2013 21st Signal Processing and Communications Applications Conference (SIU) 2013
DOI: 10.1109/siu.2013.6531475
|View full text |Cite
|
Sign up to set email alerts
|

Analysis on the effects of artificial noise on physical layer security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…If the secrecy capacity falls below zero, the transmissions from the source to the destination become insecure and the eavesdropper would become capable of intercepting the source's transmissions [35], [36]. In order to improve the attainable transmission security, it is of importance to increase the secrecy capacity by exploiting sophisticated signal processing techniques, such as the artificial-noise-aided security [37]- [39], securityoriented beamforming [40], [41], security-oriented diversity approaches [42], [43] and so on.…”
Section: Introductionmentioning
confidence: 99%
“…If the secrecy capacity falls below zero, the transmissions from the source to the destination become insecure and the eavesdropper would become capable of intercepting the source's transmissions [35], [36]. In order to improve the attainable transmission security, it is of importance to increase the secrecy capacity by exploiting sophisticated signal processing techniques, such as the artificial-noise-aided security [37]- [39], securityoriented beamforming [40], [41], security-oriented diversity approaches [42], [43] and so on.…”
Section: Introductionmentioning
confidence: 99%
“…What makes the eavesdropping attacks very critical is the fact that it is difficult to be detected by the victims since it could be processed without leaving any traces. To deal with this security dilemma, some related works proposed the use of artificial noise (AN) where the transmitter perturbs the attacker channel by sending a dedicated signal [16], [17]. This signal is generated orthogonally to the main link between the legitimate entities so that it will affect only the eavesdropper link.…”
Section: Introduction a Background And Literature Reviewmentioning
confidence: 99%
“…If the secrecy capacity falls below zero, the transmissions from the source to the destination become insecure and the eavesdropper would become capable of intercepting the source's transmissions [35], [36]. In order to improve the attainable transmission security, it is of importance to increase the secrecy capacity by exploiting sophisticated signal processing techniques, such as the artificial noise aided security [37]- [39], security-oriented beamforming [40], [41], security-oriented diversity approaches [42], [43] and so on.…”
Section: Introductionmentioning
confidence: 99%