2016
DOI: 10.1109/access.2016.2612585
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 88 publications
(43 citation statements)
references
References 120 publications
0
43
0
Order By: Relevance
“…where f r,e (γ x,r , γ x,e ) is the joint PDF of the SIR at the receiver and the eavesdropper. Performance studies of PLS with CSI imperfections due to estimation errors at the receiver and/or limited feedback can be found in [42], [43] and references therein. Studying the impact of imperfections on the performance comparison with and without boundaries is a topic for future work.…”
Section: System Modelmentioning
confidence: 99%
“…where f r,e (γ x,r , γ x,e ) is the joint PDF of the SIR at the receiver and the eavesdropper. Performance studies of PLS with CSI imperfections due to estimation errors at the receiver and/or limited feedback can be found in [42], [43] and references therein. Studying the impact of imperfections on the performance comparison with and without boundaries is a topic for future work.…”
Section: System Modelmentioning
confidence: 99%
“…Among these works, [17]- [21] examined the case when the uncertainty is the result of an error of estimation, and [22]- [24] analyzed the wiretap channel with outdated CSI. A synopsis of how different levels of CSIT impact the system's security is provided in [25] and a detailed state-of-the-art review of physical layer security with CSIT uncertainty is presented in [26].…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Since SU is allowed to share the spectrum with PU, security issue in such networks becomes more complex [11], [12], [13]. The physical layer security technique can provide secure communication through time-variability of wireless channel without secret key [14]. It can greatly improve the security of wireless communication system both in theory and in practical engineering applications [15].…”
mentioning
confidence: 99%