2016
DOI: 10.1109/lwc.2016.2515601
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security for Space Shift Keying Transmission With Precoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…In other words, the bigger d min is expected to yield a higher mutual information. Therefore, we aim to select a TAS pattern of maximizing the minimum Euclidean distance over desired channel or minimizing the minimum Euclidean distance over eavesdropping channel [12], which are formulated as follows Here, we obtain two TAS patterns by (24) and (25), then we select the one which results in higher R s . Note that some low complexity methods for efficiently solving the problems in (24) and (25) can be found in [15], [16], [18].…”
Section: Generalized Euclidean Distance Antenna Selection Methodsmentioning
confidence: 99%
“…In other words, the bigger d min is expected to yield a higher mutual information. Therefore, we aim to select a TAS pattern of maximizing the minimum Euclidean distance over desired channel or minimizing the minimum Euclidean distance over eavesdropping channel [12], which are formulated as follows Here, we obtain two TAS patterns by (24) and (25), then we select the one which results in higher R s . Note that some low complexity methods for efficiently solving the problems in (24) and (25) can be found in [15], [16], [18].…”
Section: Generalized Euclidean Distance Antenna Selection Methodsmentioning
confidence: 99%
“…possible word choices, increasing the number of transmit antennas increases her confusion. Furthermore, it is clear from (10), and also from the figure, that the secrecy rates are reduced with an increased channel coherence time.…”
Section: Numerical Examplesmentioning
confidence: 78%
“…4 demonstrates the asymptotic secrecy rates for the proposed SSK transmission scheme with the CSI-based antenna index assignment. It is assumed that the perfect reciprocity holds, and hence, the achievable secrecy rates for high SNRs are evaluated using (10). It can be inferred from the figure that increasing the number of transmit antennas yields considerable gains in terms of the secrecy rates.…”
Section: Numerical Examplesmentioning
confidence: 99%
“…Specifically in association with SM, several recently published references [2][3][4][5] have addressed the PLS issues in point-to-point communications scenarios. In more detail, the authors of [2] have analyzed the secrecy capacity of the space shift keying (SSK) assisted SM systems, when assuming communications over binary symmetric channels.…”
Section: Introductionmentioning
confidence: 99%
“…Assuming underdeterminant scenarios, the authors of [4] have proposed to exploit all the transmit antennas (TAs) for joint transmission of SM signals and jamming signals, so as to enhance the secrecy performance of the SM-MIMO systems. In [5], a general SSK modulated wiretap system has been studied, and an optimal precoding scheme has been introduced to maximize the secrecy rate of the system. In the SM scenario where precoding-aided spatial modulation (PSM) [6,7] is employed, the authors of [8] and [9] have proposed respectively the secrecy precoding and artificial noise (AN) strategies for enhancing the secrecy performance.…”
Section: Introductionmentioning
confidence: 99%