2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) 2011
DOI: 10.1109/acssc.2011.6190083
|View full text |Cite
|
Sign up to set email alerts
|

Secure space-time block coding via artificial noise alignment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…This scrambles the PSK symbols in all the directions other than that of the legitimate receiver. Other strategies for securing communications without the knowledge of the eavesdropper's channel are proposed in [50] and [52]. Zhang et al develop a Tomlinson-Harashima precoding in [50] where the transmitter allocates part of its power in order to achieve a target mean squared error (MSE) at the legitimate receiver, and the remaining power is used to transmit artificial noise to degrade the eavesdropper's reception.…”
Section: Perfect Mcsi Onlymentioning
confidence: 99%
“…This scrambles the PSK symbols in all the directions other than that of the legitimate receiver. Other strategies for securing communications without the knowledge of the eavesdropper's channel are proposed in [50] and [52]. Zhang et al develop a Tomlinson-Harashima precoding in [50] where the transmitter allocates part of its power in order to achieve a target mean squared error (MSE) at the legitimate receiver, and the remaining power is used to transmit artificial noise to degrade the eavesdropper's reception.…”
Section: Perfect Mcsi Onlymentioning
confidence: 99%
“…The fact that STBCs were designed to operate without CSIT and have low complexity raises the question if they can also be applied to secrecy scenarios. The limited work in this area includes [84]- [86], for MIMO scenarios with multiple transmit and receive antennas. Fakoorian et al [84] proposed a rate-one secure STBC that allows for separable, low complexity (symbolwise) decoding at the intended receiver but not at the EFC (which must perform ML detection).…”
Section: Secure Space-time Codingmentioning
confidence: 99%
“…The limited work in this area includes [84]- [86], for MIMO scenarios with multiple transmit and receive antennas. Fakoorian et al [84] proposed a rate-one secure STBC that allows for separable, low complexity (symbolwise) decoding at the intended receiver but not at the EFC (which must perform ML detection). This is achieved by ensuring that the effective STBC precoding matrix over two time slots has orthogonal columns when seen at the intended receiver, however, this scheme assumes complete CSIT of the main channel.…”
Section: Secure Space-time Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, interference emerges as a potentially valuable resource for wireless network secrecy [2]. The idea of enhancing network secrecy through the use of interference has been investigated in several recent works, under the name of artificial noise [3], [4], artificial noise alignment [5], [6], friendly jamming [7], [8], or cooperative jamming [9]- [12]. A major challenge in utilizing interference to enhance secrecy is L. Ruan that while impeding the ERs, interference affects the LRs as well.…”
Section: A Background and Surveymentioning
confidence: 99%