client receiver are both informed about their channel while the transmitter and eavesdropper receiver are uniformed about their channel. More generally, we compare capacity limits for both informed and uninformed transmitter and informed receiver scenarios subject to low probability of intercept (LPI) and low probability of detection (LPD) constraints. For several general cases, we can characterize the LPI- and LPD-optimal transmitted source distributions and compare them to the standard optimal source distribution satisfying a power constraint. We assume the standard quasi-static flat Rayleigh-fading channel model for the transmitter-receiver pairs. This paper is a step toward answering the fundamental question: what are the qualitative and quantitative differences between the information-carrying capabilities of open space-time channels versus secure space-time channels?