Secrecy Capacity Analysis of MIMO System over Multiple Destinations and Multiple Eavesdroppers (original) (raw)

Access this article

Log in via an institution

Subscribe and save

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Forouzan, B. A. (2004). Cryptography and network security. New York: McGraw Hill.
    Google Scholar
  2. Wyner, A. (1975). Wire-tap channel. Bell System Techinical Journal, 54(8), 1355–1387.
    Article MathSciNet MATH Google Scholar
  3. Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.
    Article MathSciNet MATH Google Scholar
  4. Leung Yan Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.
    Article MathSciNet MATH Google Scholar
  5. Swindlehurst, A.(2009) Fixed SINR solutions for the MIMO wiretap channel. In IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009. (pp. 2437–2440).
  6. Liao, W. C., Chang, T. H., Ma, W. K., & Chi, C. Y. (2011). QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Transactions on Signal Processing, 59(3), 1202–1216.
    Article MathSciNet Google Scholar
  7. Romero-Zurita, N., Ghogho, M., McLernon, D.(2011) Physical layer security of MIMO frequency selective channels by beamforming and noise generation. In 19th European signal processing conference, 2011, Aug 2011 (pp. 829–833).
  8. Ghogho, M., & Swami, A.(2011) Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers. In IEEE international conference on communications workshops (ICC), 2011, Jun 2011 (pp. 1–5).
  9. Shafiee, S., & Ulukus, S.(2007) Achievable rates in Gaussian MISO channels with secrecy constraints. In IEEE international symposium on information theory, ISIT 2007, June (pp. 2466–2470).
  10. Romero-Zurita, N., Ghogho, M., & McLernon, D. (2012). Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Processing Letter, 19(2), 71–74.
    Article Google Scholar
  11. Majhi, S., Qian, H., Xiang, W., Addepalli, S., & Gao, Z.(2011) Analysis of outage probability for opportunistic decode-and-forward relaying network over asymmetric fading channels. In 2011 third international conference on ubiquitous and future networks (ICUFN) (pp. 135–139).
  12. Pei, Y., Liang, Y. C., Zhang, L., Teh, K. C., & Li, K. H. (2010). Secure communication over MISO cognitive radio channels. IEEE Transactions on Wireless Communications, 9(4), 1494–1502.
    Article Google Scholar
  13. Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.
    Article Google Scholar
  14. Zappone, A., Lin, P. H., & Jorswieck, E. (2016). Energy efficiency of confidential multi-antenna systems with artificial noise and statistical CSI. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1462–1477.
    Article Google Scholar
  15. Kandukuri, S., & Boyd, S. (2002). Optimal power control in interference-limited fading wireless channels with outage-probability specifications. IEEE Transactions on Wireless Communications, 1(1), 46–55.
    Article Google Scholar
  16. Mukherjee, A., Swindlehurst, A. L.(2009) Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels. In IEEE 10th Workshop on Signal Processing Advances. Wireless Communications, 2009 (pp. 344–348).
  17. Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.
    Article MathSciNet MATH Google Scholar
  18. Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.
    Article MathSciNet MATH Google Scholar

Download references