2015
DOI: 10.1007/s11042-015-2936-3
|View full text |Cite
|
Sign up to set email alerts
|

Security enhancement for video transmission via noise aggregation in immersive systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities. Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]. Among all these strategies, relay transmission is of great significance to the IoT for the following reasons.…”
Section: A Backgroundmentioning
confidence: 99%
“…The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities. Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]. Among all these strategies, relay transmission is of great significance to the IoT for the following reasons.…”
Section: A Backgroundmentioning
confidence: 99%
“…Whilst this is an improvement over other current solutions of around 1 second, the cost is high which is undesirable. Hussain (2016) approached the video quality issue through the Peak Signal to Noise Ratio (PSNR) using noise aggregation which leads to 126.7 dB PSNR in the main channel. If the wiretap channel is improved, then the video suffers from a passive attack.…”
Section: Data Encryption For Tele-training Systemsmentioning
confidence: 99%
“…Since AN may reduce the transmission power of the useful data, power allocation between data and AN should be examined to ensure good performance under secrecy constraint [36]. Another novel strategy to degrade the eavesdropper’s channel quality is based on noise aggregation [40,41], where two adjacent timeslots are bounded to transmit two packets and the transmitter performs bitwise exclusive-or (XOR) operation on the even packet with previous odd one. Because the legitimate receiver can detect the packets in odd slots correctly by an ARQ protocol while eavesdropper may only have a noisy observation, the channel noise in odd slots is aggregated to even slots [41].…”
Section: Related Workmentioning
confidence: 99%