2017
DOI: 10.1109/tifs.2017.2705618
|View full text |Cite
|
Sign up to set email alerts
|

MIMO Secret Communications Against an Active Eavesdropper

Abstract: Abstract-This paper considers a scenario in which an

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(31 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…denotes the distance between the XY link. The global CSI is available by uplink training in time-division duplexed (TDD) massive MIMO networks [11,38].…”
Section: Motivation and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…denotes the distance between the XY link. The global CSI is available by uplink training in time-division duplexed (TDD) massive MIMO networks [11,38].…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…Then, the instantaneous transmission rates of the BS and the user are respectively (11) Without the knowledge of the CSI between the legitimate devices and cooperative relays, the eavesdroppers cannot distinguish the information from the BS and the user.…”
Section: Bsmentioning
confidence: 99%
See 1 more Smart Citation
“…Throughout the literature, to the best of the authors' knowledge, the optimized transmission for a SWIPT system with pilot spoofing attack has not been considered. However, there has been research that explores new signal processing methods to enhance the information-secrecy in the presence of a pilot spoofing attack [1], [3]- [9]. The recently developed signal processing algorithms consider recovering network security either by: 1) improving the processing of the signal (which might include the information and/or artificial noise (AN)) transmission [1], [3]- [7]; 2) or by improving both the processing of the signal and the training sequence transmission [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…This was exploited to improve the optimized downlink beamforming with a secrecy rate objective. The same system setup was considered in [3], however, the EV can decode the information signal and jam the IU in full-duplex mode using two different antenna subsets. In the same way, the transmitter tackles that by jamming the EV using a subset of its antennas, while the remaining antennas are used for information signal transmission.…”
Section: Introductionmentioning
confidence: 99%