2009
DOI: 10.1002/sec.110
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security in broadcast networks

Abstract: This paper reviews the information theoretic characterization of security in broadcast channels, in which a transmitter has both public and confidential messages intended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients. Various scenarios are considered in the context of two-user broadcast channels, for which known results on the secrecy capacity region are reviewed and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
14
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(15 citation statements)
references
References 27 publications
1
14
0
Order By: Relevance
“…There is a considerable amount of work that characterizes secrecy under varying amounts of statistical information available regarding the Alice-Bob and Alice-Eve channel state [3]. A natural next step is to make the explicit connection between how Alice can assess what information she has and how she can adjust her secret communication methods appropriately in an online manner.…”
Section: Integrating Channel Knowledge Into Practical Secrecy Dissemimentioning
confidence: 99%
See 1 more Smart Citation
“…There is a considerable amount of work that characterizes secrecy under varying amounts of statistical information available regarding the Alice-Bob and Alice-Eve channel state [3]. A natural next step is to make the explicit connection between how Alice can assess what information she has and how she can adjust her secret communication methods appropriately in an online manner.…”
Section: Integrating Channel Knowledge Into Practical Secrecy Dissemimentioning
confidence: 99%
“…In particular, rather than rely solely upon generic higher-layer cryptographic mechanisms, as has been the norm, there is a belief that it is possible to design lower-layer services that support security objectives such as authentication and confidentiality. There are several good surveys and collections that explore the fundamentals of physical layer security [1][2][3], but briefly these services can be summarized as follows.…”
Section: Introductionmentioning
confidence: 99%
“…While there are no secrecy constraints on the public messages, 4 When necessary, we will give references to papers where K > 2 was considered. 5 We note that this scenario is not the most general one that can be studied for the multi-receiver wiretap channel.…”
Section: B Multi-receiver Wiretap Channelsmentioning
confidence: 99%
“…These approaches have been studied in [2], [3] and [4] based on previous studies and works of [5]. In fact, secrecy rate for the Gaussian channel has been defined in [5] as the difference between the capacity at the legitimate receiver (destination) and that at the illegitimate receiver (eavesdropper).…”
Section: Introductionmentioning
confidence: 99%