2007 IEEE International Symposium on Information Theory 2007
DOI: 10.1109/isit.2007.4557589
|View full text |Cite
|
Sign up to set email alerts
|

Achievable Rates in Gaussian MISO Channels with Secrecy Constraints

Abstract: Abstract-A Gaussian MISO (multiple input single output) channel is considered where a transmitter is communicating to a receiver in the presence of an eavesdropper. The transmitter is equipped with multiple antennas, while the receiver and the eavesdropper each have a single antenna. The transmitter maximizes the communication rate, while concealing the message from the eavesdropper. The channel input is restricted to Gaussian signalling, with no preprocessing of information. For these channel inputs, and unde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
255
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 297 publications
(260 citation statements)
references
References 14 publications
4
255
0
1
Order By: Relevance
“…Furthermore, our framework is also related to [25]. However, the result in [25] cannot be applied to our problem since perfect CSIT is not available. Our primary concern in this paper is on how to design secure transmission strategies leveraging CSIT.…”
Section: B Approach and Contributionsmentioning
confidence: 99%
“…Furthermore, our framework is also related to [25]. However, the result in [25] cannot be applied to our problem since perfect CSIT is not available. Our primary concern in this paper is on how to design secure transmission strategies leveraging CSIT.…”
Section: B Approach and Contributionsmentioning
confidence: 99%
“…First, we investigate the first term of (17). Given (13), the offered sufficient condition presented in the Lemma 3 ( (11)) holds for all the layers.…”
Section: Theoremmentioning
confidence: 99%
“…Now we consider the second term in (17). For the summation of these terms, according to the Lemma 2, we have:…”
Section: Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, beamforming and artificial noise generation (BF&AN) at the legitimate transmitter has been proposed as a promising technique to confuse the eavesdroppers and enhance the security [5,6]. In this paper, we study the secrecy performance of large scale underlay spectrum sharing networks with BF&AN at the SU transmitter.…”
Section: Introductionmentioning
confidence: 99%