2020
DOI: 10.1109/tvt.2020.2978412
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security of QSTBC With Power Scaling in MIMO Wiretap Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…We estimate the secrecy performance in terms of C s in (27), and Figure 3 compares the simulation results of the average secrecy capacity. For comparative purpose, we implement a number of conventional schemes: (1) the Alamouti scheme [15], (2) the LD-QO-STBC scheme [14], (3) the QO-STBC scheme with power scaling [13], (4) the Alamouti scheme with AN [10], and (5) the proposed scheme. Because we assume that Bob and Eve have perfect CSI of their own and the same SNR, the secrecy capacities of the conventional schemes without any AN or AI, i.e., (1), (2), and (3), are almost zero.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…We estimate the secrecy performance in terms of C s in (27), and Figure 3 compares the simulation results of the average secrecy capacity. For comparative purpose, we implement a number of conventional schemes: (1) the Alamouti scheme [15], (2) the LD-QO-STBC scheme [14], (3) the QO-STBC scheme with power scaling [13], (4) the Alamouti scheme with AN [10], and (5) the proposed scheme. Because we assume that Bob and Eve have perfect CSI of their own and the same SNR, the secrecy capacities of the conventional schemes without any AN or AI, i.e., (1), (2), and (3), are almost zero.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…as an encryption key used at the transmitter side where b tx k (1 ≤ k ≤ K) denotes a binary number generated from the estimated CSI and K (≤ N M r ) indicates the length of the key. 4 Furthermore, let H = {h 1 , • • • , h K } denote selected K channel coefficients among the channel coefficients over all N M r subcarriers. Then, each bit of w tx is extracted from H using binarization as follows:…”
Section: B Procedures Of the Constellation Mapping Index Sharingmentioning
confidence: 99%
“…The transmitter first applies error-correcting encoding (e.g., convolutional coding) on s using an encoding function f enc (•) and thus it obtains s enc = f enc (s). In particular, s enc 4 wtx is obtained using pilots sent by the receiver before data transmission. For example, a request-to-send/clear-to-send (RTS/CTS) protocol in IEEE 802.11 wireless local area network can be used [23].…”
Section: ) Reliable Transmission Of the Wireless Keymentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the broadcast nature of wireless channels, wireless multi-user communications are very susceptible to eavesdropping. Traditionally, wireless security is ensured by data cryptography techniques, which mainly depend on secret keys and also rely on the limited computational power of eavesdroppers [1][2][3][4]. However, future wireless systems demand ubiquitous coverage and large-scale deployment of wireless radio devices.…”
Section: Introductionmentioning
confidence: 99%