Wireless physical layer security
Security in wireless networks has traditionally been considered to be an issue to be
addressed separately from the physical radio transmission aspects of wireless systems …
addressed separately from the physical radio transmission aspects of wireless systems …
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of
a transmitter and a receiver with two antennas each, and an eavesdropper with a single …
a transmitter and a receiver with two antennas each, and an eavesdropper with a single …
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver
wiretap channel in which a transmitter wants to have confidential communication with an …
wiretap channel in which a transmitter wants to have confidential communication with an …
Interference assisted secret communication
Wireless communication is susceptible to eavesdrop** attacks because of its broadcast
nature. This paper illustrates how interference can be used to counter eavesdrop** and …
nature. This paper illustrates how interference can be used to counter eavesdrop** and …
Secrecy in cooperative relay broadcast channels
E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We investigate the effects of user cooperation on the secrecy of broadcast channels by
considering a cooperative relay broadcast channel. We show that user cooperation can …
considering a cooperative relay broadcast channel. We show that user cooperation can …
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
The focus of this paper is an information-theoretic study of retransmission protocols for
reliable packet communication under a secrecy constraint. The h ybrid a utomatic r …
reliable packet communication under a secrecy constraint. The h ybrid a utomatic r …
[PDF][PDF] Secrecy capacity of a class of broadcast channels with an eavesdropper
E Ekrem, S Ulukus - EURASIP Journal on Wireless Communications and …, 2009 - Springer
We study the security of communication between a single transmitter and many receivers in
the presence of an eavesdropper for several special classes of broadcast channels. As the …
the presence of an eavesdropper for several special classes of broadcast channels. As the …
Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
In this paper, we consider a two-way relay network with two sources and multiple
cooperative relays in the presence of an eavesdropper. To guarantee the secrecy, a null …
cooperative relays in the presence of an eavesdropper. To guarantee the secrecy, a null …
The Gaussian wiretap channel with a hel** interferer
Due to the broadcast nature of the wireless medium, wireless communication is susceptible
to adversarial eavesdrop**. This paper describes how eavesdrop** can potentially be …
to adversarial eavesdrop**. This paper describes how eavesdrop** can potentially be …
Multiple access wiretap channels with strong secrecy
The problem of secure communication over Multiple-Access Wiretap channel (MAC-WTC)
under strong secrecy criterion is investigated. A new technique based on channel output …
under strong secrecy criterion is investigated. A new technique based on channel output …