Journal ArticleDOI
Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels
Reads0
Chats0
TLDR
It is proved that under the proposed protocols, the secrecy outage probability and the ε-outage secrecy capacity improve with increasing NA, as well as the secrecy diversity order and the secrecy array gain.Abstract:
We propose and analyze transmit antenna selection (TAS) to enhance physical layer security in a wiretap channel with NA antennas at the transmitter, NB antennas at the receiver, and NE antennas at the eavesdropper. We focus on the practical scenario where the transmitter does not have any channel state information (CSI) of the eavesdropper's channel. The transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the receiver. The receiver and the eavesdropper employ either maximal-ratio combining (MRC) or selection combining (SC) to combine the received signals. For the proposed protocols, we derive new closed-form expressions for the probability of non-zero secrecy capacity. We consider Nakagami-m fading with non-identical fading parameters of the main channel, mB, and of the eavesdropper's channel, mE. Next, we derive new closed-form expressions for the exact secrecy outage probability, based on which the e-outage secrecy capacity is characterized. Based on the exact expressions, we derive the asymptotic secrecy outage probability which accurately reveals the secrecy diversity order and the secrecy array gain. We confirm that the proposed protocols achieve identical secrecy diversity orders of NANBmB. An interesting conclusion is reached that this diversity order is independent of NE and mE. Furthermore, we prove that under the proposed protocols, the secrecy outage probability and the e-outage secrecy capacity improve with increasing NA.read more
Citations
More filters
Journal ArticleDOI
On the Security of Cognitive Radio Networks
TL;DR: The cognitive wiretap channel is considered and multiple antennas are proposed to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver.
Journal ArticleDOI
A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions
Ang Li,Danilo Spano,Jevgenij Krivochiza,Stavros Domouchtsidis,Christos G. Tsinos,Christos Masouros,Symeon Chatzinotas,Yonghui Li,Branka Vucetic,Bjorn Ottersten +9 more
TL;DR: The definition of constructive interference (CI) is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed.
Journal ArticleDOI
Interplay Between NOMA and Other Emerging Technologies: A Survey
TL;DR: A comprehensive survey of the interplay between NOMA and many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative communications, visible light communications, physical layer security, energy harvesting, wireless caching, and so on.
Journal ArticleDOI
Secure Transmission With Antenna Selection in MIMO Nakagami-m Fading Channels
TL;DR: This paper considers transmit antenna selection (TAS) and receive generalized selection combining (GSC) for secure communication in the multiple-input-multiple-output wiretap channel, where confidential messages transmitted from an NA-antenna transmitter to an NB-ant antenna legitimate receiver are overheard by an NE-ant Jenna eavesdropper.
Journal ArticleDOI
Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels
TL;DR: This work analyzes and optimize the secrecy performance of artificial noise in multi-input single-output wiretap channels with multiple antennas at the transmitter and a single antenna at the receiver and the eavesdropper and determines the optimal power allocation between the information signal and the AN signal.
References
More filters
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Broadcast channels with confidential messages
Imre Csiszár,János Körner +1 more
TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI
The Gaussian wire-tap channel
TL;DR: Wyner's results for discrete memoryless wire-tap channels are extended and it is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels.
Journal ArticleDOI
Wireless Information-Theoretic Security
TL;DR: A practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security and is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.