2013
DOI: 10.1109/tit.2013.2265691
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Capacity of Fading Channels

Abstract: Abstract-This paper considers point to point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter CSI (Channel state information). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper chann… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 23 publications
0
40
0
Order By: Relevance
“…In [10], the effects of Nakagamim fading on SC and probability of non-zero secrecy capacity (PNSC) were investigated. Under two different assumptions on the transmitter channel state information, the definition of SC was extended to account for the secrecy constraint over Rayleigh-fading channels in [11]. In order to increase SC, the authors in [12] proposed a novel artificial noise based method to impair the source-eavesdropper channel.…”
Section: Introductionmentioning
confidence: 99%
“…In [10], the effects of Nakagamim fading on SC and probability of non-zero secrecy capacity (PNSC) were investigated. Under two different assumptions on the transmitter channel state information, the definition of SC was extended to account for the secrecy constraint over Rayleigh-fading channels in [11]. In order to increase SC, the authors in [12] proposed a novel artificial noise based method to impair the source-eavesdropper channel.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in [20] the secrecy degrees of freedom of multiantenna block fading (BF) coefficients were investigated by exploiting the temporal correlation of the BF channels seen by different receivers. Furthermore, in [21] distributed systems with linear precoding were studied while in [22] point-to-point secure communication over flat fading channels under outage constraints were considered. In the same contribution capacity achieving schemes based on opportunistically exchanging private keys between the legitimate nodes were proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, even when the instantaneous secrecy rate is zero, which is the case when the source-eavesdropper channel has better gain than that of the legitimate source-destination channel, data bits can still be transmitted to the destination securely from the eavesdropper. Based on this idea, Gungor et al [6] showed that a long-term constant secrecy rate is achievable. The authors of [6] address decoding delays but do not consider the dynamics of the data arrival process at the source.…”
Section: Introductionmentioning
confidence: 99%
“…Based on this idea, Gungor et al [6] showed that a long-term constant secrecy rate is achievable. The authors of [6] address decoding delays but do not consider the dynamics of the data arrival process at the source. Mao et al [7] assumed random data arrivals at the source node and illustrated through simulations that the use of a key queue reduces the queuing delay for the data packets.…”
Section: Introductionmentioning
confidence: 99%