Alice and Bob can agree on a common secret key without ever probing the wireless channel, by exploiting the reciprocity of the channel and using a new bisparse blind deconvolution scheme that provides information-theoretic security.
By jointly optimizing the transmit beamforming and positions of movable antennas at the transmitter, the secrecy outage probability can be significantly reduced compared to conventional fixed-position antenna schemes, even when the eavesdroppers' instantaneous channel state information is unknown.
Jamming poses a critical threat to the security and reliability of 6G networks that rely on extreme bandwidth communication technologies such as millimeter wave, terahertz, free-space optical, and visible light communications. Understanding the vulnerabilities of these technologies to jamming attacks and developing effective countermeasures is essential for ensuring the success of 6G communication systems.
Covert communication technology enhances security and privacy in wireless systems.