The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today’s communications. A promising direction towards achieving secure communications is information theoretic secrecy, which is an approach exploiting the randomness of the channels to ensure secrecy. Based on this approach, there has been a recent surge of interest in a potential cooperation between users to enhance the secrecy of communications. In this thesis we investigate the interaction between cooperation and secrecy. In particular the contributions of the thesis can be divided into two parts. In the first part, we study cooperative strategies for secrecy for wirele...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
With the rapid development of wireless communications, security becomes extremely important. In man...
International audiencePhysical layer security aspects of wireless networks have re- cently attracted...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
With the considerable growth of wireless networks in recent years, the issue of network security has...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
Abstract — Cooperation between wireless network nodes is a promising technique for improving the phy...
In cooperative communication, a source communicates with a destination over indirect links through r...
The study of the physical layer has offered a new perspective to the problem of communication securi...
Abstract Cooperation among wireless nodes has been recently proposed for improving the physical laye...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
The security in wireless communication networks is an important issue due to the mobility of users a...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
International audienceCooperation between wireless network nodes is a promising technique for improv...
The usage of wireless communication has increased over the past few years. Most wired communications...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
With the rapid development of wireless communications, security becomes extremely important. In man...
International audiencePhysical layer security aspects of wireless networks have re- cently attracted...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
With the considerable growth of wireless networks in recent years, the issue of network security has...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
Abstract — Cooperation between wireless network nodes is a promising technique for improving the phy...
In cooperative communication, a source communicates with a destination over indirect links through r...
The study of the physical layer has offered a new perspective to the problem of communication securi...
Abstract Cooperation among wireless nodes has been recently proposed for improving the physical laye...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
The security in wireless communication networks is an important issue due to the mobility of users a...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
International audienceCooperation between wireless network nodes is a promising technique for improv...
The usage of wireless communication has increased over the past few years. Most wired communications...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
With the rapid development of wireless communications, security becomes extremely important. In man...
International audiencePhysical layer security aspects of wireless networks have re- cently attracted...