2019
DOI: 10.1109/access.2019.2893801
|View full text |Cite
|
Sign up to set email alerts
|

Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret Key Aided Schemes

Abstract: We investigate the physical layer security of uplink single-carrier frequency-division multipleaccess (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block.We reduce the computational and storage requirements at Bob's receiver by assuming simple per-subchannel detectors. We assume t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Hence, Alice cannot design her precoder based on any knowledge of the Alice-Eves links' channels. It is noteworthy that Alice could design an AN signal to hurt Eves using the knowledge of Alice-Bob link where the AN lies in a subspace orthogonal to the subspace spanned by the Alice-Bob channel vector [9], [13]. However, we skip this design in this paper since it is not going to change our scheme's design or add any insight to the problem under investigation.…”
Section: System Model and Proposed Secret-key-assisted Schemementioning
confidence: 99%
See 2 more Smart Citations
“…Hence, Alice cannot design her precoder based on any knowledge of the Alice-Eves links' channels. It is noteworthy that Alice could design an AN signal to hurt Eves using the knowledge of Alice-Bob link where the AN lies in a subspace orthogonal to the subspace spanned by the Alice-Bob channel vector [9], [13]. However, we skip this design in this paper since it is not going to change our scheme's design or add any insight to the problem under investigation.…”
Section: System Model and Proposed Secret-key-assisted Schemementioning
confidence: 99%
“…Some schemes relied on designing artificial-noise (AN) precoding schemes to confuse the eavesdropping nodes and reduce their signal-plus-interference-to-noise ratios (SINRs). These schemes can be divided into spatial [15], [16], temporal [9]- [11], or hybrid spatio-temporal [13] AN injection schemes.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…We assume perfect channel state information (CSI) knowledge at IAB-donor. Further, LZFBF is used to suppress the inter-stream interference between (D + 1) independent spatial streams of backhaul and direct links [40], [41]. Hence, the second and third terms can be omitted from (3) and the received SINR at d th drone can be calculated as:…”
Section: A Backhaul Downlink Transmissionsmentioning
confidence: 99%
“…The most important purpose of these methods is maximizing the secrecy rate. To maximize the secrecy rate and apply physical layer security in these networks, transmission of artificial noise [3]- [6] and multiple antennas systems [7]- [9] are commonly used methods. As we know, there are two conventional categories of jamming signal that are considered to enhance physical layer security in wireless networks:…”
Section: Introductionmentioning
confidence: 99%