Dergi makalesi Açık Erişim

An Overview of Physical Layer Security With Finite-Alphabet Signaling

Aghdam, Sina Rezaei; Nooraiepour, Alireza; Duman, Tolga M.


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Nooraiepour, Alireza</subfield>
    <subfield code="u">Rutgers State Univ, WINLAB, Dept Elect &amp; Comp Engn, Piscataway, NJ 08854 USA</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Duman, Tolga M.</subfield>
    <subfield code="u">Bilkent Univ, Dept Elect Engn, TR-06800 Ankara, Turkey</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="p">IEEE COMMUNICATIONS SURVEYS AND TUTORIALS</subfield>
    <subfield code="v">21</subfield>
    <subfield code="n">2</subfield>
    <subfield code="c">1829-1850</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="a">Creative Commons Attribution</subfield>
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1109/COMST.2018.2880421</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">An Overview of Physical Layer Security With Finite-Alphabet Signaling</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Aghdam, Sina Rezaei</subfield>
    <subfield code="u">Bilkent Univ, Dept Elect Engn, TR-06800 Ankara, Turkey</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="o">oai:zenodo.org:73111</subfield>
    <subfield code="p">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="2">opendefinition.org</subfield>
    <subfield code="a">cc-by</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-01-01</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/73111/files/bib-93472ab2-4819-48be-8643-18cb5c5d833d.txt</subfield>
    <subfield code="z">md5:c3843c4523838aab0a9cf72a50452c59</subfield>
    <subfield code="s">179</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <controlfield tag="005">20210316035235.0</controlfield>
  <controlfield tag="001">73111</controlfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step toward a practical implementation of physical layer security. With this motivation, this paper reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research.</subfield>
  </datafield>
</record>
30
8
görüntülenme
indirilme
Görüntülenme 30
İndirme 8
Veri hacmi 1.4 kB
Tekil görüntülenme 28
Tekil indirme 8

Alıntı yap