2012
DOI: 10.1109/lsp.2012.2195490
|View full text |Cite
|
Sign up to set email alerts
|

Performance of Transmit Antenna Selection Physical Layer Security Schemes

Abstract: Abstract-We analyze the physical layer (PHY) security of a communication scheme consisting of a multiple antenna transmitter with a single radio frequency (RF) chain using transmitter antenna selection (TAS) and a single antenna receiver, in the presence of a sophisticated multiple antenna eavesdropper. We develop closed-form expressions for the analysis of the secrecy outage probability, and we show that the PHY security can be considerably enhanced when multiple antennas are available at the legitimate trans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
186
1
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 225 publications
(191 citation statements)
references
References 15 publications
3
186
1
1
Order By: Relevance
“…8, 9 and 10 correspond to criteria I, II and III, respectively. For comparison, we consider three interference scenarios: the equal-power interferers with P I1 = P I2 = P I3 = 10 3 , the distinct-power interferers with [P I1 , P I2 , P I3 ] = [7,2,1], and the only one effective interferer with [P I1 , P I2 , P I3 ] = [10, 0, 0]. As can be clearly observed from Figs.…”
Section: −4 E and The Associated Mer Is (D/d E )mentioning
confidence: 99%
See 1 more Smart Citation
“…8, 9 and 10 correspond to criteria I, II and III, respectively. For comparison, we consider three interference scenarios: the equal-power interferers with P I1 = P I2 = P I3 = 10 3 , the distinct-power interferers with [P I1 , P I2 , P I3 ] = [7,2,1], and the only one effective interferer with [P I1 , P I2 , P I3 ] = [10, 0, 0]. As can be clearly observed from Figs.…”
Section: −4 E and The Associated Mer Is (D/d E )mentioning
confidence: 99%
“…In these works, important metrics of secrecy performance, such as secrecy outage probability (SOP) and secrecy capacity, have been studied. To enhance the transmission security for multi-antenna systems, antenna selection technique can be used to exploit the dynamic nature among the multi-antenna fading channels [7].…”
Section: Introductionmentioning
confidence: 99%
“…In this context, the secrecy outage capacity is adopted as a useful and intuitive metric to evaluate security, which is defined as the achievable maximum secrecy rate under the condition that the outage probability that the real transmission rate surpasses the secrecy rate is equal to a given value [14]. The secrecy outage capacity based on antenna selection is analyzed in an uncorrelated MIMO system [15] and in a correlated MIMO system [16]. Note that the assumption of full CSI for the legitimate channel at the source also seems impractical in multi-antenna systems, especially in frequency division duplex (FDD) systems.…”
Section: A Related Workmentioning
confidence: 99%
“…The fundamental concept of physical layer security is to enhance the gain of legitimate receiver's main channel in comparison to the eavesdropper's channel to attain perfect secrecy. With the advancement in multiple antenna *Correspondence: shilpathakur_1987@rediffmail.com 1 Department of Electronics and Communication Engineering, National Institute of Technology, Hamirpur, India Full list of author information is available at the end of the article techniques, security improvement in wiretap CRN channels has addressed from information-theoretic perspective [8][9][10][11], where the secondary transmitter (ST), the secondary user receiver (SR), and the eavesdropper (ER) all are equipped with multiple antennas.…”
Section: Introductionmentioning
confidence: 99%