2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) 2011
DOI: 10.1109/acssc.2011.6189984
|View full text |Cite
|
Sign up to set email alerts
|

Explicit solution of worst-case secrecy rate for MISO wiretap channels with spherical uncertainty

Abstract: Abstract1 A multiple-input single-output (MISO) wiretap channel model is considered, that includes a multiantenna transmitter, a single-antenna legitimate receiver and a single-antenna eavesdropper. For the scenario in which spherical uncertainty for both the legitimate and the eavesdropper channels is included, the problem of finding the optimal input covariance that maximizes the worst-case secrecy rate subject to a power constraint, is considered, and an explicit expression for the maximum worst-case secrec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…In order to guarantee secrecy for any admissible ECSI uncertainties, including worst, the worst-case secrecy rate (WCSR) [33,39,40] is adopted as the performance metric, which is defined as the minimum secrecy rate for any error in the uncertainty region of the channel,…”
Section: B Problem Formulationmentioning
confidence: 99%
“…In order to guarantee secrecy for any admissible ECSI uncertainties, including worst, the worst-case secrecy rate (WCSR) [33,39,40] is adopted as the performance metric, which is defined as the minimum secrecy rate for any error in the uncertainty region of the channel,…”
Section: B Problem Formulationmentioning
confidence: 99%
“…One typical scenario is that in which the transmitter only knows that the norm of the channel to the eavesdropper varies in a range g ≤ [6]. In this case, a viable approach is to resort to robust optimization, considering the following worst-case energy-efficient problem formulation,…”
Section: B Partial Csimentioning
confidence: 99%
“…Additionally, these multi-antenna secure transmission schemes have been fully investigated over the various wireless communications systems, including conventional cellular systems [7], wireless powered heterogeneous network [8,9], hybrid satellite-terrestrial relay network [10], device-to-device underlaid cellular network [11], energy harvesting cognitive radio network [12] etc. Generally speaking, most of the multi-antenna secure transmission schemes fall into two broad categories: transmit beamforming [12][13][14][15][16][17] and joint optimisation of beamforming and artificial noise (AN) [9,[18][19][20][21]. To cater to the legitimate receiver and interfere with the eavesdroppers, these two types of approaches depend on the amount and degree of channel state information at the transmitter (CSIT) heavily.…”
Section: Introductionmentioning
confidence: 99%
“…Assuming perfect LCSI, in both cases of perfect and imperfect instantaneous ECSI, Li et al [19] aimed at multi-eavesdropper secrecy rate maximisation (SRM) by optimising transmit covariances for the confidential signal and spatially selective AN jointly. In scenarios where LCSI and ECSI are both imperfect at the transmitter, the authors of [13,17] discussed the optimal RBF without AN.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation