#### DMCA

## Diversity-Multiplexing Tradeoff for MIMO Wire-tap Channels with CSIT

Citations: | 1 - 0 self |

### Citations

1189 |
Communication theory of secrecy systems
- Shannon
- 1948
(Show Context)
Citation Context ...erest in unconditional security techniques; techniques that are secure even if eavesdroppers have infinite computing time and power. The notion of unconditional security is first discussed by Shannon =-=[1]-=-. Wyner introduced the physically degraded wiretap channel in [2], established the perfect secrecy rate; i.e. the transmission rate, up to which perfect secrecy is possible, and the tradeoff between t... |

1132 | Diversity and multiplexing: a fundamental tradeoff in multiple antenna channels
- Zheng, Tse
- 2003
(Show Context)
Citation Context ...f secure degrees of freedom are investigated in [16], [17], [18], [19] and [20]. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in =-=[21]-=-. The DMT is a high SNR analysis and describes the fundamental tradeoff between the diversity gain and the multiplexing gain. The diversity gain is the decay rate of the probability of error, and the ... |

740 |
Broadcast Channels with Confidential Messages
- Csiszar, Korner
- 1978
(Show Context)
Citation Context ...annel in [2], established the perfect secrecy rate; i.e. the transmission rate, up to which perfect secrecy is possible, and the tradeoff between the secrecy rate and the communication rate. Later in =-=[3]-=-, these results were extended to less noisy and more capable broadcast channels. The secrecy capacity for the Gaussian wire-tap channel was found in [4]. Recently fading wire-tap channels are investig... |

359 |
The Gaussian wiretap channel
- Leung-Yan-Cheong, Hellman
- 1978
(Show Context)
Citation Context ...crecy rate and the communication rate. Later in [3], these results were extended to less noisy and more capable broadcast channels. The secrecy capacity for the Gaussian wire-tap channel was found in =-=[4]-=-. Recently fading wire-tap channels are investigated in [5], [6], for which the ergodic secrecy capacity is calculated when both the transmitter and the receivers have channel state information (CSI).... |

233 | Secure transmission with multiple antennas—part II: The MIMOME wiretap channel
- Khisti, Wornell
- 2010
(Show Context)
Citation Context ... Technology in Telecommunications (CATT) of Polytechnic Institute of NYU. when the source and the destination have two antennas each and the eavesdropper has only a single antenna. Concurrent work in =-=[9]-=- and [10] establish the secrecy capacity for the fading MIMO wire-tap channel under the full CSI assumption for arbitrary antenna numbers. A closed-form expression for the secrecy capacity is found in... |

200 | On the Secrecy Capacity of Fading Channels
- Gopala, Lai, et al.
- 2008
(Show Context)
Citation Context ...results were extended to less noisy and more capable broadcast channels. The secrecy capacity for the Gaussian wire-tap channel was found in [4]. Recently fading wire-tap channels are investigated in =-=[5]-=-, [6], for which the ergodic secrecy capacity is calculated when both the transmitter and the receivers have channel state information (CSI). In [5] the ergodic secrecy capacity, when the source node ... |

185 | Secure Communication over Fading Channels
- Liang, Poor, et al.
- 2008
(Show Context)
Citation Context ...ts were extended to less noisy and more capable broadcast channels. The secrecy capacity for the Gaussian wire-tap channel was found in [4]. Recently fading wire-tap channels are investigated in [5], =-=[6]-=-, for which the ergodic secrecy capacity is calculated when both the transmitter and the receivers have channel state information (CSI). In [5] the ergodic secrecy capacity, when the source node does ... |

156 |
Guaranteeing secrecy using artificial noise
- Goel, Negi
- 2008
(Show Context)
Citation Context ...LITY SCHEMES In this section we propose a new secret DMT optimal scheme for the full CSIT case as an alternative to the strategy studied in Theorem 1, and compare it to the artificial noise scheme of =-=[25]-=-. A. Zero-forcing We consider a simple zero-forcing method that achieves the full CSIT secret DMT. As k ≥ m results in a trivial secret DMT, we assume k < m. In the zero-forcing protocol we transmit t... |

110 | Secrecy capacity of wireless channels
- Barros, Rodrigues
- 2006
(Show Context)
Citation Context ...annel under the full CSI assumption for arbitrary antenna numbers. A closed-form expression for the secrecy capacity is found in [13]. For the wire-tap channel, outage approach are considered in [7], =-=[14]-=- and [15]. Outage probability for a target secrecy rate is also investigated in [6], when the source, the destination and the eavesdropper have CSI, and optimal power allocation policies that minimize... |

86 |
The wire-tap channel,” The Bell System
- Wyner
- 1975
(Show Context)
Citation Context ...ecure even if eavesdroppers have infinite computing time and power. The notion of unconditional security is first discussed by Shannon [1]. Wyner introduced the physically degraded wiretap channel in =-=[2]-=-, established the perfect secrecy rate; i.e. the transmission rate, up to which perfect secrecy is possible, and the tradeoff between the secrecy rate and the communication rate. Later in [3], these r... |

77 | Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel. Submitted to
- Shafiee, Liu, et al.
- 2007
(Show Context)
Citation Context ...s also evaluated. In wireless channels, multiple antennas increase robustness against fading, and also transmission rates. Multiple antennas are considered in the context of wire-tap channels in [7], =-=[8]-=-- [12]. In [8] the authors find the secrecy capacity of the Gaussian multiple-input multiple-output (MIMO) wire-tap channel, 1 This material is based upon work partially supported by NSF Grant No. 063... |

