A New Transmit Antenna Selection Technique for Physical Layer Security with Strong Eavesdropping

被引:1
作者
Anaya-Lopez, Gonzalo J. [1 ]
Carlos Ruiz-Sicilia, J. [2 ]
Javier Lopez-Martinez, F. [1 ]
机构
[1] Univ Malaga, Inst Telecomunicac TELMA, Malaga 29010, Spain
[2] Univ Malaga, Dept Commun Engn, Malaga 29071, Spain
来源
2021 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET'21) | 2021年
关键词
Secrecy capacity; physical layer security; wireless security; attacks; fading channels; MIMO; SYSTEMS;
D O I
10.1109/CommNet52204.2021.9641938
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a new transmit antenna selection (TAS) technique that can be beneficial for physical layer security purposes. Specifically, we show that the conventional TAS criterion based on the legitimate channel state information (CSI) is not recommended when the average signal-to-noise ratio for the illegitimate user becomes comparable or superior to that of the legitimate user. We illustrate that an eavesdropper's based antenna selection technique outperforms conventional TAS, without explicit knowledge of the eavesdropper's instantaneous CSI. Analytical expressions and simulation results to support this comparison are given, showing how this new TAS scheme is a better choice in scenarios with a strong eavesdropper.
引用
收藏
页码:18 / 22
页数:5
相关论文
共 23 条
[1]  
Abramowitz M., 1964, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, National Bureau of Standards, Applied Mathematics Series, V55
[2]   Performance of Transmit Antenna Selection Physical Layer Security Schemes [J].
Alves, Hirley ;
Souza, Richard Demo ;
Debbah, Merouane ;
Bennis, Mehdi .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) :372-375
[3]  
Alves H, 2011, IEEE GLOBE WORK, P879, DOI 10.1109/GLOCOMW.2011.6162582
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]   Ghostbuster: Detecting the Presence of Hidden Eavesdroppers [J].
Chaman, Anadi ;
Wang, Jiaming ;
Sun, Jiachen ;
Hassanieh, Haitham ;
Choudhury, Romit Roy .
MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, :337-351
[6]  
David H. A., 2003, Order Statistics, V3rd
[7]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[8]  
Liu R, 2010, SECURING WIRELESS COMMUNICATIONS AT THE PHYSICAL LAYER, P1, DOI 10.1007/978-1-4419-1385-2
[9]  
Mohammadi A., 2012, RF TRANSCEIVER DESIG, P265
[10]   Transmit Antenna Selection in Secure MIMO Systems Over alpha-mu Fading Channels [J].
Moualeu, Jules M. ;
da Costa, Daniel Benevides ;
Lopez-Martinez, F. Javier ;
Hamouda, Walaa ;
Ngatched, Telex M. N. ;
Dias, Ugo Silva .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (09) :6483-6498