2011
DOI: 10.1109/tsp.2011.2161298
|View full text |Cite
|
Sign up to set email alerts
|

Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer

Abstract: We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an eavesdropper and an external helper, each equipped with multiple antennas. The transmitter sends confidential messages to its intended receiver, while the helper transmits jamming signals independent of the source message to confuse the eavesdropper. The jamming signal is assumed to be treated as noise at both the intended receiver and the eavesdropper. We obtain a closed-form expression for the structure of the artificial… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
73
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(73 citation statements)
references
References 20 publications
0
73
0
Order By: Relevance
“…Specifically, the SC can make the transmission from the source node to the legitimate destination node secure while achieving zero mutual information between the source node and malicious eavesdropper node. Based on this idea, extensive research efforts have been devoted to improving the SC from an information-theoretic perspective under different scenarios, for example, cooperative relaying [12][13][14][15] and beamforming techniques [16,17], cooperative jamming (CJ) methods [18][19][20], and multiple-input multipleoutput (MIMO) schemes [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, the SC can make the transmission from the source node to the legitimate destination node secure while achieving zero mutual information between the source node and malicious eavesdropper node. Based on this idea, extensive research efforts have been devoted to improving the SC from an information-theoretic perspective under different scenarios, for example, cooperative relaying [12][13][14][15] and beamforming techniques [16,17], cooperative jamming (CJ) methods [18][19][20], and multiple-input multipleoutput (MIMO) schemes [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…To further improve physical layer security, artificial noise (AN) or cooperative jamming (CJ) approach has been introduced in the secrecy system by embedding *Correspondence: feizesong@bit.edu.cn School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China noise or jamming signal in the transmitted signal to confuse eavesdroppers [8][9][10][11]. In addition to helping relay the desirable information signals from source nodes to destination nodes, trusted relays can also implement CJ [12,13] to confuse the potential eavesdroppers by simultaneously sending jamming signals together with the information signals.…”
Section: Introductionmentioning
confidence: 99%
“…One way to achieve non-zero secrecy rate in this case is to introduce multi-antenna nodes [3][4][5][6][7][8][9][10][11], wherein multiantenna techniques can enable directional transmission, thus allowing secret communication even when the eavesdropper's channel has a much better quality. However, due to the cost or size limitations, multi-antenna nodes may not be available in some practical applications.…”
Section: Introductionmentioning
confidence: 99%