Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29416

Select areas to restrict search in scientific publication database:
A Degraded Practical MIMOME Channel: Issues Insecret Data Communications
In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Digital Object Identifier (DOI):


[1] A. D. Wyner,"The wire-tap channel," Bell Syst. Tech. J., 54(8):210, October 1975.
[2] S. K. Leung Yan Cheong and M. E. Hellman,"The Gaussian wire-tap channel," IEEE Trans. on Information Theory, 24(4):451-456, July 1978.
[3] U. M. Maurer,"Secret key agreement by public discussion from common information," IEEE Trans. on Information Theory, vol. 39, pp. 733742, May 1993.
[4] R. Ahlswede and I. Csiszar,"Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. on Information Theory, vol. 39, pp. 11211132, July 1993.
[5] I. Csiszar and J. Korner,"Broadcast channels with confidential messages," IEEE Trans. on Information Theory, 24(3):339-348, May 1978.
[6] I. E. Telatar,"Capacity of multi-antenna Gaussian channels," European Trans. Telecommunications, 10:585-595, November 1999.
[7] R. Negi and S. Goel,"Secret communication using artificial noise,"IEEE Vehicular Technology Conference, Toulouse, France, May 2006.
[8] P. Parada and R. Blahut,"Secrecy capacity of SIMO and slow fading channels," IEEE International Symposium on Information Theory, Adelaide, Australia, September 2005.
[9] J. Barros and M. Rodrigues,"Secrecy capacity of wireless channels," IEEE International Symposium on Information Theory, USA, 2006
[10] M. Bloch, J. Barros, M. Rodrigues and S. Mclaughlin,"Wireless information theoretic security," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
[11] S. Shafiee and S. Ulukus,"Achievable rates in Gaussian MISO channels with secrecy constraints," In IEEE International Symposium on Information Theory, Nice, France, June 2007.
[12] Z. Li, W. Trappe, and R. D. Yates,"Secret communication via multi antenna transmission," 41st Conference on Information Sciences and Systems, Baltimore, MD, March 2007.
[13] A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar,"On the Gaussian MIMO wiretap channel," IEEE International Symposium on Information Theory, Nice, France, June 2007.
[14] A. Khisti and G. Wornell,"Secure transmission with multiple antennas: The MISOME wiretap channel," Submitted to IEEE Trans. on Information Theory
[15] T. Cover and J. Thomas, Elements of Information Theory Wiley, 1991.
[16] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, 1987.
[17] X. Li and E. P. Ratazzi,"MIMO transmissions with information theoretic secrecy for secret key agreement in wireless networks," IEEE Military Communications Conference (MILCOM2005), 2005. Atlantic City, NJ.
[18] X. Li, M. Chen, and E. P. Ratazzi,"Space time transmissions for wireless secret key agreement with information-theoretic secrecy," IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC05), 2005. The Italian Academy at Columbia University, New York.
[19] P. Viswanath and D. Tse,"Fundamentals of wireless communications," class notes for ECE 459, Department of Electrical and Computer Engineering, University of Illinois at Urbana Champaign, Fall 2003.
[20] S. Shafiee, N. Liu and S. Ulukus,"Secrecy Capacity of the 2-2-1 Gaussian MIMO Wire-tap Channel," ISCCSP, 2008
[21] A. Paulraj, R. Nabar, and D. Gore (2003) Introduction to Space-Time Wireless Communications, Cambridge, U.K.: Cambridge Univ. Press
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007