Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers
نویسندگان
چکیده
منابع مشابه
Relay Secrecy in Wireless Networks with Eavesdroppers
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose sched...
متن کاملState Estimation with Secrecy against Eavesdroppers
We study the problem of remote state estimation, in the presence of an eavesdropper. An authorized user estimates the state of a linear plant, based on the data received from a sensor, while the data may also be intercepted by the eavesdropper. To maintain confidentiality with respect to state, we introduce a novel control-theoretic definition of perfect secrecy requiring that the user’s expect...
متن کاملOn MISO Broadcast Channel With Alternating CSIT and Secrecy Constraints
We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which is available to each receiver is conveyed either perfectly (P) or with delay (D) to the transmitter. Denoting by S1, S2, and S3 the channel state information at the transmitter (CSIT) of user 1, ...
متن کاملSecrecy Rate Region of Miso Interference Channel: Pareto Boundary and Non-cooperative Games
Competition in interference channels is modeled using noncooperative game theory. The well known Nash equilibrium often leads to inefficient solutions. In the current work, we study the achievable secrecy rate of a multiple-antenna (MISO) interference channel (IFC). First, we characterize the Pareto boundary of the secrecy rate region. Next, the parameterization is exploited to compute the Nash...
متن کاملSecrecy Rate Region of the Broadcast Channel with an Eavesdropper
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation ra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2016
ISSN: 1536-1276,1558-2248
DOI: 10.1109/twc.2015.2472405