2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU) 2015
DOI: 10.1109/icmu.2015.7061056
|View full text |Cite
|
Sign up to set email alerts
|

Outage performance of secure multicasting in the presence of multiple eavesdroppers

Abstract: Abstract-Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a singleantenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Rayleigh fading channel [22]. Previous system models either considered the existence of a single eavesdropper [20] or ignored the antenna correlation [5] in multi-antenna systems. To the authors' knowledge, the effect of the correlation between antennas in the multi-eavesdropper SIMO system on the secrecy performance has not been considered.…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Rayleigh fading channel [22]. Previous system models either considered the existence of a single eavesdropper [20] or ignored the antenna correlation [5] in multi-antenna systems. To the authors' knowledge, the effect of the correlation between antennas in the multi-eavesdropper SIMO system on the secrecy performance has not been considered.…”
Section: System Modelmentioning
confidence: 99%
“…Substituting (5) and (11) into (13) and making some basic mathematical operations, the new closed-form expression of the SOP is formulated as (14)…”
Section: Secrecy Performancementioning
confidence: 99%
See 2 more Smart Citations
“…Similar to [8]- [9], the authors in [12] only evaluated the SOP at the cooperative phase with different combining techniques at the destination. Published works [13]- [14] introduced theoretical models for secured multicasting systems. In particular, the multi-user-based cooperative protocol was investigated in [13], while [14] considered the secured communication between a single-antenna transmitter and multiple multi-antenna receivers, in presence of multiple multi-antenna eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%