Browsing by Keywords "Physical layer security"
Now showing items 1-12 of 12
-
Artificial-noise-aided secure transmission over finite-ınput ıntersymbol ınterference channels
(IEEE, 2018-06)We propose an artificial noise (AN) injection strategy for securing communication over finite-input intersymbol interference (lSI) channels. The technique relies on injection of colored noise whose power spectral density ... -
Joint precoder and artificial noise design for MIMO wiretap channels with finite-alphabet inputs based on the cut-off rate
(Institute of Electrical and Electronics Engineers Inc., 2017)We consider precoder and artificial noise (AN) design for multi-antenna wiretap channels under the finite-alphabet input assumption. We assume that the transmitter has access to the channel coefficients of the legitimate ... -
Low complexity precoding for MIMOME wiretap channels based on cut-off rate
(IEEE, 2016)We propose a low complexity transmit signal design scheme for achieving information-theoretic secrecy over a MIMO wiretap channel driven by finite-alphabet inputs. We assume that the transmitter has perfect channel state ... -
On secrecy rate analysis of spatial modulation and space shift keying
(IEEE, 2015)Spatial modulation (SM) and space shift keying (SSK) represent transmission methods for low-complexity implementation of multiple-input multiple-output (MIMO) wireless systems in which antenna indices are employed for data ... -
Optimal parameter encoding strategies for estimation theoretic secure communications
(Bilkent University, 2019-12)Physical layer security has gained a renewed interest with the advances in modern wireless communication technologies. In estimation theoretic security, secrecy levels are measured via estimation theoretic tools and ... -
An overview of physical layer security with finite-alphabet signaling
(Institute of Electrical and Electronics Engineers Inc., 2019)Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing ... -
Physical layer security for space shift keying transmission with precoding
(Institute of Electrical and Electronics Engineers Inc., 2016)We investigate the effect of transmitter side channel state information on the achievable secrecy rates of space shift keying. Through derivation of the gradient of the secrecy rate, we formulate an iterative algorithm to ... -
Physical layer security over frequency selective fading channels
(Bilkent University, 2016-01)The inherent open nature of the transmission medium makes security a challenging issue in wireless networks. Physical layer security, which is an alternative or a complement to the cryptographic approaches, exploits the ... -
Queue management for two-user cognitive radio with delay-constrained primary user
(Elsevier B.V., 2018)In this paper, two novel Queue Management Policies (QMP) are proposed for Quality of Service (QoS) enhancement of a two-user Cognitive Radio Network (CRN) comprising a Primary User (PU) and Secondary User (SU), the latter ... -
Randomized convolutional and concatenated codes for the wiretap channel
(Bilkent University, 2016-11)Wireless networks are vulnerable to various kinds of attacks such as eavesdropping because of their open nature. As a result, security is one of the most important challenges that needs to be addressed for such networks. ... -
Secrecy rates of finite-input intersymbol interference channels
(Bilkent University, 2016-11)Due to the broadcast nature of the communication medium, security is a critical problem in wireless networks. Securing the transmission at the physical layer is a promising alternative or complement to the conventional ... -
Secure multi-antenna transmission with finite-alphabet signaling
(Bilkent University, 2018-01)With the ever-growing demand for services that rely on transmission over wireless networks, a challenging issue is the security of the transmitted information. Due to its open nature, wireless communications is prone to ...