Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Covert communication over noisy channels: A resolvability perspective
MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
Hiding information in noise: Fundamental limits of covert wireless communication
Widely deployed encryption-based security prevents unauthorized decoding, but does not
ensure undetectability of communication. However, covert, or low probability of …
ensure undetectability of communication. However, covert, or low probability of …
On physical-layer concepts and metrics in secure signal transmission
Communication secrecy in the wireless systems has unique challenges due to broadcasting
nature of the radio waves, as compared to its wire-line counterpart. At the same time …
nature of the radio waves, as compared to its wire-line counterpart. At the same time …
Wireless physical layer security
Security in wireless networks has traditionally been considered to be an issue to be
addressed separately from the physical radio transmission aspects of wireless systems …
addressed separately from the physical radio transmission aspects of wireless systems …
Wireless physical-layer security: Lessons learned from information theory
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …
communication against an adversary with unlimited computational power. Rooted in …
Semantically secure lattice codes for the Gaussian wiretap channel
We propose a new scheme of wiretap lattice coding that achieves semantic security and
strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the …
strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the …
Effective secrecy: Reliability, confusion and stealth
A security measure called effective security is defined that includes strong secrecy and
stealth communication. Effective secrecy ensures that a message cannot be deciphered and …
stealth communication. Effective secrecy ensures that a message cannot be deciphered and …
Error-control coding for physical-layer secrecy
The renewed interest for physical-layer security techniques has put forward a new role for
error-control codes. In addition to ensuring reliability, carefully designed codes have been …
error-control codes. In addition to ensuring reliability, carefully designed codes have been …
Achievability proof via output statistics of random binning
This paper introduces a new and ubiquitous framework for establishing achievability results
in network information theory problems. The framework uses random binning arguments …
in network information theory problems. The framework uses random binning arguments …