The secure transmission of information over wireless systems in the presence of an eavesdropper has attracted much attention. In this paper, we consider the case that full CSI of the legitimate user but only the average channel gain of the eavesdropper is known at the transmitter. In such setting, some information will be inevitably leaked to the eavesdropper from the information-theoretic view and this was not quantitatively evaluated before. A secrecy transmission framework with leakage threshold is thereby proposed. The secrecy capacity satisfying this leakage probability constraints is derived along with an optimal power allocation strategy. For Rayleigh and Nakagami-m fading channels, numerical results indicate that our framework can w...
Since a wireless transmission requires to access to a shared medium, the communication is susceptibl...
Abstract This paper investigates the impact of realistic propagation conditions on the achievable s...
The optimal power allocation for block fading (BF) networks with confidential messages is investigat...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
This paper considers the information theoretic secrecy rates that are achievable by an orthogonal fr...
Information security has been a very important issue in wireless networks. With the ever-increasing ...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
The security in wireless communication networks is an important issue due to the mobility of users a...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Since a wireless transmission requires to access to a shared medium, the communication is susceptibl...
Abstract This paper investigates the impact of realistic propagation conditions on the achievable s...
The optimal power allocation for block fading (BF) networks with confidential messages is investigat...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
This paper considers the information theoretic secrecy rates that are achievable by an orthogonal fr...
Information security has been a very important issue in wireless networks. With the ever-increasing ...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
The security in wireless communication networks is an important issue due to the mobility of users a...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Since a wireless transmission requires to access to a shared medium, the communication is susceptibl...
Abstract This paper investigates the impact of realistic propagation conditions on the achievable s...
The optimal power allocation for block fading (BF) networks with confidential messages is investigat...