2012 International Conference on Signal Processing and Communications (SPCOM) 2012
DOI: 10.1109/spcom.2012.6290033
|View full text |Cite
|
Sign up to set email alerts
|

Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper

Abstract: We consider a two user fading Multiple Access Channel with a wire-tapper (MAC-WT) where the transmitter has the channel state information (CSI) to the intended receiver but not to the eavesdropper (eve). We provide an achievable secrecy sum-rate with power control. We next provide a secrecy sum-rate with power control and cooperative jamming (CJ). We also study an achievable secrecy sum rate by employing an ON/OFF power control scheme which is more easily computable. Finally we employ CJ over this power contro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…We compare the NBS and the PP with the case when CSI of the transmitters is known globally but only the distribution of Eve's channel gains are known at all transmitters. This case is studied in [17] for continuous channel states and a centralized solution which maximizes the sum rate is found. We also find the Bayesian Equilibrium (BE) for the case when each user knows distribution of all the channel gains to Eve, as done in [8] for F-MAC without security constraints.…”
Section: Fig ??)mentioning
confidence: 99%
See 2 more Smart Citations
“…We compare the NBS and the PP with the case when CSI of the transmitters is known globally but only the distribution of Eve's channel gains are known at all transmitters. This case is studied in [17] for continuous channel states and a centralized solution which maximizes the sum rate is found. We also find the Bayesian Equilibrium (BE) for the case when each user knows distribution of all the channel gains to Eve, as done in [8] for F-MAC without security constraints.…”
Section: Fig ??)mentioning
confidence: 99%
“…More recently in [16] the authors have studied a compound MAC-WT and have characterized inner and outer bounds on the secrecy capacity region. In [17] the authors have studied a fading MAC-WT with full CSI of Eve and also when each user knows the channel state of all the users to the receiver, but is ignorant of the instantaneous value of channel state to the eavesdropper (only its distribution is known). But knowing other users' channel gains to the legitimate receiver may also not be practical: it needs a lot of signalling overhead and feedback information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The same authors also studied a fading MAC with full channel state information (CSI) of Eve known at the transmitters. Paper [7] is a research extension of a scenario in which the CSI of Eve is not known at the transmitters. For a detailed review of theoretical information theoretic security see [8], [9], and [10].…”
Section: Introductionmentioning
confidence: 99%
“…The same authors also studied a fading MAC with full channel state information (CSI) of Eve known at the transmitters. In [7] this work is extended to the case when the CSI of Eve is not known at the transmitters. For a detailed review on information theoretic security, see [8], [9], and [10].…”
mentioning
confidence: 99%