Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel
A Khisti, GW Wornell - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple
antennas at the sender, intended receiver and eavesdropper. The associated channel …
antennas at the sender, intended receiver and eavesdropper. The associated channel …
The secrecy capacity of the MIMO wiretap channel
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the
transmitter sends some confidential information to one user which is a legitimate receiver …
transmitter sends some confidential information to one user which is a legitimate receiver …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
We consider the problem of secure communication with multiantenna transmission in fading
channels. The transmitter simultaneously transmits an information-bearing signal to the …
channels. The transmitter simultaneously transmits an information-bearing signal to the …
Secure communication over fading channels
The fading broadcast channel with confidential messages (BCC) is investigated, where a
source node has common information for two receivers (receivers 1 and 2), and has …
source node has common information for two receivers (receivers 1 and 2), and has …
On cooperative relaying schemes for wireless physical layer security
J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers,
and exploit node cooperation for achieving physical (PHY) layer based security. Two …
and exploit node cooperation for achieving physical (PHY) layer based security. Two …
A note on the secrecy capacity of the multiple-antenna wiretap channel
The secrecy capacity of the multiple-antenna wiretap channel under the average total power
constraint was recently characterized, independently, by Khisti and Wornell and Oggier and …
constraint was recently characterized, independently, by Khisti and Wornell and Oggier and …
[PDF][PDF] Compound wiretap channels
This paper considers the compound wiretap channel, which generalizes Wyner's wiretap
model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a …
model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a …
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wiretap channel, which consists of
a transmitter and a receiver with two antennas each, and an eavesdropper with a single …
a transmitter and a receiver with two antennas each, and an eavesdropper with a single …
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
This paper considers the problem of secret communication over a two-receiver multiple-
input multiple-output (MIMO) Gaussian broadcast channel. The transmitter has two …
input multiple-output (MIMO) Gaussian broadcast channel. The transmitter has two …