Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Secured communication over frequency-selective fading channels: a practical vandermonde precoding
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Authentication over noisy channels
IEEE Transactions on Information Theory
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
Physical layer security game: how to date a girl with her boyfriend on the same table
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Coalitional games for distributed eavesdroppers cooperation in wireless networks
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
On the delay limited secrecy capacity of fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secret-key sharing based on layered broadcast coding over fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On the compound MIMO broadcast channels with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Physical layer security: coalitional games for distributed cooperation
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secret sharing over fast-fading MIMO wiretap channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
On the location of an eavesdropper in multiterminal networks
IEEE Transactions on Information Forensics and Security
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
An approach to secure wireless communications using randomized eigenvector-based jamming signals
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure communication over MISO cognitive radio channels
IEEE Transactions on Wireless Communications
Joint power and secret key queue management for delay limited secure communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure transmission with multiple antennas I: the MISOME wiretap channel
IEEE Transactions on Information Theory
On multiuser secrecy rate in flat fading channel
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Active eavesdropping in fast fading channels
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Achieving secret communication for fast rayleigh fading channels
IEEE Transactions on Wireless Communications
Secure transmission with multiple antennas: part II: the MIMOME wiretap channel
IEEE Transactions on Information Theory
Training sequence design for discriminatory channel estimation in wireless MIMO systems
IEEE Transactions on Signal Processing
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Physical layer security game: interaction between source, eavesdropper, and friendly jammer
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Distributed Coalition Formation Games for Secure Wireless Transmission
Mobile Networks and Applications
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Achievable secrecy rates for wiretap OFDM with QAM constellations
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Leakage-probability-constrained secrecy capacity of a fading channel
Security and Communication Networks
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Wireless Personal Communications: An International Journal
Hi-index | 755.20 |
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.