Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Keywords
(9)
Channel Model
Covariance Matrix
eigenvalues and eigenfunctions
Eigenvectors
Multiple Antennas
Physical Layer
Signal To Noise Ratio
Independent and Identically Distributed
Multiple Input Single Output
Subscribe
Academic
Publications
On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels
On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels,10.1109/TWC.2011.011811.100356,IEEE Transactions on Wireless Communications,Jiangyuan Li,At
Edit
On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels
(
Citations: 3
)
BibTex

RIS

RefWorks
Download
Jiangyuan Li
,
Athina P. Petropulu
A Gaussian multipleinput singleoutput (MISO) wiretap
channel model
is considered, where there exists a trans mitter equipped with multiple antennas, a legitimate receiver and an eavesdropper, each equipped with a single antenna. We study the problem of finding the optimal input covariance that maximizes the ergodic secrecy rate subject to a power constraint, where only statistical information about the eavesdropper chan nel is available at the transmitter. This is a nonconvex optimiza tion problem that is in general difficult to solve. Existing results address the case in which the eavesdropper or/and legitimate channels have
independent and identically distributed
Gaussian entries with zero mean and unit variance, i.e., the channels have trivial covariances. This paper addresses the general case in which the eavesdropper and legitimate channels have nontrivial covariances. A set of equations describing the optimal input
covariance matrix
are proposed along with an algorithm to obtain the solution. Based on this framework, it is shown that when full information on the legitimate channel is available to the transmitter, the optimal input covariance has always rank one. It is also shown that when only statistical information on the legitimate channel is available to the transmitter, the legitimate channel has some general nontrivial covariance and the eavesdropper channel has trivial covariance, the optimal input covariance has the same
eigenvectors
as the legitimate channel covariance.
Journal:
IEEE Transactions on Wireless Communications  TWC
, vol. 10, no. 4, pp. 11761187, 2011
DOI:
10.1109/TWC.2011.011811.100356
Cumulative
Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
(
dx.doi.org
)
(
www.informatik.unitrier.de
)
(
ieeexplore.ieee.org
)
(
ieeexplore.ieee.org
)
More »
Citation Context
(3)
...h�� ∈���� (0, I). For Gaussian input, the optimal covariance matrix to maximize the achievable ergodic secrecy rate is shown to be a rank one matrix [
7
], i.e., a beamforming vector, and the achievable ergodic secrecy rate can be found by solving the following optimization problem...
Shafi Bashar
,
et al.
On the Secrecy Rate of MultiAntenna Wiretap Channel under FiniteAlph...
...the case where only statistical channel knowledge is available and ergodic secrecy rate is studied [8], [
29
])...
Jing Huang
,
et al.
Cooperative Jamming for Secure Communications in MIMO Relay Networks
...In [
11
], a Gaussian multipleinput singleoutput (MISO) wiretap channel was studied assumingthatonlystatisticalinformationabouttheeavesdropperchannel isavailableatthetransmitter,whileforthelegitimatechanneltwocases were considered, namely, full CSI, or statistical information only...
...For the above scenario, we find the optimal input covariance that maximizes the ergodic secrecy rate subject to a power constraint .As imilar scenario was used in [
11
] and [13] for the MISO eavesdropper channel...
...The fact that the eavesdropper employs multiple antennas makes the proof of optimality of beamforming more difficult than that of [
11
] and [13]...
...Unlike [
11
] and [13], we use the framework of Fritz John conditions [28, p. 164], [29, Ch. 4] (without any regularity conditions) to show that the solution satisfies the Karush–Kuhn–Tucker (KKT) conditions (note that KKT require regularity conditions)...
...Another significant difference with [
11
] and [13] is that in this work we show that Piyavskii’s algorithm can be used to obtain the global optimizer of the resulting univariate problem...
...Certainly, these results can be used in the problems of [
11
] and [13]...
...Unlike [
11
] and [13], we use the framework of Fritz John conditions (without any regularity conditions) to show that the solution satisfies the KKT conditions (note that KKT conditions require regularity conditions)...
...This method of reduction is also used in [
11
] and [13]...
...The same lemma was also used in [
11
] and [13]...
Jiangyuan Li
,
et al.
Ergodic Secrecy Rate for MultipleAntenna Wiretap Channels With Rician...
References
(27)
Information Theoretic Security
(
Citations: 77
)
Yingbin Liang
,
H. Vincent Poor
,
Shlomo Shamai
Journal:
Foundations and Trends in Communications and Information Theory  FTCIT
, vol. 5, no. 45, pp. 355580, 2009
The wiretap channel
(
Citations: 827
)
A. D. Wyner
Published in 1975.
The Gaussian wiretap channel
(
Citations: 308
)
S. LeungYanCheong
,
MARTIN E. HELLMAN
Journal:
IEEE Transactions on Information Theory  TIT
, vol. 24, no. 4, pp. 451456, 1978
Towards the secrecy capacity of the Gaussian MIMO wiretap channel: the 221 channel
(
Citations: 42
)
Shabnam Shafiee
,
Nan Liu
,
Sennur Ulukus
Journal:
IEEE Transactions on Information Theory  TIT
, vol. 55, no. 9, pp. 40334039, 2009
The MIMOME Channel
(
Citations: 61
)
Ashish Khisti
,
Gregory W. Wornell
Journal:
Computing Research Repository  CORR
, vol. abs/0710.1, 2007
Sort by:
Citations
(3)
On the Secrecy Rate of MultiAntenna Wiretap Channel under FiniteAlphabet Input
Shafi Bashar
,
Zhi Ding
,
Chengshan Xiao
Journal:
IEEE Communications Letters  IEEE Commun. Lett.
, vol. 15, no. 5, pp. 527529, 2011
Cooperative Jamming for Secure Communications in MIMO Relay Networks
Jing Huang
,
A. Lee Swindlehurst
Journal:
IEEE Transactions on Signal Processing  TSP
, vol. 59, no. 10, pp. 48714884, 2011
Ergodic Secrecy Rate for MultipleAntenna Wiretap Channels With Rician Fading
Jiangyuan Li
,
Athina P. Petropulu
Journal:
IEEE Transactions on Information Forensics and Security
, vol. 6, no. 3, pp. 861867, 2011