Dialog codes for secure wireless communications
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Secrecy capacity of a class of broadcast channels with an eavesdropper
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
A Wireless Security Framework without Shared Secrets
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Channel scrambling for secrecy
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The secrecy capacity of the semi-deterministic broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The Gaussian many-to-one interference channel with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Secure communication with a Byzantine relay
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Wiretap channel with secure rate-limited feedback
IEEE Transactions on Information Theory
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Secret sharing over fast-fading MIMO wiretap channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
On the location of an eavesdropper in multiterminal networks
IEEE Transactions on Information Forensics and Security
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
Interference channels with strong secrecy
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
A new achievable ergodic secrecy rate region for the fading multiple access wiretap channel
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Secure relaying: can publicly transferred keys increase degrees of freedom?
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The two-way MIMO wire-tap channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
The Gaussian wiretap channel with noisy public feedback: breaking the high-SNR ceiling
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Secrecy rate optimization under cooperation with perfect channel state information
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Cooperation with an untrusted relay: a secrecy perspective
IEEE Transactions on Information Theory
Cooperative secret communication with artificial noise in symmetric interference channel
IEEE Communications Letters
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Common randomness and secret key capacities of two-way channels
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Leakage-probability-constrained secrecy capacity of a fading channel
Security and Communication Networks
A shared-secret free security infrastructure for wireless networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Message transmission and key establishment: conditions for equality of weak and strong capacities
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Hi-index | 755.20 |
The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two-way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users communicate with an intended receiver in the presence of an eavesdropper who receives their signals through another GMAC. In the GTW-WT, two users communicate with each other over a common Gaussian channel, with an eavesdropper listening through a GMAC. A secrecy measure that is suitable for this multiterminal environment is defined, and achievable secrecy rate regions are found for both channels. For both cases, the power allocations maximizing the achievable secrecy sum rate are determined. It is seen that the optimum policy may prevent some terminals from transmission in order to preserve the secrecy of the system. Inspired by this construct, a new scheme cooperative jamming is proposed, where users who are prevented from transmitting according to the secrecy sum rate maximizing power allocation policy ldquojamrdquo the eavesdropper, thereby helping the remaining users. This scheme is shown to increase the achievable secrecy sum rate. Overall, our results show that in multiple-access scenarios, users can help each other to collectively achieve positive secrecy rates. In other words, cooperation among users can be invaluable for achieving secrecy for the system.