Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = secrecy monotones

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
44 pages, 751 KiB  
Review
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
by Pradeep Kr. Banerjee
Entropy 2025, 27(1), 29; https://doi.org/10.3390/e27010029 - 1 Jan 2025
Viewed by 980
Abstract
The problem of constructing information measures with a well-defined interpretation is of fundamental significance in information theory. A good definition of an information measure entails certain desirable properties while also providing answers to operational problems. In this work, we investigate the properties of [...] Read more.
The problem of constructing information measures with a well-defined interpretation is of fundamental significance in information theory. A good definition of an information measure entails certain desirable properties while also providing answers to operational problems. In this work, we investigate the properties of the unique information, an information measure that quantifies a deviation from the Blackwell order. Beyond providing an accessible introduction to the topic from a channel ordering perspective, we present a novel resource-theoretic characterization of unique information in a cryptographic task related to secret key agreement. Our operational view of unique information entails rich physical intuition that leads to new insights into secret key agreement in the context of non-negative decompositions of the mutual information into redundant and synergistic contributions. Through this lens, we illuminate new directions for research in partial information decompositions and information-theoretic cryptography. Full article
Show Figures

Figure 1

13 pages, 1881 KiB  
Article
Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User
by Xin Song, Lin Xia, Siyang Xu and Yue Wang
Future Internet 2020, 12(10), 175; https://doi.org/10.3390/fi12100175 - 18 Oct 2020
Cited by 3 | Viewed by 2306
Abstract
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist [...] Read more.
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

12 pages, 1008 KiB  
Article
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks
by Xuanxuan Tang, Yueming Cai, Wendong Yang, Weiwei Yang, Dechuan Chen and Junquan Hu
Sensors 2018, 18(2), 331; https://doi.org/10.3390/s18020331 - 24 Jan 2018
Cited by 16 | Viewed by 4421
Abstract
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF [...] Read more.
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis. Full article
(This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things)
Show Figures

Figure 1

Back to TopTop