Skip to main content

Showing 1–4 of 4 results for author: Anaya-López, G J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.13180  [pdf, other

    cs.IT eess.SP

    The Second Order Scattering Fading Model with Fluctuating Line-of-Sight

    Authors: Jesus Lopez-Fernandez, Gonzalo J. Anaya-Lopez, F. Javier Lopez-Martinez

    Abstract: We present a generalization of the notoriously unwieldy second-order scattering fading model, which is helpful to alleviate its mathematical complexity while providing an additional degree of freedom. This is accomplished by allowing its dominant specular component associated to line-of-sight propagation to randomly fluctuate. The statistical characterization of the newly proposed model is carried… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

    Comments: This work has been submitted to the IEEE for possible publication

  2. arXiv:2205.11335  [pdf, other

    cs.IT eess.SP

    Leakage Subspace Precoding and Scheduling for Physical Layer Security in Multi-User XL-MIMO Systems

    Authors: Gonzalo J. Anaya-Lopez, Jose P. Gonzalez-Coma, F. Javier Lopez-Martinez

    Abstract: We investigate the achievable secrecy sum-rate in a multi-user XL-MIMO system, on which user distances to the base station become comparable to the antenna array dimensions. We show that the consideration of spherical-wavefront propagation inherent to these set-ups is beneficial for physical-layer security, as it provides immunity against eavesdroppers located in similar angular directions that wo… ▽ More

    Submitted 20 July, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: 5 pages and 4 figures. This work has been submitted to the IEEE for possible publication

  3. arXiv:2105.14950  [pdf, other

    cs.IT

    A New Transmit Antenna Selection Technique for Physical Layer Security with Strong Eavesdropping

    Authors: Gonzalo J. Anaya-López, J. Carlos Ruiz-Sicilia, F. Javier López-Martínez

    Abstract: We propose a new transmit antenna selection (TAS) technique that can be beneficial for physical layer security purposes. Specifically, we show that the conventional TAS criterion based on the legitimate channel state information (CSI) is not recommended when the average signal-to-noise ratio for the illegitimate user becomes comparable or superior to that of the legitimate user. We illustrate that… ▽ More

    Submitted 22 November, 2021; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: 5 pages, 4 figures, journal article. This work has been submitted to the IEEE for possible publication

  4. arXiv:2007.08162  [pdf, other

    cs.IT eess.SP

    A Product Channel Attack to Wireless Physical Layer Security

    Authors: Gonzalo J. Anaya-Lopez, Gerardo Gomez, F. Javier Lopez-Martinez

    Abstract: We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission und… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 5 pages, 4 figures. This work has been submitted to the IEEE for publication