Joint SVD-GSVD Precoding Technique and Secrecy Capacity Lower Bound for the MIMO Relay Wire-Tap Channel

Author(s):  
Marouen Jilani ◽  
Tomoaki Ohtsuki
Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 998 ◽  
Author(s):  
Sheng-Hong Lin ◽  
Rong-Rong Lu ◽  
Xian-Tao Fu ◽  
An-Ling Tong ◽  
Jin-Yuan Wang

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.


Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 929
Author(s):  
Guangfen Xie ◽  
Bin Dai

The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on the corrupted state interference of the DP-WTC (also called the action-dependent DP-WTC) helps to increase the secrecy capacity of the DP-WTC. Subsequently, it has been shown that channel feedback further increases the secrecy capacity of the action-dependent DP-WTC (AD-DP-WTC), and a sub-optimal feedback scheme is proposed for this feedback model. In this paper, a two-step hybrid scheme and a corresponding new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback are proposed. The proposed new lower bound is shown to be optimal (achieving the secrecy capacity) and tighter than the existing one in the literature for some cases, and the results of this paper are further explained via numerical examples.


2020 ◽  
Author(s):  
Yebo Gu ◽  
Zhilu Wu ◽  
Zhendong Yin ◽  
Bowen Huang

Abstract The secure transmission problem of MIMO wireless system in fading channels is studied in this paper. We add a secrecy capacity optimization artificial noise(SCO-AN) to the transported signal for improving the security performance of the system. The closed-form expression of secrecy capacity's lower bound is obtained. Base on the closed-form expression of secrecy capacity's lower bound, We optimize the power allocation between the information-bearing signal and the SCO-AN. By calculating, the optimal ratio of power alloation betwenn the information-bearing signal and the SCO-AN is obtained. Through simulation, the results shows the secrecy capacity increases with more receiving antennas and less eavesdropping antennas.And more power should be allocated to the SCO-AN with the increase of the colluding eavedroppers.More over, we study the effect of channel estimation error on power allocation between information-bearing signal and SCO-AN and find that more power should be allocated to decrease eavesdroppers capacity if the channel estimation is not perfect.


2009 ◽  
Vol E92-B (2) ◽  
pp. 683-686 ◽  
Author(s):  
Huan SUN ◽  
Sheng MENG ◽  
Yan WANG ◽  
Xiaohu YOU

2012 ◽  
Vol E95-B (1) ◽  
pp. 333-336 ◽  
Author(s):  
Seungwon CHOI ◽  
Jung-Hyun PARK ◽  
Seokkwon KIM ◽  
Dong-Jo PARK

2012 ◽  
Vol E95-B (4) ◽  
pp. 1345-1356 ◽  
Author(s):  
Namzilp LERTWIRAM ◽  
Gia Khanh TRAN ◽  
Keiichi MIZUTANI ◽  
Kei SAKAGUCHI ◽  
Kiyomichi ARAKI

Sign in / Sign up

Export Citation Format

Share Document