Please use this identifier to cite or link to this item:
https://hdl.handle.net/10316/107672
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Anjos, Gustavo | - |
dc.contributor.author | Castanheira, Daniel | - |
dc.contributor.author | Silva, Adao | - |
dc.contributor.author | Gameiro, Atilio | - |
dc.contributor.author | Gomes, Marco | - |
dc.contributor.author | Vilela, João P. | - |
dc.date.accessioned | 2023-07-26T11:25:15Z | - |
dc.date.available | 2023-07-26T11:25:15Z | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 2169-3536 | pt |
dc.identifier.uri | https://hdl.handle.net/10316/107672 | - |
dc.description.abstract | The purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different con gurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas. | pt |
dc.language.iso | eng | pt |
dc.publisher | IEEE | pt |
dc.relation | This work was supported through project SWING2 (PTDC/EEITEL/3684/2014), funded by Fundos Europeus Estruturais e de Investimento through Programa Operacional Competitividade e Internacionalização-COMPETE 2020 and by National Funds from FCT-Fundos Europeus Estruturais e de Investimento, through Project POCI-01-0145-FEDER-016753. | pt |
dc.rights | openAccess | pt |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | pt |
dc.subject | Physical layer security | pt |
dc.subject | secrecy capacity | pt |
dc.subject | jamming | pt |
dc.subject | channel reciprocity | pt |
dc.title | Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper | pt |
dc.type | article | - |
degois.publication.firstPage | 33410 | pt |
degois.publication.lastPage | 33420 | pt |
degois.publication.title | IEEE Access | pt |
dc.peerreviewed | yes | pt |
dc.identifier.doi | 10.1109/ACCESS.2018.2845839 | pt |
degois.publication.volume | 6 | pt |
dc.date.embargo | 2018-01-01 | * |
uc.date.periodoEmbargo | 0 | pt |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | Com Texto completo | - |
crisitem.author.researchunit | CEIS20 - Centre of 20th Century Interdisciplinary Studies | - |
crisitem.author.orcid | 0000-0002-2362-3054 | - |
crisitem.author.orcid | 0000-0001-5805-1351 | - |
Appears in Collections: | I&D CISUC - Artigos em Revistas Internacionais FCTUC Eng.Electrotécnica - Artigos em Revistas Internacionais |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper.pdf | 3.22 MB | Adobe PDF | View/Open |
Page view(s)
37
checked on May 8, 2024
Download(s)
14
checked on May 8, 2024
Google ScholarTM
Check
Altmetric
Altmetric
This item is licensed under a Creative Commons License