2022
DOI: 10.1109/mwc.103.2100283
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications

Abstract: Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge/cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and privacy designs that aim to prevent confidential information from being eavesdropped upon by adversaries, or learned by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Nevertheless, those methods inevitably reduce the data fidelity. In e-Health scenarios, the fidelity of data is critical, which makes the data perturbation mechanism less desirable [10]. In this case, anonymous communication that provides a high level of data accuracy towards a receiver while guaranteeing senders' anonymity, plays an important role in the family of privacy design.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, those methods inevitably reduce the data fidelity. In e-Health scenarios, the fidelity of data is critical, which makes the data perturbation mechanism less desirable [10]. In this case, anonymous communication that provides a high level of data accuracy towards a receiver while guaranteeing senders' anonymity, plays an important role in the family of privacy design.…”
Section: A Related Workmentioning
confidence: 99%
“…For example, when an anonymously authenticated/encrypted sender transmits a signal to the AP, the received signal is always coupled with the sender's unique propagation channel. Hence, the recipient can analyze the signalling patterns of the received signal to unmask the data sender [10]. To this end, the work in [24] was the first to investigate sender detection (SD) and corresponding countermeasures at the PHY layer, where the detector exploits the characteristics of the received signal for unmasking the sender.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, with the help of [ 16 ], the ACR can be re-written as: where and is the exponential integral function.…”
Section: Performance Analysismentioning
confidence: 99%
“…An adaptive physical-layer key generation scheme was proposed in Smart Homes in [ 15 ]. The authors of [ 16 ] considered designs that mask the user’s identity during communication, resulting in anonymous communications, and in particular, examined the recent interest in physical layer anonymous solutions. Moreover, in [ 17 ], the authors provided a tutorial overview of the promising intelligent reflection communication (IRC) technologies and articulated multiple ways of enhancing the security of Internet-of-Everything (IoE) by the IRC.…”
Section: Introductionmentioning
confidence: 99%