Secrecy Capacity Analysis of MIMO System over Multiple Destinations and Multiple Eavesdroppers (original) (raw)
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
References
- Forouzan, B. A. (2004). Cryptography and network security. New York: McGraw Hill.
Google Scholar - Wyner, A. (1975). Wire-tap channel. Bell System Techinical Journal, 54(8), 1355–1387.
Article MathSciNet MATH Google Scholar - Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.
Article MathSciNet MATH Google Scholar - Leung Yan Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.
Article MathSciNet MATH Google Scholar - Swindlehurst, A.(2009) Fixed SINR solutions for the MIMO wiretap channel. In IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009. (pp. 2437–2440).
- Liao, W. C., Chang, T. H., Ma, W. K., & Chi, C. Y. (2011). QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Transactions on Signal Processing, 59(3), 1202–1216.
Article MathSciNet Google Scholar - Romero-Zurita, N., Ghogho, M., McLernon, D.(2011) Physical layer security of MIMO frequency selective channels by beamforming and noise generation. In 19th European signal processing conference, 2011, Aug 2011 (pp. 829–833).
- Ghogho, M., & Swami, A.(2011) Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers. In IEEE international conference on communications workshops (ICC), 2011, Jun 2011 (pp. 1–5).
- Shafiee, S., & Ulukus, S.(2007) Achievable rates in Gaussian MISO channels with secrecy constraints. In IEEE international symposium on information theory, ISIT 2007, June (pp. 2466–2470).
- Romero-Zurita, N., Ghogho, M., & McLernon, D. (2012). Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Processing Letter, 19(2), 71–74.
Article Google Scholar - Majhi, S., Qian, H., Xiang, W., Addepalli, S., & Gao, Z.(2011) Analysis of outage probability for opportunistic decode-and-forward relaying network over asymmetric fading channels. In 2011 third international conference on ubiquitous and future networks (ICUFN) (pp. 135–139).
- Pei, Y., Liang, Y. C., Zhang, L., Teh, K. C., & Li, K. H. (2010). Secure communication over MISO cognitive radio channels. IEEE Transactions on Wireless Communications, 9(4), 1494–1502.
Article Google Scholar - Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.
Article Google Scholar - Zappone, A., Lin, P. H., & Jorswieck, E. (2016). Energy efficiency of confidential multi-antenna systems with artificial noise and statistical CSI. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1462–1477.
Article Google Scholar - Kandukuri, S., & Boyd, S. (2002). Optimal power control in interference-limited fading wireless channels with outage-probability specifications. IEEE Transactions on Wireless Communications, 1(1), 46–55.
Article Google Scholar - Mukherjee, A., Swindlehurst, A. L.(2009) Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels. In IEEE 10th Workshop on Signal Processing Advances. Wireless Communications, 2009 (pp. 344–348).
- Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.
Article MathSciNet MATH Google Scholar - Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.
Article MathSciNet MATH Google Scholar