Secrecy in MIMO Networks with No Eavesdropper CSIT
نویسندگان
چکیده
منابع مشابه
Relay Secrecy in Wireless Networks with Eavesdropper
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a sch...
متن کاملMultiuser MIMO degrees of freedom with no CSIT
We provide the characterization of the degrees of freedom (DOF) region for a 2-user fading MIMO broadcast channel when perfect channel knowledge is available to the receivers and no channel knowledge is available to the transmitters. The results are applied to find the DOF region for some special cases of a 2-user MIMO interference channel. We also extend the outerbound of the DOF region to fin...
متن کاملOn TDMA Optimality in Locally Connected Networks with no CSIT
In this work, we study scenarios of wireless networks where using simple Time-Division-Multiple-Access (TDMA) is optimal if no channel state information is available at the transmitters (no CSIT). We consider single-hop locally connected interference networks where each transmitter is connected to the receiver that has the same index as well as L succeeding receivers. The considered rate criter...
متن کاملSecrecy Rate of Cooperative MIMO in Presence of a Location Constrained Eavesdropper
We propose and study the secrecy cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in presence of an eavesdropper with certain location constraint. The cooperative MIMO is formed by temporarily activating clusters of nearby trusted devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume...
متن کاملThe Relay-Eavesdropper Channel: Cooperation for Secrecy
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2017
ISSN: 0090-6778
DOI: 10.1109/tcomm.2017.2705054