Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/107672
DC FieldValueLanguage
dc.contributor.authorAnjos, Gustavo-
dc.contributor.authorCastanheira, Daniel-
dc.contributor.authorSilva, Adao-
dc.contributor.authorGameiro, Atilio-
dc.contributor.authorGomes, Marco-
dc.contributor.authorVilela, João P.-
dc.date.accessioned2023-07-26T11:25:15Z-
dc.date.available2023-07-26T11:25:15Z-
dc.date.issued2018-
dc.identifier.issn2169-3536pt
dc.identifier.urihttps://hdl.handle.net/10316/107672-
dc.description.abstractThe purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different con gurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas.pt
dc.language.isoengpt
dc.publisherIEEEpt
dc.relationThis work was supported through project SWING2 (PTDC/EEITEL/3684/2014), funded by Fundos Europeus Estruturais e de Investimento through Programa Operacional Competitividade e Internacionalização-COMPETE 2020 and by National Funds from FCT-Fundos Europeus Estruturais e de Investimento, through Project POCI-01-0145-FEDER-016753.pt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/pt
dc.subjectPhysical layer securitypt
dc.subjectsecrecy capacitypt
dc.subjectjammingpt
dc.subjectchannel reciprocitypt
dc.titleExploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropperpt
dc.typearticle-
degois.publication.firstPage33410pt
degois.publication.lastPage33420pt
degois.publication.titleIEEE Accesspt
dc.peerreviewedyespt
dc.identifier.doi10.1109/ACCESS.2018.2845839pt
degois.publication.volume6pt
dc.date.embargo2018-01-01*
uc.date.periodoEmbargo0pt
item.grantfulltextopen-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextCom Texto completo-
crisitem.author.researchunitCEIS20 - Centre of 20th Century Interdisciplinary Studies-
crisitem.author.orcid0000-0002-2362-3054-
crisitem.author.orcid0000-0001-5805-1351-
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
FCTUC Eng.Electrotécnica - Artigos em Revistas Internacionais
Show simple item record

Page view(s)

37
checked on May 8, 2024

Download(s)

14
checked on May 8, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons