Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings of the IEEE

Issue 10 • Oct. 2015

Filter Results

Displaying Results 1 - 24 of 24
  • Front cover

    Publication Year: 2015, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (797 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE publication information

    Publication Year: 2015, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Table of contents [secure communications via physical-layer and information-theoretic techniques]

    Publication Year: 2015, Page(s):1689 - 1690
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • International Education [Point of View]

    Publication Year: 2015, Page(s):1691 - 1697
    Request permission for commercial reuse | PDF file iconPDF (470 KB) | HTML iconHTML
    Freely Available from IEEE
  • Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue]

    Publication Year: 2015, Page(s):1698 - 1701
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (175 KB) | HTML iconHTML
    Freely Available from IEEE
  • Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing

    Publication Year: 2015, Page(s):1702 - 1724
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (921 KB) | HTML iconHTML

    The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be another node or device. These two attacks define the protection goals, namely, confidentiality and authenticity. Traditionally, both are solved by cryptographic approaches exploiting knowledge available in the surroundi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error-Control Coding for Physical-Layer Secrecy

    Publication Year: 2015, Page(s):1725 - 1746
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1486 KB) | HTML iconHTML

    The renewed interest for physical-layer security techniques has put forward a new role for error-control codes. In addition to ensuring reliability, carefully designed codes have been shown to provide a level of information-theoretic secrecy, by which the amount of information leaked to an adversary may be controlled. The ability to achieve information-theoretic secrecy relies on the study of alte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

    Publication Year: 2015, Page(s):1747 - 1761
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (883 KB) | HTML iconHTML

    The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices. The limited hardware, low-complexity, and severe energy constraints of MTC devices present unique communication and security challenges. As a result, robust physical-layer security methods that can supplement or even replace lightweight cryptogr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret-Key Distribution Based on Bounded Observability

    Publication Year: 2015, Page(s):1762 - 1780
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2453 KB) | HTML iconHTML

    This paper reviews an approach to secret-key distribution based on the bounded observability (BO) model. First, the information-theoretic framework of secret-key agreement from a correlated random source is reviewed. Next, the BO model is introduced. In the context of this model, the BO condition is presented as a necessary and sufficient condition for the possibility of secret-key distribution. T... View full abstract»

    Open Access
  • Universal Hashing for Information-Theoretic Security

    Publication Year: 2015, Page(s):1781 - 1795
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (899 KB) | HTML iconHTML

    The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Communication Under Channel Uncertainty and Adversarial Attacks

    Publication Year: 2015, Page(s):1796 - 1813
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    Information theoretic approaches to security have been examined as a promising complement to current cryptographic techniques. Such information theoretic approaches establish reliable communication and data confidentiality directly at the physical layer of a communication network by taking the properties of the noisy channel into account leading to unconditional security regardless of the computat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Physical-Layer Security: Lessons Learned From Information Theory

    Publication Year: 2015, Page(s):1814 - 1825
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    Physical-layer security utilizes resources of the transmission medium to guarantee secure communication against an adversary with unlimited computational power. Rooted in information theory, physical-layer security advocates for a foundational approach by requiring security of communicated information as well as its reliability at the outset. The past decade has seen an unprecedented effort in phy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Network Security: Building on Erasures

    Publication Year: 2015, Page(s):1826 - 1840
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    One of the most widely-known techniques for securing a message from eavesdropping, is the famous one-time pad. Although the one-time pad offers unconditional security, it has limited applicability today, because it requires that to communicate, two parties already share a key that is not known by the eavesdropper and has size equal to the message. In this review paper we present a line of work tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications

    Publication Year: 2015, Page(s):1841 - 1856
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Recent information-theoretic results on a class of broadcast channels with layered decoding and/or layered secrecy are reviewed. In this class of models, a transmitter sends multiple messages to a set of legitimate receivers in the presence of a set of eavesdroppers, whose channels can be ordered based on the quality of received signals. Receivers with better channel quality are required to decode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Degrees of Freedom of Multiuser Networks: One-Time-Pads in the Air via Alignment

    Publication Year: 2015, Page(s):1857 - 1873
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1145 KB) | HTML iconHTML

    We revisit the recent secure degrees of freedom (s.d.o.f.) results for one-hop multiuser wireless networks by considering three fundamental wireless network structures: Gaussian wiretap channel with helpers, Gaussian multiple access wiretap channel, and Gaussian interference channel with secrecy constraints. We present main enabling tools and resulting communication schemes in an expository manner... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Perspective on the MIMO Wiretap Channel

    Publication Year: 2015, Page(s):1874 - 1882
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver Bob, in the presence of an eavesdropper Eve. The goal of communication is to achieve reliability between Alice and Bob, but also confidentiality despite Eve's presence. Wiretap channels are declined in all kinds of flavors, depending on the underlying channels used by the three players: discrete memo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multivariate Mutual Information Inspired by Secret-Key Agreement

    Publication Year: 2015, Page(s):1883 - 1913
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1116 KB) | HTML iconHTML

    The capacity for multiterminal secret-key agreement inspires a natural generalization of Shannon's mutual information from two random variables to multiple random variables. Under a general source model without helpers, the capacity is shown to be equal to the normalized divergence from the joint distribution of the random sources to the product of marginal distributions minimized over partitions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information-Theoretic Security in Stochastic Control Systems

    Publication Year: 2015, Page(s):1914 - 1931
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (805 KB) | HTML iconHTML

    Infrastructural systems such as the electricity grid, healthcare, and transportation networks today rely increasingly on the joint functioning of networked information systems and physical components, in short, on cyber-physical architectures. Despite tremendous advances in cryptography, physical-layer security and authentication, information attacks, both passive such as eavesdropping, and active... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fifty Years of Moore’s Law [Scanning Our Past]

    Publication Year: 2015, Page(s):1932 - 1937
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (244 KB) | HTML iconHTML
    Freely Available from IEEE
  • Future Special Issues/Special Sections of the Proceedings

    Publication Year: 2015, Page(s): 1938
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Expand your network, get rewarded

    Publication Year: 2015, Page(s): 1939
    Request permission for commercial reuse | PDF file iconPDF (3525 KB)
    Freely Available from IEEE
  • Expand your professional network with IEEE

    Publication Year: 2015, Page(s): 1940
    Request permission for commercial reuse | PDF file iconPDF (2210 KB)
    Freely Available from IEEE
  • IEEE Global History Network

    Publication Year: 2015, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (242 KB)
    Freely Available from IEEE
  • Back cover

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (461 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University