Information-theoretical approaches can ensure security, regardless of the computational power of the attackers. Requirements for the application of this theory are: 1) assuring an advantage over the eavesdropper quality of reception and 2) knowing where the eavesdropper is. The traditional metrics are the secrecy capacity or outage, which are both related to the quality of the legitimate link against the eavesdropper link. Our goal is to define a new metric, which is the characteristic of the security of the surface/environment where the legitimate link is immersed, regardless of the position of the eavesdropping node. The contribution of this paper is twofold: 1) a general framework for the derivation of the secrecy capacity of a surface, ...
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, info...
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the c...
In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aid...
Information-theoretical approaches can ensure security, regardless of the computational power of the...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
In this letter, we present a novel and important performance metric for analyzing and evaluating the...
In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the...
In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the...
This letter presents a performance comparison of two popular secrecy enhancement techniques in wirel...
Motivated by information-theoretic secrecy, geometric models for secrecy in wireless networks have b...
International audienceIn this paper, the impact of network-state knowledge on the feasibility of sec...
peer reviewedPhysical layer security (PLS) has been proposed to afford an extra layer of security on...
An alternative or supplementary approach named as physical layer security has been proposed to affor...
An alternative or supplementary approach named as physical layer security has been proposed to affor...
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, info...
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the c...
In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aid...
Information-theoretical approaches can ensure security, regardless of the computational power of the...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
Theoretical studies on physical layer security often adopt the secrecy outage probability as the per...
In this letter, we present a novel and important performance metric for analyzing and evaluating the...
In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the...
In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the...
This letter presents a performance comparison of two popular secrecy enhancement techniques in wirel...
Motivated by information-theoretic secrecy, geometric models for secrecy in wireless networks have b...
International audienceIn this paper, the impact of network-state knowledge on the feasibility of sec...
peer reviewedPhysical layer security (PLS) has been proposed to afford an extra layer of security on...
An alternative or supplementary approach named as physical layer security has been proposed to affor...
An alternative or supplementary approach named as physical layer security has been proposed to affor...
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, info...
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the c...
In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aid...