scispace - formally typeset
Journal ArticleDOI

Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels

Reads0
Chats0
TLDR
It is proved that under the proposed protocols, the secrecy outage probability and the ε-outage secrecy capacity improve with increasing NA, as well as the secrecy diversity order and the secrecy array gain.
Abstract
We propose and analyze transmit antenna selection (TAS) to enhance physical layer security in a wiretap channel with NA antennas at the transmitter, NB antennas at the receiver, and NE antennas at the eavesdropper. We focus on the practical scenario where the transmitter does not have any channel state information (CSI) of the eavesdropper's channel. The transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the receiver. The receiver and the eavesdropper employ either maximal-ratio combining (MRC) or selection combining (SC) to combine the received signals. For the proposed protocols, we derive new closed-form expressions for the probability of non-zero secrecy capacity. We consider Nakagami-m fading with non-identical fading parameters of the main channel, mB, and of the eavesdropper's channel, mE. Next, we derive new closed-form expressions for the exact secrecy outage probability, based on which the e-outage secrecy capacity is characterized. Based on the exact expressions, we derive the asymptotic secrecy outage probability which accurately reveals the secrecy diversity order and the secrecy array gain. We confirm that the proposed protocols achieve identical secrecy diversity orders of NANBmB. An interesting conclusion is reached that this diversity order is independent of NE and mE. Furthermore, we prove that under the proposed protocols, the secrecy outage probability and the e-outage secrecy capacity improve with increasing NA.

read more

Citations
More filters
Journal ArticleDOI

Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback

TL;DR: This paper derives exact closed-form expressions for the probabilities of achieving positive secrecy rate and secrecy outage in the case of imperfect feedback due to feedback delay and/or feedback error and derives the asymptotic secrecy outage probability at high SNR which accurately reveals the secrecy diversity loss due to imperfect feedback.
Journal ArticleDOI

Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- $m$ Fading Channels

TL;DR: This paper investigates the secrecy performance of multiuser dual-hop relay networks where a base station communicates with multiple legitimate users through the assistance of a trustful regenerative relay in the presence of multiple eavesdroppers and derives new exact and asymptotic closed-form expressions for the ergodic secrecy rate (ESR).
Journal ArticleDOI

Optimization of Code Rates in SISOME Wiretap Channels

TL;DR: In this paper, the authors proposed a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdroppers's channel is not available at the transmitter.
Posted Content

Interplay Between NOMA and Other Emerging Technologies: A Survey.

Abstract: Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the user fairness in wireless networks, by allowing more than one user to share one wireless resource. NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative communications, visible light communications, physical layer security, energy harvesting, wireless caching, and so on. Combination of NOMA with these technologies can further increase scalability, spectral efficiency, energy efficiency, and greenness of future communication networks. This paper provides a comprehensive survey of the interplay between NOMA and the above technologies. The emphasis is on how the above techniques can benefit from NOMA and vice versa. Moreover, challenges and future research directions are identified.
Journal ArticleDOI

A New Secure Transmission Scheme With Outdated Antenna Selection

TL;DR: It is demonstrated that the outdated TAS reduces the secrecy diversity order from NA NB to NB, and antenna correlation improves the secrecy performance at low SNR but deteriorates the secrecyperformance at medium and high SNRs, by affecting the secrecy array gain only.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Broadcast channels with confidential messages

TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI

The Gaussian wire-tap channel

TL;DR: Wyner's results for discrete memoryless wire-tap channels are extended and it is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels.
Journal ArticleDOI

Wireless Information-Theoretic Security

TL;DR: A practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security and is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.
Related Papers (5)