Learn More
Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather(More)
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source of domain-specific information that can complement and(More)
For a multiple antenna Gaussian broadcast channel, we look for inputs that facilitate secret transmission between authorized communication parties in the presence of passive eavesdroppers. In this work, we assume all channel information is known at the transmitter. For the general multiple antenna system, we find that the problem of optimizing over Gaussian(More)
Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use(More)
We derive an outer bound for the secrecy capacity region of a class of one-sided interference channel. The transmitters are assumed to be trustworthy while the message is secure against the non-intended receiver. The outer bound is applied to a deterministic channel in which the outer bound is showed to be tight, and to a Gaussian one-sided interference(More)
RFID technology has been examined in healthcare to support a variety of applications such as patient identification and monitoring, asset tracking, and patient–drug compliance. However, managing the large volume of RFID data and understanding them in the medical context present new challenges. One effective solution for dealing with these challenges is(More)
We investigate the achievable secrecy rate with Gaussian random codes when the main channel is an AWGN channel, while the eavesdropper's channel is Rayleigh fading with additive Gaussian noise. Several transmission strategies according to the main channel's relative channel gain are proposed and evaluated. We show that even if the main channel channel gain(More)
We consider a secret communication scenario where Alice wants to transmit secretly to Bob in presence of a passive eavesdropper Eve. The Alice-Bob channel is a fixed-SNR AWGN channel, while the Alice-Eve channel is a fast Rayleigh fading channel, with the channel states only known to Eve. Alice knows the statistics of Alice-Eve channel, but not the exact(More)
Digital fingerprinting protects multimedia content from being used for unauthorized purposes. One cost-effective strategy to attack digital fingerprints is collusion, where several colluders average their individual copies to disrupt the underlying fingerprints. In this work, we propose that fingerprints can be constructed using sequence sets satisfying the(More)
Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment and people in real time, but also provides efficient and accurate access to medical data for doctors and other health professionals. However, the reality of RFID adoption is far behind earlier expectation. This study reviews the literature on RFID(More)