Abstract
The broadcast nature of the wireless medium makes the communication over this medium vulnerable to eavesdropping. This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. The assumption used is that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdropper. The transmitter ensures secrecy of communication by utilizing some of the available power to produce 'artificial noise', such that only the eavesdropper's channel is degraded. Two scenarios are considered, one where the transmitter has multiple transmit antennas, and the other where amplifying relays simulate the effect of multiple antennas. The channel state information (CSI) is assumed to be publicly known, and hence, the secrecy of communication is independent of the secrecy of CSI.
Index Terms
- Guaranteeing Secrecy using Artificial Noise
Recommendations
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem
The impact of quantized channel direction information (CDI) on the achievable secrecy rate is studied for multiple antenna wiretap channels. By assuming that the eavesdropper's channel is unknown at the transmitter, we adopt the transmission scheme ...
Guaranteeing Positive Secrecy Capacity for MIMOME Wiretap Channels With Finite-Rate Feedback Using Artificial Noise
While the impact of finite-rate feedback on the capacity of fading channels has been extensively studied in the literature, not much attention has been paid to this problem under secrecy constraint. In this work, we study the ergodic secret capacity of a ...
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise
ISIT'09: Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4Physical-layer secrecy in wireless fading channels has been studied extensively in recent years to ensure reliable communication between the transmitter and the receiver subject to constraints on the information attainable by the eavesdropper. With ...
Comments