Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Forouzesh, Moslem"'
In this paper, we investigate joint information-theoretic security and covert communication on a network in the presence of a single transmitter (Alice), a friendly jammer, a single untrusted user, two legitimate users, and a single warden of the cha
Externí odkaz:
http://arxiv.org/abs/2107.00210
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrus
Externí odkaz:
http://arxiv.org/abs/2007.05502
Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate
Externí odkaz:
http://arxiv.org/abs/1907.01350
In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot
Externí odkaz:
http://arxiv.org/abs/1907.01334
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a t
Externí odkaz:
http://arxiv.org/abs/1901.04914
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power i
Externí odkaz:
http://arxiv.org/abs/1812.10312
In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks. Our considered system model consists of one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to
Externí odkaz:
http://arxiv.org/abs/1809.00312
In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the networ
Externí odkaz:
http://arxiv.org/abs/1806.02013
Information-theoretic secrecy, in particular the wiretap channel formulation, provides protection against interception of a message by adversary Eve and has been widely studied in the last two decades. In contrast, covert communications under an anal
Externí odkaz:
http://arxiv.org/abs/1803.06608
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.