Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2019
DOI: 10.1109/tcomm.2018.2877329
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate of Cooperative MIMO in the Presence of a Location Constrained Eavesdropper

Abstract: We propose and study the cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in the presence of an eavesdropper with certain location constraint. The cooperative MIMO system in this paper (referred to as Reconfigurable Distributed MIMO) is formed by temporarily activating clusters of nearby trusted mobile devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume that the transmitters apply a practical eige… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…2) In the secrecy rate construction, the Shannon rate of the legitimate channel is lower-bounded by Minkowski's inequality of the information rate of an equivalent lower dimensional MIMO channel, which avoids the cumbersome zonal polynomials. On the other hand, the Shannon rate of the eavesdropping channel is obtained by exploiting the random position of the eigenspaces of the legitimate and eavesdropping channel matrices, where the Haar matrix insertion technique of [39] is applied. 3) In the secrecy rate optimization, an alternating optimization framework is proposed for designing the transmit signals and the deployment of the UAV for circumventing the non-convexity of the objective function.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…2) In the secrecy rate construction, the Shannon rate of the legitimate channel is lower-bounded by Minkowski's inequality of the information rate of an equivalent lower dimensional MIMO channel, which avoids the cumbersome zonal polynomials. On the other hand, the Shannon rate of the eavesdropping channel is obtained by exploiting the random position of the eigenspaces of the legitimate and eavesdropping channel matrices, where the Haar matrix insertion technique of [39] is applied. 3) In the secrecy rate optimization, an alternating optimization framework is proposed for designing the transmit signals and the deployment of the UAV for circumventing the non-convexity of the objective function.…”
Section: Contributionsmentioning
confidence: 99%
“…To avoid the aforementioned issues, we observe that the precoder is aligned with the eigenspace of the legitimate channel, while it is randomly projected into the eigenspace of the eavesdropping channels. Therefore, we follow the HMI technique proposed in [39], which approximates the information rate (19) by replacing the fixed unitary matrix V by the randomly distributed unitary Haar matrix. The approximations are rendered accurate by beneficially exploiting the random relative positions between the eigenspaces of the legitimate and the eavesdropping channels.…”
Section: B Information Rate Of Eavesdropping Channelmentioning
confidence: 99%
See 1 more Smart Citation
“…Particularly, the authors propose the rationale of reconfiguration of distributed mobile MIMO systems. In [6], the authors study RD-MIMO schemes in the context of physical layer security with constrained location eavesdroppers. In [7], the authors improve the robustness of the physical layer security of RD-MIMO schemes by allowing full-duplex receivers to jam the eavesdroppers.…”
Section: B Related Workmentioning
confidence: 99%
“…The work in [14] was done based on a Rayleigh fading channel, as Rayleigh fading is a reasonable model for heavily builtup urban environments [12], which has been extended to uncorrelated Rician fading channels via a non-central Wishart matrix in [15]. Zheng et al also used eigen-subchannels for AN signal transmission, but treated the AN as interference signals due to the lack of proper AN elimination techniques [16].…”
Section: Introductionmentioning
confidence: 99%