2008
DOI: 10.1109/tit.2008.928990
|View full text |Cite
|
Sign up to set email alerts
|

On the Secrecy Capacity of Fading Channels

Abstract: We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full Channel State Information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

18
793
0
2

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 1,173 publications
(813 citation statements)
references
References 21 publications
18
793
0
2
Order By: Relevance
“…With CSIT, (11) is generally maximized by the "secrecy waterfilling" based power allocation policies [14], [17]. For no-delay-limited secrecy information transmission, we aim at maximizing the ESC for the IR subject to the same set of constraints (APC, PPC at the Tx, and an average harvested power constraint at the ER) as for the delay-limited case in (P1).…”
Section: B No-delay-limited Secrecy Information Transmissionmentioning
confidence: 99%
See 1 more Smart Citation
“…With CSIT, (11) is generally maximized by the "secrecy waterfilling" based power allocation policies [14], [17]. For no-delay-limited secrecy information transmission, we aim at maximizing the ESC for the IR subject to the same set of constraints (APC, PPC at the Tx, and an average harvested power constraint at the ER) as for the delay-limited case in (P1).…”
Section: B No-delay-limited Secrecy Information Transmissionmentioning
confidence: 99%
“…However, [11] considered the additive white Gaussian noise (AWGN) channels, while the optimal AN-aided secrecy transmission design for SWIPT systems over fading channels has not yet been addressed in the literature, which motivates this work. It is also worth pointing out that although channel fading is traditionally regarded as a detrimental factor to the wireless channel capacity, it can be exploited to reduce the secrecy communication outage probability [12]- [16] or improve the wireless channel secrecy capacity [12], [14], [17], [18]. For the secrecy outage probability minimization for wireless fading channels with stringent transmission delay constraint, [14] has derived the optimal power allocations in the fading broadcast channel with confidential messages assuming the channel state information known at the transmitter (CSIT).…”
Section: Introductionmentioning
confidence: 99%
“…With the widespread adoption of multiple-input multiple-output (MIMO) systems, there has been a significant recent interest in information theoretic physical layer security, the main premise of which is to exploit the difference in the wireless channels of different users. Information theoretic security has been investigated for a variety of channel models ranging from fading channels [1], [2], MIMO wiretap channels [3]- [6], multiple access channels [7]- [9], multi-receiver wiretap channels [10], broadcast channels with confidential messages [11]- [13], wiretap channels with helpers [14], etc.…”
Section: Introductionmentioning
confidence: 99%
“…We further assume that the users allocated no transmission time slots will not be allocated any power. Given and the corresponding transmit power , the instantaneous secrecy rate of the -th user is given by [32,33] as follows:…”
Section: System Modelmentioning
confidence: 99%