2017
DOI: 10.1109/tcomm.2017.2705054
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy in MIMO Networks with No Eavesdropper CSIT

Abstract: We consider two fundamental multi-user channel models: the multiple-input multipleoutput (MIMO) wiretap channel with one helper (WTH) and the MIMO multiple access wiretap channel (MAC-WT). In each case, the eavesdropper has K antennas while the remaining terminals have N antennas each. We consider a fast fading channel where the channel state information (CSI) of the legitimate receiver is available at the transmitters but no channel state information at the transmitters (CSIT) is available for the eavesdroppe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Over the past few years, wireless security has grown up to be a hot topic concerned by researchers [12]- [14]. Due to the broadcast characteristics of wireless channels, information transmission is vulnerable to eavesdropping by illegal users, which seriously threaten the privacy and security of the wireless communication network.…”
Section: A Backgroundmentioning
confidence: 99%
“…Over the past few years, wireless security has grown up to be a hot topic concerned by researchers [12]- [14]. Due to the broadcast characteristics of wireless channels, information transmission is vulnerable to eavesdropping by illegal users, which seriously threaten the privacy and security of the wireless communication network.…”
Section: A Backgroundmentioning
confidence: 99%
“…Wireless security has attracted more and more attention of researchers in recent years [11][12][13]. Due to the broadcast characteristics of wireless links, legitimate transmission is more vulnerable to eavesdropping attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, PLS technology has a huge advantage for protecting the confidential communication between a source node to its destination as studied [9][10]. The PLS in the wireless networks with cooperative relaying, jamming, multiuser scheduling, multiple-input-multiple-output (MIMO) ..etc have been proposed and investigated in [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%