2016
DOI: 10.1109/twc.2015.2500563
|View full text |Cite
|
Sign up to set email alerts
|

Secure Broadcasting With Imperfect Channel State Information at the Transmitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The secrecy performance of multi-user systems has been of interest in a number of recent research works. For the broadcast multi-user scenario, the secrecy capacity of parallel and fading channels, assuming perfect main channel state information (CSI) at the transmitter (CSIT), was considered in [7] and [8] while the case of imperfect main channel estimation was elaborated in [9]. For the multiple access scenario, the authors in [10] and [11] investigated the secrecy capacity of degraded wiretap channels.…”
Section: A Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The secrecy performance of multi-user systems has been of interest in a number of recent research works. For the broadcast multi-user scenario, the secrecy capacity of parallel and fading channels, assuming perfect main channel state information (CSI) at the transmitter (CSIT), was considered in [7] and [8] while the case of imperfect main channel estimation was elaborated in [9]. For the multiple access scenario, the authors in [10] and [11] investigated the secrecy capacity of degraded wiretap channels.…”
Section: A Literature Reviewmentioning
confidence: 99%
“…The uncertainty of the CSIT can also be the result of an error of estimation at the transmitter or of a delayed feedback information. The authors in the following works, [9], [36]- [39], examined the case when the uncertainty is the result of an error of estimation, and [40]- [42] considered the wiretap channel with outdated CSI. A synopsis of how different levels of CSIT impact the system's security is provided in [43] and a detailed state-of-the-art review of physical layer security with CSIT uncertainty is presented in [44].…”
Section: A Literature Reviewmentioning
confidence: 99%
“…which is the Shannon transform of the eigenvalue distribution of the matrix A when n is large. The Shannon transform of the eigenvalue distribution of Θ with parameter η is obviously given by (19). And the ηtransform of the eigenvalue distribution of Θ with parameter x is obviously given by…”
Section: Appendix a Proof Of Lemmamentioning
confidence: 99%
“…The MIMOME related works in the literature include: [4]- [15] where the channel state information (CSI) at Eve is assumed to be known not only to Eve itself 1 but also to Alice and Bob; [16]- [19] where a partial knowledge of Eve's CSI is assumed to be available to Alice and Bob and an averaged secrecy or secrecy outage was considered; [13], [20]- [25] where artificial noise is embedded in the signal from Alice; and [26]- [31] where Bob is treated as a full-duplex node capable to receive the signal from Alice while transmitting jamming noise.…”
Section: Introductionmentioning
confidence: 99%
“…For the broadcast multi-users scenario, the secrecy capacity of parallel and fading channels, assuming perfect main CSI at the transmitter, was considered in [7] and [8]. The case of imperfect main channel estimation was elaborated in [9]. For the multiple access scenario, the authors in [10] and [11] investigated the secrecy capacity of degraded wiretap channels.…”
Section: Introductionmentioning
confidence: 99%