Skip to content

Advertisement

Wireless Physical Layer Security

  1. Content type: Research Article

    Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero informati...

    Authors: Zhu Han, Ninoslav Marina, Mérouane Debbah and Are Hjørungnes

    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:452907

    Published on:

  2. Content type: Research Article

    Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also ma...

    Authors: Tan F. Wong, Matthieu Bloch and John M. Shea

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:506973

    Published on:

  3. Content type: Research Article

    We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communi...

    Authors: Xiang He and Aylin Yener

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:305146

    Published on:

  4. Content type: Research Article

    This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No mat...

    Authors: Yingbin Liang, Gerhard Kramer, H. Vincent Poor and Shlomo Shamai (Shitz)

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:142374

    Published on:

  5. Content type: Research Article

    A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and jo...

    Authors: Gill R. Tsouri and Dov Wulich

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:437824

    Published on:

  6. Content type: Research Article

    Recent research reveals that information security and information-hiding capabilities can be enhanced by proper exploitation of space-time techniques. Meanwhile, intrinsic properties of ultra-wideband (UWB) si...

    Authors: Yanbing Zhang and Huaiyu Dai

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:571903

    Published on:

  7. Content type: Research Article

    We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels. As the first model, we consider the ...

    Authors: Ersen Ekrem and Sennur Ulukus

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:824235

    Published on:

  8. Content type: Research Article

    We study the frequency-selective broadcast channel with confidential messages (BCC) where the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a ...

    Authors: Mari Kobayashi, Mérouane Debbah and Shlomo Shamai (Shitz)

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:386547

    Published on:

  9. Content type: Research Article

    This paper provides a closed-form expression for the secrecy capacity of the multiple-input multiple output (MIMO) Gaussian wiretap channel, under a power-covariance constraint. Furthermore, the paper specifie...

    Authors: Ronit Bustin, Ruoheng Liu, H. Vincent Poor and Shlomo Shamai (Shitz)

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:370970

    Published on:

  10. Content type: Research Article

    The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogo...

    Authors: Vaneet Aggarwal, Lalitha Sankar, A. Robert Calderbank and H. Vincent Poor

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:494696

    Published on: