On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi +2 more
core +5 more sources
RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid +4 more
doaj +1 more source
Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao +3 more
doaj +1 more source
Performance analysis of physical layer security based on channel correlation
In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability ...
Xuanli WU +3 more
doaj +2 more sources
Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks [PDF]
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels.
Duong, Trung Q. +4 more
core +1 more source
On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling [PDF]
In this letter, we study on-off opportunistic beamforming for the multiuser downlink channel with a passive eavesdropper. Two opportunistic scheduling schemes exploiting multiuser diversity are investigated which require limited feedback of the effective signal-to-noise ratio (SNR) from the legitimate users.
Minyan Pei +3 more
openaire +1 more source
Ergodic Secrecy Rate of RIS-Assisted Communication Systems in the Presence of Discrete Phase Shifts and Multiple Eavesdroppers [PDF]
This letter investigates the ergodic secrecy rate (ESR) of a reconfigurable intelligent surface (RIS)-assisted communication system in the presence of discrete phase shifts and multiple eavesdroppers (Eves). In particular, a closed-form approximation of the ESR is derived for both non-colluding and colluding Eves. The analytical results are shown to be
Peng Xu +3 more
openaire +4 more sources
Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core +1 more source
The security of information over wireless channels has always been an important aspect of wireless communication research. In this paper, the secrecy performance of a spatial modulated system with an artificial noise is investigated over the Rayleigh ...
Xiangbin Yu +5 more
doaj +1 more source
Enhancing secrecy rates in a wiretap channel
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj +1 more source

