메뉴 건너뛰기




Volumn 8, Issue 12, 2013, Pages 1923-1936

Secure On-Off transmission design with channel estimation errors

Author keywords

channel estimation error; on off transmission; Physical layer security; secrecy outage probability

Indexed keywords

ADAPTIVE RATE TRANSMISSION; CHANNEL ESTIMATION ERRORS; IMPERFECT CHANNEL ESTIMATION; PERFECT CHANNEL KNOWLEDGE; PHYSICAL LAYER SECURITY; QUASI-STATIC FADING CHANNELS; RESEARCH AND DEVELOPMENT; SECRECY OUTAGE PROBABILITIES;

EID: 84888090785     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2284754     Document Type: Article
Times cited : (100)

References (24)
  • 1
    • 84878289144 scopus 로고    scopus 로고
    • Impact of channel estimation error on secure transmission design
    • Commun. Theory Workshop, Adelaide, Australia Jan./Feb.
    • B. He and X. Zhou, "Impact of channel estimation error on secure transmission design," in Proc. IEEE Austral. Commun. Theory Workshop, Adelaide, Australia, Jan./Feb. 2013, pp. 19-24.
    • (2013) Proc.IEEE Austral , pp. 19-24
    • He, B.1    Zhou, X.2
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May.
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 5
    • 84857227438 scopus 로고    scopus 로고
    • Resource allocation for secure OFDMA networks with imperfect CSIT
    • Dec.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Resource allocation for secure OFDMA networks with imperfect CSIT," in Proc. IEEE Global Telecommun. Conf., Dec. 2011, pp. 1-6.
    • (2011) Proc.IEEE Global Telecommun. Conf , pp. 1-6
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 6
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug.
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 7
    • 79952985755 scopus 로고    scopus 로고
    • On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
    • Mar.
    • S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.3 , pp. 901-915
    • Lin, S.-C.1    Chang, T.-H.2    Liang, Y.-L.3    Hong, Y.-W.P.4    Chi, C.-Y.5
  • 8
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Apr.
    • J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.4 , pp. 1696-1707
    • Huang, J.1    Swindlehurst, A.L.2
  • 9
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 10
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 11
    • 84861306235 scopus 로고    scopus 로고
    • Two-way secrecy schemes for the broadcast channel with internal eavesdroppers
    • Pacific Grove, CA, USA Nov.
    • C. Y. Leow, Ç. Çapar, D. Goeckel, and K. K. Leung, "Two-way secrecy schemes for the broadcast channel with internal eavesdroppers," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 1840-1844.
    • (2011) Proc. Asilomar Conf. Signals Syst. Comput , pp. 1840-1844
    • Leow, C.Y.1    Çapar, C.2    Goeckel, D.3    Leung, K.K.4
  • 12
    • 79961140767 scopus 로고    scopus 로고
    • Impact of channel estimation errors on effectiveness of eigenvector-based jamming for physical layer security in wireless networks
    • Kyoto, Japan Jun.
    • J. M. Taylor, M. Hempel, H. Sharif, S. Ma, and Y. Yang, "Impact of channel estimation errors on effectiveness of eigenvector-based jamming for physical layer security in wireless networks," in Proc. IEEE CAMAD Workshop, Kyoto, Japan, Jun. 2011, pp. 122-126.
    • (2011) Proc.IEEE CAMAD Workshop , pp. 122-126
    • Taylor, J.M.1    Hempel, M.2    Sharif, H.3    Ma, S.4    Yang, Y.5
  • 13
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • McKay Oct.
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 14
    • 84871946867 scopus 로고    scopus 로고
    • How much training is enough for secrecy beamforming with artificial noise
    • June.
    • T.-Y. Liu, S.-C. Lin, T.-H. Chang, and Y.-W. P. Hong, "How much training is enough for secrecy beamforming with artificial noise," in Proc. IEEE Int. Conf. Commun., June 2012, pp. 4782-4787.
    • (2012) Proc.IEEE Int. Conf. Commun , pp. 4782-4787
    • Liu, T.-Y.1    Lin, S.-C.2    Chang, T.-H.3    Hong, Y.-W.P.4
  • 15
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 16
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • McKay, B. Maham, and A. Hjørungnes Mar.
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2
  • 17
    • 0028427058 scopus 로고
    • Information theoretic considerations for cellular mobile radio
    • May
    • L. H. Ozarow, S. Shamai, and A. D. Wyner, "Information theoretic considerations for cellular mobile radio," IEEE Trans. Veh. Technol, vol. 43, no. 2, pp. 359-378, May 1994.
    • (1994) IEEE Trans. Veh. Technol , vol.43 , Issue.2 , pp. 359-378
    • Ozarow, L.H.1    Shamai, S.2    Wyner, A.D.3
  • 19
    • 0026260768 scopus 로고
    • An analysis of pilot symbol assisted modulation for Rayleigh fading channels
    • Nov.
    • J. K. Cavers, "An analysis of pilot symbol assisted modulation for Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 40, no. 4, pp. 686-693, Nov. 1991.
    • (1991) IEEE Trans. Veh. Technol , vol.40 , Issue.4 , pp. 686-693
    • Cavers, J.K.1
  • 20
    • 0037399093 scopus 로고    scopus 로고
    • How much training is needed in multiple-antenna wireless links
    • Apr.
    • B. Hassibi and B. M. Hochwald, "How much training is needed in multiple-antenna wireless links?" IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 951-963, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 951-963
    • Hassibi, B.1    Hochwald, B.M.2
  • 23
    • 64249156371 scopus 로고    scopus 로고
    • On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
    • Apr.
    • X. Tang, R. Liu, P. Spasojevíc, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.4 , pp. 1575-1591
    • Tang, X.1    Liu, R.2    Spasojevíc, P.3    Poor, H.V.4
  • 24
    • 0004225706 scopus 로고
    • Santa Monica CA USA:Rand Corporation
    • J. I. Marcum, Table of Q Functions. Santa Monica, CA, USA: Rand Corporation, 1950.
    • (1950) Table of Q Functions
    • Marcum, J.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.