Skip to main content

Wireless Physical Layer Security

  1. Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero informati...

    Authors: Zhu Han, Ninoslav Marina, Mérouane Debbah and Are Hjørungnes
    Citation: EURASIP Journal on Wireless Communications and Networking 2010 2009:452907
  2. Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also ma...

    Authors: Tan F. Wong, Matthieu Bloch and John M. Shea
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:506973
  3. We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communi...

    Authors: Xiang He and Aylin Yener
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:305146
  4. This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No mat...

    Authors: Yingbin Liang, Gerhard Kramer, H. Vincent Poor and Shlomo Shamai (Shitz)
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:142374
  5. A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and jo...

    Authors: Gill R. Tsouri and Dov Wulich
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:437824
  6. Recent research reveals that information security and information-hiding capabilities can be enhanced by proper exploitation of space-time techniques. Meanwhile, intrinsic properties of ultra-wideband (UWB) si...

    Authors: Yanbing Zhang and Huaiyu Dai
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:571903
  7. We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels. As the first model, we consider the ...

    Authors: Ersen Ekrem and Sennur Ulukus
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:824235
  8. We study the frequency-selective broadcast channel with confidential messages (BCC) where the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a ...

    Authors: Mari Kobayashi, Mérouane Debbah and Shlomo Shamai (Shitz)
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:386547
  9. This paper provides a closed-form expression for the secrecy capacity of the multiple-input multiple output (MIMO) Gaussian wiretap channel, under a power-covariance constraint. Furthermore, the paper specifie...

    Authors: Ronit Bustin, Ruoheng Liu, H. Vincent Poor and Shlomo Shamai (Shitz)
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:370970
  10. The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogo...

    Authors: Vaneet Aggarwal, Lalitha Sankar, A. Robert Calderbank and H. Vincent Poor
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2009:494696