We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Boundaries as an Enhancement Technique for Physical Layer Security

Abstract: In this paper, we study the receiver performance with physical layer security in a Poisson field of interferers. We compare the performance in two deployment scenarios: (i) the receiver is located at the corner of a quadrant, (ii) the receiver is located in the infinite plane. When the channel state information (CSI) of the eavesdropper is not available at the transmitter, we calculate the probability of secure connectivity using the Wyner coding scheme, and we show that hiding the receiver at the corner is beneficial at high rates of the transmitted codewords and detrimental at low transmission rates. When the CSI is available, we show that the average secrecy capacity is higher when the receiver is located at the corner, even if the intensity of interferers in this case is four times higher than the intensity of interferers in the bulk. Therefore boundaries can also be used as a secrecy enhancement technique for high data rate applications.
Comments: to be published
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
Journal reference: IEEE Trans. Information Forensics and Security 14 61-74 (2019)
DOI: 10.1109/TIFS.2018.2841870
Cite as: arXiv:1708.04186 [cs.IT]
  (or arXiv:1708.04186v3 [cs.IT] for this version)

Submission history

From: Konstantinos Koufos [view email]
[v1] Mon, 14 Aug 2017 15:52:28 GMT (54kb)
[v2] Fri, 13 Apr 2018 19:00:13 GMT (59kb)
[v3] Wed, 23 May 2018 21:11:39 GMT (58kb)

Link back to: arXiv, form interface, contact.