Secrecy in MIMO Networks with No Eavesdropper CSIT

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relay Secrecy in Wireless Networks with Eavesdropper

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a sch...

متن کامل

Multiuser MIMO degrees of freedom with no CSIT

We provide the characterization of the degrees of freedom (DOF) region for a 2-user fading MIMO broadcast channel when perfect channel knowledge is available to the receivers and no channel knowledge is available to the transmitters. The results are applied to find the DOF region for some special cases of a 2-user MIMO interference channel. We also extend the outerbound of the DOF region to fin...

متن کامل

On TDMA Optimality in Locally Connected Networks with no CSIT

In this work, we study scenarios of wireless networks where using simple Time-Division-Multiple-Access (TDMA) is optimal if no channel state information is available at the transmitters (no CSIT). We consider single-hop locally connected interference networks where each transmitter is connected to the receiver that has the same index as well as L succeeding receivers. The considered rate criter...

متن کامل

Secrecy Rate of Cooperative MIMO in Presence of a Location Constrained Eavesdropper

We propose and study the secrecy cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in presence of an eavesdropper with certain location constraint. The cooperative MIMO is formed by temporarily activating clusters of nearby trusted devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume...

متن کامل

The Relay-Eavesdropper Channel: Cooperation for Secrecy

This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Communications

سال: 2017

ISSN: 0090-6778

DOI: 10.1109/tcomm.2017.2705054