#### DMCA

## Detecting passive eavesdroppers in the MIMO wiretap channel (2012)

Venue: | in Proc. IEEE ICASSP |

Citations: | 4 - 2 self |

### Citations

351 |
Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory
- Kay
- 1998
(Show Context)
Citation Context ...imal rate to Bob when some resources are mistakenly allocated for secrecy encoding by Alice. 3. EAVESDROPPER DETECTION The authors in [5] mainly focus on the use of a coherent matched filter detector =-=[9]-=- for determining the presence of the primary receiver. However, the matched filter approach requires phase synchronization at Bob as well as estimation of Hbe, which is exceedingly difficult given the... |

287 |
Distribution of matrix variates and latent roots derived from normal samples
- James
- 1964
(Show Context)
Citation Context ...n] +mA [n] , σ 2 b I ) under H1 (7) For convenience we aggregate the samples into a (Nb ×M ) observation matrix Yb = [ yb [0] . . . yb [M − 1] ] (8) which follows a matrix-variate normal distribution =-=[10]-=- under both hypotheses: Yb ∼ CN ( MA, σ 2 b I ) under H0 Yb ∼ CN ( ME +MA, σ 2 b I ) under H1 (9) where we define MA = [ mA [0] . . . mA [M − 1] ] (10) and ME = [ mE [0] . . . mE [M − 1] ] . 2810 4. N... |

233 | Secure transmission with multiple antennas—part II: The MIMOME wiretap channel
- Khisti, Wornell
- 2010
(Show Context)
Citation Context ...a secret message to the receiver, with the eavesdropper being completely unable to decode it. The secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel has been studied in [1]-=-=[2]-=-, for example. In the burgeoning literature on the MIMO wiretap channel, a number of transmit precoding techniques have been proposed to improve the channel secrecy rate by exploiting either the insta... |

156 |
Guaranteeing secrecy using artificial noise
- Goel, Negi
- 2008
(Show Context)
Citation Context ...end a secret message to the receiver, with the eavesdropper being completely unable to decode it. The secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel has been studied in =-=[1]-=--[2], for example. In the burgeoning literature on the MIMO wiretap channel, a number of transmit precoding techniques have been proposed to improve the channel secrecy rate by exploiting either the i... |

84 | Detecting primary receivers for cognitive radio applications
- Wild, Ramchandran
- 2005
(Show Context)
Citation Context ...n rate leaked to Eve upon missed detection, and R̃b is the sub-optimal rate to Bob when some resources are mistakenly allocated for secrecy encoding by Alice. 3. EAVESDROPPER DETECTION The authors in =-=[5]-=- mainly focus on the use of a coherent matched filter detector [9] for determining the presence of the primary receiver. However, the matched filter approach requires phase synchronization at Bob as w... |

41 | Multi-antenna based spectrum sensing for cognitive radios: A GLRT approach
- Zhang, Lim, et al.
- 2010
(Show Context)
Citation Context ...alistic scenario in practice would be the case where some or all of the eavesdropper’s leakage signal parameters are unknown. This would necessitate the use of a generalized likelihood ratio detector =-=[12]-=- for example, the treatment of which is omitted due to limitations of space. 2811 6. NUMERICAL RESULTS For several network scenarios we present simulation results obtained by averaging over 1000 i.i.d... |

20 | Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
- Mukherjee, Swindlehurst
- 2009
(Show Context)
Citation Context ...robust secrecy-encoding schemes as a countermeasure. This is a difficult 1The authors have proposed precoding schemes for the MIMO wiretap channel when the eavesdropper’s CSI is completely unknown in =-=[3, 4]-=-. task in a dynamic wireless network, since by definition the eavesdropper is passive and never transmits. Surprisingly, the issue of determining the presence of potential eavesdroppers in the wiretap... |

11 |
Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
- Mukherjee, Swindlehurst
- 2011
(Show Context)
Citation Context ...robust secrecy-encoding schemes as a countermeasure. This is a difficult 1The authors have proposed precoding schemes for the MIMO wiretap channel when the eavesdropper’s CSI is completely unknown in =-=[3, 4]-=-. task in a dynamic wireless network, since by definition the eavesdropper is passive and never transmits. Surprisingly, the issue of determining the presence of potential eavesdroppers in the wiretap... |

8 |
Approximate inversion of Marcum’s Q-function
- Helstrom
- 1998
(Show Context)
Citation Context ...( λ0+2t/σ2b 2 ) σ2b ( 2t σ2bλ0 )MNb−1 2 IMNb−1 (√ 2tλ0 σ2b ) and the probability of false alarm is calculated as PFA = QMNb (√ λ0, √ 2η σ2b ) , (14) whereQk (a, b) is the generalized MarcumQ-function =-=[9,11]-=-. Similarly, the probability of detection is PD = QMNb (√ λ1, √ 2η σ2b ) . (15) The value of the threshold η that corresponds to a particular PFA can be computed numerically, or from the approximate i... |

4 |
Aspects of direct conversion receiver design
- Hamilton
- 1991
(Show Context)
Citation Context ...transceivers. A general impairment in such receivers is that a small portion of the local oscillator (LO) signal backpropagates to the antenna ports and leaks out, even when in passive reception mode =-=[8]-=-. While the LO leakage signal power is on the order of -50 to -90 dBm from a single antenna port, the LO leakage signal is boosted when multiple RF chains are present as in the MIMO wiretap setting, a... |

2 |
Hidden mobile terminal device discovery in a UWB environment
- Park, Larson, et al.
- 2006
(Show Context)
Citation Context ... very low LO leakage power. Park et al. propose noncoherent envelope detection in the frequency domain by applying a discrete Fourier transform (DFT) to the down-converted and sampled received signal =-=[6,7]-=-. In this work we focus on detection in the time domain, and assume that Eve’s LO frequency w (or a good estimate of it) is known a priori to both legitimate terminals to enable downconversion to base... |

2 |
An RF receiver detection technique for cognitive radio coexistence
- Park, Larson, et al.
- 2010
(Show Context)
Citation Context ...separated by distance dbe. The aggregate LO leakage signal from Eve is sl (t) = [ s1 (t) . . . sNe (t) ]T . We model the LO leakage signal from Eve’s ith antenna port as an unmodulated frequency tone =-=[7]-=-: si (t) = Ai cos (wt+ θi) , (4) where Ai is the amplitude, w is the LO frequency, and θi is an arbitrary phase. Similarly, the LO leakage signal from Alice iswl (t) =[ w1 (t) . . . wNa (t) ]T , where... |