Learn More
This work investigates the effect of finite-alphabet input constraint on the secrecy rate of a multi-antenna wiretap channel. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based on Gaussian source signals and secrecy code. Despite the impracticality of Gaussian sources, the(More)
—We investigate the problem of eavesdropping control in wireless communications networks. When a confidential message is transmitted through a wireless network, there is a potential security breach or 'information leakage' due to the network's susceptibility to eavesdropping. In this work, we quantify the information leakage problem in the context of(More)
—We investigate the risk associated with multi-hop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold.(More)
  • 1