2015
DOI: 10.1109/jsac.2015.2430211
|View full text |Cite
|
Sign up to set email alerts
|

Location-Based Secure Transmission for Wiretap Channels

Abstract: Location information has been shown to be useful for a wide variety of applications in wireless networks, while its role in physical layer security has so far drawn little attention. In this work, we propose a new location-based secure transmission scheme for wiretap channels, where the accurate locations of the sources, destinations and any other authorized transceivers are known, but only an estimate of the eavesdropper's location is available. We outline how such an estimate of the eavesdropper's location c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 49 publications
(29 citation statements)
references
References 69 publications
0
29
0
Order By: Relevance
“…In this section, we focus on solving Problem 1. By substituting (18) into (15) and (30) into (16), the RTP p  (T) and the CTP p e (T) are, respectively, calculated as (31) and (32), as shown at the top of the next page.…”
Section: Secrecy Performance Optimizationmentioning
confidence: 99%
“…In this section, we focus on solving Problem 1. By substituting (18) into (15) and (30) into (16), the RTP p  (T) and the CTP p e (T) are, respectively, calculated as (31) and (32), as shown at the top of the next page.…”
Section: Secrecy Performance Optimizationmentioning
confidence: 99%
“…As Es' location changes, the proposed beamforming design is able to adapt dynamically to ensure the secure communications of Alice based on the associated channels. Note that the location-based secure robust beamforming design is beyond the scope of this paper, while the interested readers can refer to [28] and the reference therein for more information. Let the channel coefficients over links…”
Section: System Modelmentioning
confidence: 99%
“…For ease of exposition, here we will determine a CRB estimate of the location error bounds given some Gaussian distribution on the ToA timing errors (e.g. [28]- [30]). In the following we denote the true location of the decryptor by ζ 0 = [x 0 , y 0 ] and the location of the n th RS by ζ n = [x n , y n ].…”
Section: The Decrypting Regionmentioning
confidence: 99%