A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishes to send a common message to two receivers in the presence of a malicious jammer. The jammer attempts to disrupt communication by transmitting a high power Gaussian signal, whereas the friendly eavesdropper 'hears' the jammer's transmission and sends an assisting signal to the destinations over an orthogonal channel in order to help them alleviate the jammer's impact. We derive an expression for capacity, i.e., the maximum data rate that can be reliably communicated from the transmitter to the receivers and we show that it is optimal for the friendly eavesdropper to send a Gaussian description of the jamming signal with the help of
International audienceThe communication scenario under consideration in this paper corresponds to a ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
We study the Gaussian MISO wiretap channel with a trans-mitter, a legitimate receiver, an eavesdropp...
abstract: The open nature of the wireless communication medium makes it inherently vulnerable to an ...
We investigate the fundamental limits on communication performance in wideband fading channels, in t...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
Abstract — In this work we consider the communication of information in the presence of a causal adv...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Gaussian wireless channels are studied under two forms of security attacks: (i) the jamming attack, ...
We consider key-less secure communication against a passive adversary, by allowing the legitimate re...
We derive the two-user capacity region with and without common information for a Gaussian broadcast ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
Abstract—We study broadcasting of two confidential messages to two groups of receivers over independ...
In this paper, the physical layer security of a multi-user jamming-assisted broadcast network in the...
International audienceThe communication scenario under consideration in this paper corresponds to a ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
We study the Gaussian MISO wiretap channel with a trans-mitter, a legitimate receiver, an eavesdropp...
abstract: The open nature of the wireless communication medium makes it inherently vulnerable to an ...
We investigate the fundamental limits on communication performance in wideband fading channels, in t...
In this paper, we consider the communication of information in the presence of a causal adversarial ...
Abstract — In this work we consider the communication of information in the presence of a causal adv...
We consider the problem of covert communication over a state-dependent channel, where the transmitte...
Gaussian wireless channels are studied under two forms of security attacks: (i) the jamming attack, ...
We consider key-less secure communication against a passive adversary, by allowing the legitimate re...
We derive the two-user capacity region with and without common information for a Gaussian broadcast ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
Abstract—We study broadcasting of two confidential messages to two groups of receivers over independ...
In this paper, the physical layer security of a multi-user jamming-assisted broadcast network in the...
International audienceThe communication scenario under consideration in this paper corresponds to a ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...