Due to the channel estimation error, most of the physical layer secret key generation schemes need information reconciliation to correct error key bits, resulting in reduced efficiency. To solve the problem, this work proposes a novel secure communication scheme based on a equivalent interference channel. Different keys generated from imperfect channel state information are directly applied to signal scrambling and descrambling, which is equivalent to the process of a signal passing through an interference channel. Legitimate communication parties can reduce interference with the help of similar keys and channel coding without sending additional signals, while the eavesdropper channel is deteriorated due to the spatial decorrelation. For th...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can ha...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
Physical-layer key generation technology requires information reconciliation to correct channel esti...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
In this paper we consider the problem of secure communication between two nodes, over a fading wirel...
Abstract — There is growing interest in wireless security meth-ods that provide strong or even perfe...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping at...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
Systems and methods of securely communicating from a sender device to a receiver device on a communi...
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitt...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can ha...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
Physical-layer key generation technology requires information reconciliation to correct channel esti...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
In this paper we consider the problem of secure communication between two nodes, over a fading wirel...
Abstract — There is growing interest in wireless security meth-ods that provide strong or even perfe...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping at...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
Systems and methods of securely communicating from a sender device to a receiver device on a communi...
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitt...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Physical layer security (PLS) can be adopted for efficient key sharing in secured wireless systems. ...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can ha...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...