2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018
DOI: 10.1109/globalsip.2018.8646640
|View full text |Cite
|
Sign up to set email alerts
|

A New Look at Secrecy Capacity of Mimome Using Artificial Noise From Alice and Bob Without Knowledge of Eve’s Csi

Abstract: This study investigates a secure wireless communication scheme which combines two of the most effective strategies to combat (passive) eavesdropping, namely mixing information with artificial noise at the transmitter and jamming from a full-duplex receiver. All nodes are assumed to possess multiple antennas, which is known as a MIMOME network. The channel state information (CSI) of Eve is known to Eve but not to Alice and Bob. While such setup has been investigated in related works, new and important insights … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…It is shown in our earlier work [36] that the most harmful position of Eve is at x * = −0.5 − ∆ and y * = 0. From now on, we will refer to a and b as corresponding to the position (x * , y * ).…”
Section: A System Modelmentioning
confidence: 76%
See 2 more Smart Citations
“…It is shown in our earlier work [36] that the most harmful position of Eve is at x * = −0.5 − ∆ and y * = 0. From now on, we will refer to a and b as corresponding to the position (x * , y * ).…”
Section: A System Modelmentioning
confidence: 76%
“…Algorithm 1 details the proposed procedure for the power optimization. It is worth mentioning that a different optimization approach was explored in our previous work [36], where a stochastic optimization approach was applied to the objective function R AB − E[R AE ]. These two approaches more or less give the same results, but Algorithm 1 in this paper has a significantly lower complexity.…”
Section: B Power Optimization and Maximum Tolerable Number Of Antennmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, the wireless channels rate of secrecy has been explored from several perspectives like in [9,10]. The different perspectives explored are as follows, the fading channels secrecy [9][10][11], the analysis of Gaussian wiretap channels secrecy of [11], the multiple antenna systems secrecy [13][14][15], the broadcast channels secrecy [16], the analysis of secure degrees of freedom [17][18][19][20][21], and the secrecy of cooperative jamming techniques coupled with helpers or relays [22][23][24][25][26][27][28][29].…”
Section: Related Workmentioning
confidence: 99%
“…This method is known as cooperative jamming. The noise-forwarding approach which was introduced in [24], and applied in a channel comprising of four-terminal relay-eavesdropper also considered a full-duplex relay, which independently transmits secret messages codewords which are targeted at complicating the eavesdropper's transmission. The authors of [44] investigated a two-stage cooperative jamming scheme (TSCS) which involves multiple relay nodes acting as the single-antenna's source node extension.…”
Section: Related Workmentioning
confidence: 99%