Switched power allocation for MISOME wiretap channels

Thang Van Nguyen, Tony Q.S. Quek, Hyundong Shin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In this paper, we consider secure communication over a multiple-input single-output Rayleigh-fading channel in the presence of a multiple-antenna eavesdropper - referred to as a multiple-input single-output multiple-eavesdropper (MISOME) wiretap channel. Specifically, secure beamforming with artificial noise is treated when the transmitter has access to full channel state information (CSI) of a legitimate channel but only partial statistical CSI of an eavesdropper channel. We first derive the optimal power allocation between the information-bearing signal and artificial noise (or simulated interference) to maximize the achievable secrecy rate in the presence of a weak or strong eavesdropper. We then develop a near-optimal power allocation strategy in a switched fashion for a general case and derive a closed-form expression for the ergodic secrecy rate achieved by secure beamforming with this switched power allocation in the MISOME wiretap channel.

Original languageEnglish
Title of host publication2012 IEEE International Symposium on Information Theory Proceedings, ISIT 2012
Pages2326-2330
Number of pages5
DOIs
Publication statusPublished - 2012
Event2012 IEEE International Symposium on Information Theory, ISIT 2012 - Cambridge, MA, United States
Duration: 2012 Jul 12012 Jul 6

Publication series

NameIEEE International Symposium on Information Theory - Proceedings

Conference

Conference2012 IEEE International Symposium on Information Theory, ISIT 2012
Country/TerritoryUnited States
CityCambridge, MA
Period12-07-0112-07-06

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modelling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Switched power allocation for MISOME wiretap channels'. Together they form a unique fingerprint.

Cite this