We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the sec...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user...
Abstract—We consider the K-user interference channel with an external eavesdropper, with no eavesdro...
Interference alignment techniques are powerful methods that best exploit available degrees of freedo...
The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K...
Abstract—A Gaussian wiretap channel with a helper, i.e., a cooperative jammer, is considered and its...
Abstract—This paper studies the frequency/time selective -user Gaussian interference channel with se...
Abstract—The sum secure degrees of freedom (s.d.o.f.) of the K-user interference channel (IC) with s...
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access ch...
The achievable rate region and degrees of freedom are studied for interference channels with confide...
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast...
In this paper, we study the two-user one-sided interference channel with confidential messages. In t...
Abstract—We consider the problem of secure communications over the two-way wiretap channel under a s...
The study of the physical layer has offered a new perspective to the problem of communication securi...
This paper studies the secure degree of freedom (SDOF) of the multiway relay wiretap system K -user ...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user...
Abstract—We consider the K-user interference channel with an external eavesdropper, with no eavesdro...
Interference alignment techniques are powerful methods that best exploit available degrees of freedo...
The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K...
Abstract—A Gaussian wiretap channel with a helper, i.e., a cooperative jammer, is considered and its...
Abstract—This paper studies the frequency/time selective -user Gaussian interference channel with se...
Abstract—The sum secure degrees of freedom (s.d.o.f.) of the K-user interference channel (IC) with s...
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access ch...
The achievable rate region and degrees of freedom are studied for interference channels with confide...
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast...
In this paper, we study the two-user one-sided interference channel with confidential messages. In t...
Abstract—We consider the problem of secure communications over the two-way wiretap channel under a s...
The study of the physical layer has offered a new perspective to the problem of communication securi...
This paper studies the secure degree of freedom (SDOF) of the multiway relay wiretap system K -user ...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user...
Abstract—We consider the K-user interference channel with an external eavesdropper, with no eavesdro...