Providing secrecy irrespective of eavesdropper's channel state

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations

    Abstract

    A usual concern against physical layer security is that the legitimate parties would need to have (partial) channel state information (CSI) of the eavesdropper in order to design transmission schemes that provide secrecy. In this work, to overcome this concern, we consider the model where the eavesdropper's CSI is completely unknown at the legitimate transmitter(s) and the receiver. A static channel setting, and multiple antennas are considered for all parties, and it is assumed that the eavesdropper has perfect self-CSI. In this setting, assuming that the legitimate parties can employ a larger number of antennas than the eavesdropper, we provide a positive secure communication rate in the sense of strong secrecy. The achievable (guaranteed) secrecy rate we derive for the MIMO wiretap channel matches its converse in terms of secure degrees of freedom. As a side result of our approach, we also derive the secure degrees of freedom region for the MIMO MAC-wiretap channel where the transmitters and the intended receiver have the same number of antennas.

    Original languageEnglish (US)
    Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Print)9781424456383
    DOIs
    StatePublished - 2010
    Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
    Duration: Dec 6 2010Dec 10 2010

    Publication series

    NameGLOBECOM - IEEE Global Telecommunications Conference

    Other

    Other53rd IEEE Global Communications Conference, GLOBECOM 2010
    Country/TerritoryUnited States
    CityMiami, FL
    Period12/6/1012/10/10

    All Science Journal Classification (ASJC) codes

    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Providing secrecy irrespective of eavesdropper's channel state'. Together they form a unique fingerprint.

    Cite this