2016
DOI: 10.14209/jcis.2016.2
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Performance of MIMO Wiretap Channels with Multiple Jamming Signals

Abstract: In this paper, assuming an interference-limited eavesdropper scenario, the secrecy outage performance of multiple-input multiple-output wiretap channels with transmit antenna selection is investigated. Considering that the transmitter (Tx) and the receiver (Rx) are equipped with NA and NB antennas, respectively, while the passive eavesdropper is set with NE antennas, closed-form expressions for the secrecy outage probability and non-zero secrecy rate are derived. In our analysis, both maximal-ratio combining (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(21 citation statements)
references
References 30 publications
0
21
0
Order By: Relevance
“…First, we assume that all channels undergo Rayleigh fading. Thus, according to the work of da Costa et al and complying to the independent and identically distributed fading conditions, the probability density function (pdf) and the cumulative distribution function (cdf) of γ B,ϕ can be respectively written as alignleftalign-1fnormalγB,ϕMRC(z)=zNB1eznormalγ¯normalBnormalγ¯normalBNBΓ(NB)align-2 and alignleftalign-1FnormalγB,ϕMRC(z)=1eznormalγ¯normalBu=0NB11u!znormalγ¯normalBu.align-2 …”
Section: Secrecy Performancementioning
confidence: 99%
See 3 more Smart Citations
“…First, we assume that all channels undergo Rayleigh fading. Thus, according to the work of da Costa et al and complying to the independent and identically distributed fading conditions, the probability density function (pdf) and the cumulative distribution function (cdf) of γ B,ϕ can be respectively written as alignleftalign-1fnormalγB,ϕMRC(z)=zNB1eznormalγ¯normalBnormalγ¯normalBNBΓ(NB)align-2 and alignleftalign-1FnormalγB,ϕMRC(z)=1eznormalγ¯normalBu=0NB11u!znormalγ¯normalBu.align-2 …”
Section: Secrecy Performancementioning
confidence: 99%
“…On the other hand, the analysis of the jamming signals affecting Eve is presented in the work of da Costa et al, and the pdf of γ I can be written as alignleftalign-1fnormalγnormalI(z)=i=1tj=1normalηinormalΩi,j(j1)!normalγ¯ijzj1eznormalγ¯i,align-2 with trueγ¯1,trueγ¯2,,trueγ¯t denoting different values with multiplicities η 1 , η 2 ,…, η t , such that i=1tηi=M, and Ω i , j is given by alignleftalign-1normalΩi,j=1(normalηij)!normalγ¯inormalηijnormalηijsnormalηijk=1,kit11+snormalγ¯knormalηks=1normalγ¯i.align-2 …”
Section: Secrecy Performancementioning
confidence: 99%
See 2 more Smart Citations
“…while at Eve the capacity is limited by the jamming (denoted by [8] as interference) generated by the relay node. Thus, we represent the signal-to-interference ratio (SIR) at Eve following the same notation of [8], so that Υ I = γAE γI , where γ I = nR k=0γ RE,k |h RE,k | 2 is the jamming interference, written as the sum of all jamming signals sent by each k-th antenna of the relay. As a result, the capacity of Eve's channel can be written as…”
Section: B Artificial-noise (An)mentioning
confidence: 99%