2013
DOI: 10.1109/tifs.2013.2284754
|View full text |Cite
|
Sign up to set email alerts
|

Secure On-Off Transmission Design With Channel Estimation Errors

Abstract: Physical layer security has recently been regarded as an emerging technique to complement and improve the communication security in future wireless networks. The current research and development in physical layer security is often based on the ideal assumption of perfect channel knowledge or the capability of variable-rate transmissions. In this work, we study the secure transmission design in more practical scenarios by considering channel estimation errors at the receiver and investigating both fixed-rate an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
92
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 96 publications
(95 citation statements)
references
References 22 publications
2
92
1
Order By: Relevance
“…Here, I n represents an n × n identity matrix. Considering channel uncertainty, the channel coefficient h ak is given by [10,11] h ak =ĥ ak +h ak ,…”
Section: A Channel Modelmentioning
confidence: 99%
“…Here, I n represents an n × n identity matrix. Considering channel uncertainty, the channel coefficient h ak is given by [10,11] h ak =ĥ ak +h ak ,…”
Section: A Channel Modelmentioning
confidence: 99%
“…New closed-form expressions for the transmission probability, the connection outage probability, the secrecy outage probability, and the reliable and secure transmission probability were derived to characterize the achievable system's performance. The authors of [19] investigated the secure transmission design in practical scenarios by considering channel estimation errors at the legitimate receiver and investigating both fixed-and variable-rate transmissions.…”
Section: A Related Workmentioning
confidence: 99%
“…In the seminal work [12], Wyner introduced the wiretap channel as a framework for physical layer security, where a transmitter wants to send confidential messages to a legitimate receiver in the presence of an external eavesdropper. Following Wyner's wiretap channel, the wireless physical layer security against external eavesdroppers has been extensively studied in recent years, e.g., [13]- [15] from an information-theoretic perspective on the performance analysis and [16]- [18] from a signal-processing perspective on the system design. It is worth mentioning that there is another research direction on physical layer security, which does not focus on the secrecy issue against external eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Obtain P o = [P o 1 , · · · , P o K ] according to (16); 7: if (17), (18), and In the case of two users, we obtain the closed-form expressions for the solutions to the problem (23), which are summarized in the following Proposition 3. It is worth mentioning that the scenario of two users to perform NOMA jointly is of practical interest.…”
mentioning
confidence: 99%