Strong Secrecy for Wireless Channels (Invited Talk)
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Distributed detection with censoring sensors under physical layer secrecy
IEEE Transactions on Signal Processing
Secrecy capacity of a class of broadcast channels with an eavesdropper
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secured communication over frequency-selective fading channels: a practical vandermonde precoding
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
A note on the secrecy capacity of the multiple-antenna wiretap channel
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
Physical layer security game: how to date a girl with her boyfriend on the same table
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Coalitional games for distributed eavesdroppers cooperation in wireless networks
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Secure communication in the low-SNR regime: a characterization of the energy-secrecy tradeoff
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Information secrecy from multiple eavesdroppers in orthogonal relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secret-key sharing based on layered broadcast coding over fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secure diversity-multiplexing tradeoffs in MIMO relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Physical layer security: coalitional games for distributed cooperation
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secret sharing over fast-fading MIMO wiretap channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Fading cognitive multiple-access channels with confidential messages
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
On physically secure and stable slotted ALOHA system
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Secure joint source-channel coding for quasi-static fading channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Randomization for security in half-duplex two-way Gaussian channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An approach to secure wireless communications using randomized eigenvector-based jamming signals
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secrecy rate optimization under cooperation with perfect channel state information
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
On multiuser secrecy rate in flat fading channel
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Active eavesdropping in fast fading channels
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Achieving secret communication for fast rayleigh fading channels
IEEE Transactions on Wireless Communications
Cooperative secret communication with artificial noise in symmetric interference channel
IEEE Communications Letters
Secure transmission with multiple antennas: part II: the MIMOME wiretap channel
IEEE Transactions on Information Theory
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Physical layer security game: interaction between source, eavesdropper, and friendly jammer
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Distributed Coalition Formation Games for Secure Wireless Transmission
Mobile Networks and Applications
EURASIP Journal on Wireless Communications and Networking
Achievable secrecy rates for wiretap OFDM with QAM constellations
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Hi-index | 755.32 |
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The broadcast channel from the source node to receivers 1 and 2 is corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The parallel BCC with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established, which gives the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity region is then established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the basic Gaussian BCC. The secrecy capacity results are then applied to study the fading BCC. The ergodic performance is first studied. The ergodic secrecy capacity region and the optimal power allocations that achieve the boundary of this region are derived. The outage performance is then studied, where a long-term power constraint is assumed. The power allocation is derived that minimizes the outage probability where either the target rate of the common message or the target rate of the confidential message is not achieved. The power allocation is also derived that minimizes the outage probability where the target rate of the confidential message is not achieved subject to the constraint that the target rate of the common message must be achieved for all channel states.