2015
DOI: 10.1109/twc.2015.2463818
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Secrecy Without Knowing the Number of Eavesdropper Antennas

Abstract: Abstract-The existing research on physical layer security commonly assumes the number of eavesdropper antennas to be known. Although this assumption allows one to easily compute the achievable secrecy rate, it can hardly be realized in practice. In this paper, we provide an innovative approach to study secure communication systems without knowing the number of eavesdropper antennas by introducing the concept of spatial constraint into physical layer security. Specifically, the eavesdropper is assumed to have a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…Note that this assumption has been adopted in the previous work on the secrecy of NOMA systems [25]. In addition, we highlight that worst-case assumptions have been widely adopted in analyzing and designing transmission schemes with secrecy considerations; see, e.g., [23], [33], [34].…”
Section: A Noma Schemementioning
confidence: 99%
“…Note that this assumption has been adopted in the previous work on the secrecy of NOMA systems [25]. In addition, we highlight that worst-case assumptions have been widely adopted in analyzing and designing transmission schemes with secrecy considerations; see, e.g., [23], [33], [34].…”
Section: A Noma Schemementioning
confidence: 99%
“…). Finally, substituting Ω * = WΦ * = (N t − 1)w I into (16) we achieve the result given in (17). As per Theorem 1, the instantaneous SINR at Eve of the CPA for a given α is given by…”
Section: B Correlation-based Power Allocationmentioning
confidence: 70%
“…To the best knowledge of the authors, in the context of physical layer security the study on antenna correlation is still in its infancy. The impact of receiver-side correlation at Bob and Eve on the system performance was examined in [16] and [17], while the impact of the transmitter-side correlation has never been examined in the literature. This leaves an important gap in our understanding on the performance of the secure transmission with AN, and closing this gap forms the core of this work.…”
Section: A Background and Motivationmentioning
confidence: 99%
“…For any given R b and R s , the optimal α is still given by (16). We find that the closed-form solutions of the optimal R b and R s are mathematically intractable due to the complicated expression for the PDF of the received SNR at Bob, i.e., (7). The optimal R b and R s for the design problem can be obtained only by numerically solving max…”
Section: A Problem Formulationmentioning
confidence: 99%