71 | Applications of LDPC codes to the wiretap channel
- Thangaraj, Dihidar, et al.
- 2007
(Show Context)
Citation Context ...able CSIT. In a system with secrecy constraints, the probability of error is due to two events: Either the destination does not receive the secret message reliably, or perfect secrecy is not achieved =-=[24]-=-. When the channel block length-N is long enough and good codes are used, probability of error is dominated by the corresponding outage events. Then we can write where Pe(SNR) = P (perfect secrecy not... |

68 |
Secrecy capacity of SIMO and slow fading channels
- Parada, Blahut
- 2005
(Show Context)
Citation Context ...SI, is also evaluated. In wireless channels, multiple antennas increase robustness against fading, and also transmission rates. Multiple antennas are considered in the context of wire-tap channels in =-=[7]-=-, [8]- [12]. In [8] the authors find the secrecy capacity of the Gaussian multiple-input multiple-output (MIMO) wire-tap channel, 1 This material is based upon work partially supported by NSF Grant No... |

64 | Secret communication via multi-antenna transmission - Li, Trappe, et al. - 2007 |

49 |
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
- Bustin, Liu, et al.
- 2009
(Show Context)
Citation Context ...and [10] establish the secrecy capacity for the fading MIMO wire-tap channel under the full CSI assumption for arbitrary antenna numbers. A closed-form expression for the secrecy capacity is found in =-=[13]-=-. For the wire-tap channel, outage approach are considered in [7], [14] and [15]. Outage probability for a target secrecy rate is also investigated in [6], when the source, the destination and the eav... |

30 | Degrees of freedom of wireless X networks
- Cadambe, Jafar
- 2008
(Show Context)
Citation Context ...dropper have CSI, and optimal power allocation policies that minimize the outage probability are calculated. On the other hand, the notion of secure degrees of freedom are investigated in [16], [17], =-=[18]-=-, [19] and [20]. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in [21]. The DMT is a high SNR analysis and describes the fundament... |

17 | Secured communication over frequency-selective fading channels: A practical Vandermonde precoding
- Kobayashi, Debbah, et al.
- 2009
(Show Context)
Citation Context ...r have CSI, and optimal power allocation policies that minimize the outage probability are calculated. On the other hand, the notion of secure degrees of freedom are investigated in [16], [17], [18], =-=[19]-=- and [20]. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in [21]. The DMT is a high SNR analysis and describes the fundamental tra... |

15 | Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel
- Yuksel, Erkip
- 2011
(Show Context)
Citation Context ...n rate in the limit of high SNR. The DMT is strongly related to the probability of outage as probability of error is generally dominated by the outage event at high SNR. The secret DMT was defined in =-=[22]-=- and it was found that the eavesdropper “steals” both transmitter and receiver antennas if there is no CSIT. The secret DMT for the relay channel with an eavesdropper was found in [23]. In this paper ... |

12 | Multiple antenna secure broadcast over wireless networks
- Liu, Poor
(Show Context)
Citation Context ...o evaluated. In wireless channels, multiple antennas increase robustness against fading, and also transmission rates. Multiple antennas are considered in the context of wire-tap channels in [7], [8]- =-=[12]-=-. In [8] the authors find the secrecy capacity of the Gaussian multiple-input multiple-output (MIMO) wire-tap channel, 1 This material is based upon work partially supported by NSF Grant No. 0635177, ... |

12 | On the compound MIMO broadcast channels with confidential messages
- Kobayashi, Liang, et al.
- 2009
(Show Context)
Citation Context ...I, and optimal power allocation policies that minimize the outage probability are calculated. On the other hand, the notion of secure degrees of freedom are investigated in [16], [17], [18], [19] and =-=[20]-=-. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in [21]. The DMT is a high SNR analysis and describes the fundamental tradeoff bet... |

10 | Koyluoglu, “On the delay limited secrecy capacity of fading channels
- Youssef, Gamal, et al.
(Show Context)
Citation Context ...er the full CSI assumption for arbitrary antenna numbers. A closed-form expression for the secrecy capacity is found in [13]. For the wire-tap channel, outage approach are considered in [7], [14] and =-=[15]-=-. Outage probability for a target secrecy rate is also investigated in [6], when the source, the destination and the eavesdropper have CSI, and optimal power allocation policies that minimize the outa... |

5 | On the Capacity of - Sharif, Hassibi |

3 |
Secure diversity-multiplexing tradeoffs in MIMO relay channels
- Gowda, Quek, et al.
- 2009
(Show Context)
Citation Context ... was defined in [22] and it was found that the eavesdropper “steals” both transmitter and receiver antennas if there is no CSIT. The secret DMT for the relay channel with an eavesdropper was found in =-=[23]-=-. In this paper we investigate the MIMO wire-tap channel DMT when there is full CSIT. We find that the eavesdropper “steals” only transmitter antennas and the number of effective antennas left determi... |

1 |
Compound wiretap channels,” December 2008, submitted to the EURASIP
- Liang, Kramer, et al.
(Show Context)
Citation Context ...nd the eavesdropper have CSI, and optimal power allocation policies that minimize the outage probability are calculated. On the other hand, the notion of secure degrees of freedom are investigated in =-=[16]-=-, [17], [18], [19] and [20]. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in [21]. The DMT is a high SNR analysis and describes t... |

1 |
Interference alignment for secrecy,” October 2008, submitted to
- Koyluoglu, Gamal, et al.
(Show Context)
Citation Context ... eavesdropper have CSI, and optimal power allocation policies that minimize the outage probability are calculated. On the other hand, the notion of secure degrees of freedom are investigated in [16], =-=[17]-=-, [18], [19] and [20]. An important performance measure for MIMO fading channels is the diversity-multiplexing tradeoff (DMT), established in [21]. The DMT is a high SNR analysis and describes the fun... |