2017
DOI: 10.1109/tifs.2017.2692749
|View full text |Cite
|
Sign up to set email alerts
|

Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels

Abstract: In this paper, throughput and energy efficiency of secure wireless transmission of delay sensitive data generated by random sources is studied. A fading broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data, generated from Markovian sources, is stored in buffers prior to transmission, and the transmitter operates under constraints on buffer/delay violation probability. Under such statistical quality of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(26 citation statements)
references
References 49 publications
0
26
0
Order By: Relevance
“…A well-known technique to provide security is to use cryptography, however because of security code bits, providing delay-limited communications is even more challenging. EC-based delay analysis in various wireless networks with different security threats has also been studied in [163], [290]. In normal scenarios, EC estimates the delay of information bits in the transmission-buffer.…”
Section: Security and Privacy Issues In Low Latency Communicationsmentioning
confidence: 99%
“…A well-known technique to provide security is to use cryptography, however because of security code bits, providing delay-limited communications is even more challenging. EC-based delay analysis in various wireless networks with different security threats has also been studied in [163], [290]. In normal scenarios, EC estimates the delay of information bits in the transmission-buffer.…”
Section: Security and Privacy Issues In Low Latency Communicationsmentioning
confidence: 99%
“…be a series of non-negative random variables, representing the service process of the m th user. Assume that the service process satisfies Gärtner-Ellis theorem [24]. Then, the EC for the m th user on a block-fading channel is defined as…”
Section: Effective Secrecy Ratementioning
confidence: 99%
“…In the disassociation attack, the frame-level service process s k in (7) follows the same model as in the baseline scenario (10) (i.e., frames are dropped with the false alarm rate and N k is given by its baseline distribution). We consider independent Bernoulli attack attempts from Eve with probability p Attack and to model the impact on the queueing performance, we divide the data flow from device i to the access point into blocks consisting of K RC frames each and define the aggregated arrival process as a ′ l = KRC(l+1)−1 k=KCNl a k and service process as…”
Section: Queueing Impacts Of Disassociation Attacksmentioning
confidence: 99%
“…Recall that in the baseline scenario no active attacker is present and frames are dropped with the false alarm rate, i.e, Pr(X = 0) = 1 − p X = p FA . The service model is given by (7) with R k = log 2 (1 + h † k h k ) where we now, for ease of notation, have dropped the user index i. Note that in this section we assume the allocated resources N k to be deterministic, something we will later generalize when deriving the Sybil attack bound.…”
Section: B Baseline Analysismentioning
confidence: 99%