2009 IEEE International Symposium on Information Theory 2009
DOI: 10.1109/isit.2009.5205955
|View full text |Cite
|
Sign up to set email alerts
|

On the delay limited secrecy capacity of fading channels

Abstract: In this paper, the delay limited secrecy capacity of the flat fading channel is investigated under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the secure delay limited capacity are derived and shown to be tight in the high signal-to-noise ratio (SNR) regime (for a wide class of channel distributions). In the second scenario, only the mai… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(36 citation statements)
references
References 11 publications
0
36
0
Order By: Relevance
“…It was shown in [6] that, one can avoid a secrecy outage over block t, even when R s (t) = 0 by introducing private key queues at the transmitter and the receiver. Our system, depicted in Fig.…”
Section: B Key Queue Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…It was shown in [6] that, one can avoid a secrecy outage over block t, even when R s (t) = 0 by introducing private key queues at the transmitter and the receiver. Our system, depicted in Fig.…”
Section: B Key Queue Modelmentioning
confidence: 99%
“…It is well known that, the method of sending secure information using the binning techniques inspired by the wiretap channel fails to secure the information at times when the eavesdropper channel has favorable conditions over the main channel, hence the delay 1 -limited secrecy capacity is 0, since outages are unavoidable. It was shown in [6] that, interestingly, a nonzero secrecy rate could be achieved by introducing private key queues at both the transmitter and the receiver. The work exploits the times at which the main channel is favorable over the eavesdropper channel to transmit some random private key bits along with the data bits.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations