Optimal Channel Training Design for Secure Short-Packet Communications.

Sensors (Basel)

College of Physics and Electronic Engineering, Nanyang Normal University, Nanyang 473061, China.

Published: January 2023

Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9919970PMC
http://dx.doi.org/10.3390/s23031068DOI Listing

Publication Analysis

Top Keywords

channel training
16
optimal channel
12
short-packet communications
12
secrecy throughput
12
average secrecy
8
training length
8
channel
5
training
4
training design
4
design secure
4

Similar Publications

Mitigating Data Leakage in a WiFi CSI Benchmark for Human Action Recognition.

Sensors (Basel)

December 2024

Nokia Bell Labs, 1082 Budapest, Hungary.

Human action recognition using WiFi channel state information (CSI) has gained attention due to its non-intrusive nature and potential applications in healthcare, smart environments, and security. However, the reliability of methods developed for CSI-based action recognition is often contingent on the quality of the datasets and evaluation protocols used. In this paper, we uncovered a critical data leakage issue, which arises from improper data partitioning, in a widely used WiFi CSI benchmark dataset.

View Article and Find Full Text PDF

Wavelet-Driven Multi-Band Feature Fusion for RGB-T Salient Object Detection.

Sensors (Basel)

December 2024

School of Mechanical Engineering & Automation, Northeastern University, Shenyang 110819, China.

RGB-T salient object detection (SOD) has received considerable attention in the field of computer vision. Although existing methods have achieved notable detection performance in certain scenarios, challenges remain. Many methods fail to fully utilize high-frequency and low-frequency features during information interaction among different scale features, limiting detection performance.

View Article and Find Full Text PDF

One of the most promising applications for electroencephalogram (EEG)-based brain-computer interfaces (BCIs) is motor rehabilitation through motor imagery (MI) tasks. However, current MI training requires physical attendance, while remote MI training can be applied anywhere, facilitating flexible rehabilitation. Providing remote MI training raises challenges to ensuring an accurate recognition of MI tasks by healthcare providers, in addition to managing computation and communication costs.

View Article and Find Full Text PDF

This paper presents a lens-free imaging approach utilizing an array of light sources, capable of measuring the dielectric properties of many particles simultaneously. This method employs coplanar electrodes to induce velocity changes in flowing particles through dielectrophoretic forces, allowing the inference of individual particle properties from differential velocity changes. Both positive and negative forces are detectable.

View Article and Find Full Text PDF

In recent years, significant research has been directed towards the taxonomy of malware variants. Nevertheless, certain challenges persist, including the inadequate accuracy of sample classification within similar malware families, elevated false-negative rates, and significant processing time and resource consumption. Malware developers have effectively evaded signature-based detection methods.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!