TY - GEN
T1 - Wireless secrecy with infrastructure-aided cooperation
AU - Popovski, Petar
AU - Simeone, Osvaldo
PY - 2008
Y1 - 2008
N2 - A novel approach for ensuring confidential communications over infrastructure-based wireless networks is proposed and analyzed from an information-theoretic standpoint. The considered techniques leverage the finite-capacity backbone connecting the base stations and the possibility to schedule uplink/downlink transmissions in order to create intentional interference. Two different methods are studied, one based on source coding and one on channel coding arguments, and corresponding rates achievable with perfect secrecy are derived.
AB - A novel approach for ensuring confidential communications over infrastructure-based wireless networks is proposed and analyzed from an information-theoretic standpoint. The considered techniques leverage the finite-capacity backbone connecting the base stations and the possibility to schedule uplink/downlink transmissions in order to create intentional interference. Two different methods are studied, one based on source coding and one on channel coding arguments, and corresponding rates achievable with perfect secrecy are derived.
UR - http://www.scopus.com/inward/record.url?scp=51849097719&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51849097719&partnerID=8YFLogxK
U2 - 10.1109/ITW.2008.4578642
DO - 10.1109/ITW.2008.4578642
M3 - Conference contribution
AN - SCOPUS:51849097719
SN - 9781424422708
T3 - 2008 IEEE Information Theory Workshop, ITW
SP - 159
EP - 163
BT - 2008 IEEE Information Theory Workshop, ITW
T2 - 2008 IEEE Information Theory Workshop, ITW
Y2 - 5 May 2008 through 9 May 2008
ER -