2013
DOI: 10.1109/lcomm.2013.060513.130802
|View full text |Cite
|
Sign up to set email alerts
|

Artificial-Noise Alignment for Secure Multicast using Multiple Antennas

Abstract: We propose an artificial-noise alignment scheme for multicasting a common-confidential message to a group of legitimate receivers. Our scheme transmits a superposition of information and noise symbols. At each legitimate receiver, the noise symbols are aligned in such a way that the information symbols can be decoded with high probability. In contrast, the noise symbols completely mask the information symbols at the eavesdroppers. Our proposed scheme does not use the knowledge of the eavesdropper's channel gai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
21
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 6 publications
1
21
0
Order By: Relevance
“…Another dimension to explore against non-degraded eavesdroppers is that of a jamming receiver. While interference alignment is a promising approach [3] for effective jamming of eavesdroppers with reduced impact on legitimate receivers, current designs suffer from several shortcomings and limiting assumptions. For example, most works are of theoretical nature and their applicability in practical scenarios with several decentralized interferers depends on strict synchronization among devices.…”
Section: B Ufh For Secret Key Establishmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Another dimension to explore against non-degraded eavesdroppers is that of a jamming receiver. While interference alignment is a promising approach [3] for effective jamming of eavesdroppers with reduced impact on legitimate receivers, current designs suffer from several shortcomings and limiting assumptions. For example, most works are of theoretical nature and their applicability in practical scenarios with several decentralized interferers depends on strict synchronization among devices.…”
Section: B Ufh For Secret Key Establishmentmentioning
confidence: 99%
“…These works typically assume that an eavesdropper adversary is, at least in some periods of time, in a degraded situation. This can be enabled, for instance, by (a) having the eavesdropper on a disadvantaged position/location with respect to the legitimate receiver, (b) the eavesdropper suffering interference [2] that can possibly be removed at the legitimate receiver [3], or (c) using relays to improve the quality of information available at the receiver [4]. This is legitimate if, for example, there is a protected area such as a warehouse of RFID devices where eavesdroppers are not able to enter [5], or cooperative devices are able to strictly synchronize with legitimate devices.…”
Section: Introductionmentioning
confidence: 99%
“…The general solution is to guarantee the robust secrecy performance in the worst case and to design a suboptimal algorithm. Also, there exist other tactical methods, such as the artificial noise alignment schemes [16] that do not use the knowledge of the eavesdroppers channel gains. Among these schemes, few of them consider a network model with a mobile eavesdropper, whose CSI is unknown to legitimate users because of the unexpected movement.…”
Section: Introductionmentioning
confidence: 99%
“…In this case, the message signals and the cooperative jamming signals are sent in such a way that: 1) all M + 1 cooperative jamming signals are aligned at the legitimate receiver in the same irrational dimension, and 2) all cooperative jamming signals span the entire space at the eavesdropper to limit the information leakage to the eavesdropper. We use insights from [3], which developed a new achievable scheme that achieved the same secure d.o.f. as in [26] without eavesdropper CSI, to show that the information leakage to the eavesdropper is upper bounded by a function, which can be made arbitrarily small.…”
Section: Introductionmentioning
confidence: 99%