2012
DOI: 10.1109/tifs.2011.2181946
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage in MISO Systems With Partial Channel Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
103
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 191 publications
(107 citation statements)
references
References 23 publications
3
103
0
1
Order By: Relevance
“…This is because if r † HQ ′ H † r < x, then Q ′ is feasible for the problem of (11) but achieves a strictly larger objective value than Q * in (11). But this contradicts the fact that Q * is the optimal solution to (11), so Q * is also the optimal solution to (13).…”
Section: Multiple-antenna Receivermentioning
confidence: 97%
See 2 more Smart Citations
“…This is because if r † HQ ′ H † r < x, then Q ′ is feasible for the problem of (11) but achieves a strictly larger objective value than Q * in (11). But this contradicts the fact that Q * is the optimal solution to (11), so Q * is also the optimal solution to (13).…”
Section: Multiple-antenna Receivermentioning
confidence: 97%
“…We want to prove that Q * is also the optimal solution to (13). Let Q ′ be any solution to the above problem (13).…”
Section: Multiple-antenna Receivermentioning
confidence: 99%
See 1 more Smart Citation
“…The results show that coding over a large number of fading blocks, has a positive effect on the secrecy capacity and secure communication is possible even when the average SNR of the legitimate receiver is smaller than that of the eavesdropper. The secrecy outage with perfect main CSIT and partial eavesdropper's CSIT available at the transmitter is investigated in [17].…”
Section: A Motivation and Related Workmentioning
confidence: 99%
“…One key performance measure of PHY security is secrecy rate, which is characterized by the channel capacity difference of the legitimate user (LU) and the eavesdropper (Eve). Popular PHY security approaches include transmit beamforming [2]- [4] and artificial-noise (AN)-based designs [5]- [7], which explore certain channel statistical independence to either enhance the LU's reception or jam the Eve's reception.…”
Section: Introductionmentioning
confidence: 99%