Wireless secrecy with infrastructure-aided cooperation

Petar Popovski, Osvaldo Simeone

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

A novel approach for ensuring confidential communications over infrastructure-based wireless networks is proposed and analyzed from an information-theoretic standpoint. The considered techniques leverage the finite-capacity backbone connecting the base stations and the possibility to schedule uplink/downlink transmissions in order to create intentional interference. Two different methods are studied, one based on source coding and one on channel coding arguments, and corresponding rates achievable with perfect secrecy are derived.

Original languageEnglish (US)
Title of host publication2008 IEEE Information Theory Workshop, ITW
Pages159-163
Number of pages5
DOIs
StatePublished - 2008
Event2008 IEEE Information Theory Workshop, ITW - Porto, Portugal
Duration: May 5 2008May 9 2008

Publication series

Name2008 IEEE Information Theory Workshop, ITW

Other

Other2008 IEEE Information Theory Workshop, ITW
Country/TerritoryPortugal
CityPorto
Period5/5/085/9/08

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Wireless secrecy with infrastructure-aided cooperation'. Together they form a unique fingerprint.

Cite this