Corpus ID: 237571720

Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications

@inproceedings{Wei2021PhysicalLA,
  title={Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications},
  author={Zhongxiang Wei and Christos Masouros and H. Vincent Poor and Athina P. Petropulu and Lajos Hanzo Hanzo},
  year={2021}
}
Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge/cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and privacy designs that aim to prevent confidential information from being eavesdropped upon by adversaries… Expand

Figures from this paper

Interference Utilization Precoding in Multi-Cluster IoT Networks
  • Yuanchen Wang, Eng Gee Lim, Xiaoping Xue, Guangyu Zhu, Rui Pei, Zhongxiang Wei
  • Frontiers in Signal Processing
  • 2021
In Internet-of-Things, downlink multi-device interference has long been considered as a harmful element deteriorating system performance, and thus the principle of the classic interference-mitigationExpand

References

SHOWING 1-10 OF 16 REFERENCES
Physical Layer Anonymous Communications
TLDR
This paper proposes a novel sender detection strategy at the receiver, and develops a corresponding anonymous precoding design to address sender’s anonymity while guaranteeing high receive signal-to-interference-plus-noise ratio (SINR) for communications. Expand
Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding
TLDR
The concept of PHY anonymity is introduced, and it is revealed that the receiver can unmask the sender's identity by only analyzing the PHY information, i.e., the signaling patterns and the characteristics of channel. Expand
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
TLDR
A pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service and outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs. Expand
Improving Wireless Physical Layer Security via Cooperating Relays
TLDR
Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint. Expand
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation
TLDR
This work proposes a secure and anonymous communication protocol by employing identity-based encryption for encrypting packets without sacrificing anonymity, and group signature for anonymous user authentication and concludes that the protocol realizes secure andAnonymous communications between users and SPs with practical performance. Expand
An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks
TLDR
An efficient anonymous communication protocol, called MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for P2P applications over mobile ad-hoc networks (MANETs), that maintains a higher degree of anonymity than a MANET anonymous single-path routing protocol in a hostile environment. Expand
On Anonymous Routing in Delay Tolerant Networks
TLDR
A framework of anonymous routing (FAR) for DTNs, which subsumes all the original anonymous routing protocols for ad hoc networks and is able to outperform onion-based, anonymous Epidemic, and zone-based routing. Expand
Lightweight Anonymous Authentication Protocols for RFID Systems
TLDR
This paper develops a lightweight technique that generates dynamic tokens for anonymous authentication that reduces the communication overhead and online computation overhead to $O(1)$ per authentication for both tags and readers, which compares favorably with the prior art. Expand
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
TLDR
This tutorial argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design. Expand
RFAL: Adversarial Learning for RF Transmitter Identification and Classification
TLDR
This paper designs and implements a generative model that learns the sample space of the I/Q values of known transmitters and uses the learned representation to generate signals that imitate the transmissions of these transmitters. Expand
...
1
2
...