2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2015
DOI: 10.1109/spawc.2015.7227105
|View full text |Cite
|
Sign up to set email alerts
|

On the physical layer security of analog joint source channel coding schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Usually, diversity techniques such as using auxiliary nodes to aid in the transmission (cooperative diversity) (Mo et al, 2012) or furnishing legitimate nodes with multiple antennas (antenna diversity) (Chiodi et al, 2015 have been employed to enhance the security of CR wireless systems at the Physical Layer. Additionally, other techniques, such as beam-forming (Nguyen et al, 2016), artificial noise (Fang et al, 2016) and error control coding (Bloch et al, 2015, Hodgson et al, 2015 are also able to improve these systems secrecy performance. A comprehensive review regarding PLS for CR networks can be found in (Zou et al, 2016) and in references therein.…”
Section: Document Structurementioning
confidence: 99%
“…Usually, diversity techniques such as using auxiliary nodes to aid in the transmission (cooperative diversity) (Mo et al, 2012) or furnishing legitimate nodes with multiple antennas (antenna diversity) (Chiodi et al, 2015 have been employed to enhance the security of CR wireless systems at the Physical Layer. Additionally, other techniques, such as beam-forming (Nguyen et al, 2016), artificial noise (Fang et al, 2016) and error control coding (Bloch et al, 2015, Hodgson et al, 2015 are also able to improve these systems secrecy performance. A comprehensive review regarding PLS for CR networks can be found in (Zou et al, 2016) and in references therein.…”
Section: Document Structurementioning
confidence: 99%
“…Ref. [26] used discrete-time fully analog joint source-channel coding over wireless channels to prevent eavesdropping. These secrecy coding schemes have theoretically proven to be close to the secrecy capacity.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth saying that such kinds of mappings have been used for security purposes in a totally different scenario. In [26], the physical layer security was analyzed for a wireless classical channel.…”
Section: Introductionmentioning
confidence: 99%