Strong secrecy in wireless network coding systems with M-QAM modulators

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Chorti, Arsenia
dc.contributor.author Molu, Mehdi M.
dc.contributor.author Karpuk, David
dc.contributor.author Hollanti, Camilla
dc.contributor.author Burr, Alister
dc.date.accessioned 2017-08-03T12:08:38Z
dc.date.available 2017-08-03T12:08:38Z
dc.date.issued 2015-01-12
dc.identifier.citation Chorti , A , Molu , M M , Karpuk , D , Hollanti , C & Burr , A 2015 , Strong secrecy in wireless network coding systems with M-QAM modulators . in 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 . , 7008268 , Institute of Electrical and Electronics Engineers Inc. , pp. 181-186 , 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 , Shanghai , China , 13-15 October . DOI: 10.1109/ICCChina.2014.7008268 en
dc.identifier.isbn 9781479941469
dc.identifier.other PURE UUID: 44a3c43a-deb3-4291-97b2-76e7a4e9fcb7
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/strong-secrecy-in-wireless-network-coding-systems-with-mqam-modulators(44a3c43a-deb3-4291-97b2-76e7a4e9fcb7).html
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=84922496491&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/14353687/Strong_secrecy_in_wireless_network_coding_systems_with_M_QAM_modulators.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/27373
dc.description.abstract We investigate the possibility of developing physical layer network coding (PNC) schemes with embedded strong secrecy based on standard QAM modulators. The proposed scheme employs a triple binning approach at the QAM front-end of the wireless PNC encoders. A constructive example of a strong secrecy encoder is presented when a BPSK and an 8-PAM modulator are employed at the wireless transmitters and generalized to arbitrary M-QAM modulators, assuming channel inversion is attainable at the first cycle of the transmission. Our preliminary investigations demonstrate the potential of using such techniques to increase the throughput while in parallel not compromise the confidentiality of the exchanged data. en
dc.format.extent 6
dc.format.extent 181-186
dc.format.mimetype application/pdf
dc.language.iso en en
dc.relation.ispartof 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 en
dc.relation.ispartofseries 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014 en
dc.rights openAccess en
dc.subject.other Computer Networks and Communications en
dc.subject.other 111 Mathematics en
dc.subject.other 113 Computer and information sciences en
dc.subject.other 512 Business and management en
dc.subject.other 112 Statistics and probability en
dc.title Strong secrecy in wireless network coding systems with M-QAM modulators en
dc.type A4 Artikkeli konferenssijulkaisussa fi
dc.description.version Peer reviewed en
dc.contributor.department Department of Mathematics and Systems Analysis en
dc.subject.keyword Computer Networks and Communications
dc.subject.keyword 111 Mathematics
dc.subject.keyword 113 Computer and information sciences
dc.subject.keyword 512 Business and management
dc.subject.keyword 112 Statistics and probability
dc.identifier.urn URN:NBN:fi:aalto-201708036341
dc.identifier.doi 10.1109/ICCChina.2014.7008268
dc.type.version acceptedVersion


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive


Advanced Search

article-iconSubmit a publication

Browse

My Account