Securing Wireless Communications at the Physical Layer 2009
DOI: 10.1007/978-1-4419-1385-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity of Independent Parallel Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
155
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 124 publications
(162 citation statements)
references
References 14 publications
4
155
0
Order By: Relevance
“…Our results generalize the secrecy capacity results that have been recently obtained in [12], [13] and [14] (full CSI case). We have also studied the outage performance of the fading BCC.…”
Section: Discussionsupporting
confidence: 89%
See 1 more Smart Citation
“…Our results generalize the secrecy capacity results that have been recently obtained in [12], [13] and [14] (full CSI case). We have also studied the outage performance of the fading BCC.…”
Section: Discussionsupporting
confidence: 89%
“…Compared to the fading wire-tap channel studied in [12] (the conference version of this paper), [13] and [14] (full CSI case), the fading BCC we study in this paper assumes that the source node has a common message for both receivers in addition to the confidential message for receiver 1. Hence the fading BCC includes the fading wire-tap channel as a special case.…”
Section: Introductionmentioning
confidence: 99%
“…We also note that, despite this, for all the channels where secrecy capacity has been identified, e.g., the scalar Gaussian channel [17], the parallel Gaussian channel which also models the fading Gaussian wiretap channel where all the parties know the instantaneous realizations of all the fading channel gains [18,19], and the MIMO Gaussian channel [20][21][22], this selection has been shown to be optimal. However, there are channels, such as the fading Gaussian wiretap channel without channel state information of the wiretapper at the transmitter [23], it was shown that choosing V = X is strictly suboptimal.…”
Section: Information Theoretic Secrecymentioning
confidence: 99%
“…In [9][10][11][12], resource allocation schemes of OFDM secrecy systems were studied in the case of single-user system, two-user system, and multiuser system, respectively. Specifically, joint power and subcarrier allocation were investigated for the network with the coexistence of secure users and normal users [11].…”
Section: Introductionmentioning
confidence: 99%