A nonadaptive transmission scheme in slow fading wiretap channels with adjustable transmit power under secrecy outage constraint

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Physical layer security in slow fading wiretap channels is often guaranteed by constraining the secrecy outage probability (SOP) below a maximum tolerable value. In this paper, we propose a new nonadaptive (NADP) transmission scheme for maximizing the secrecy throughput by using adjustable transmit power based on the instantaneous channel state information (CSI) of the main channel under an SOP constraint. To solve this problem, we transform the optimization problem to single-variable maximization problems in two cases, and the quasiconcavity of them is proved which allows us to use the Golden Section Method (GSM) to find the optimal solution. Simulation results are provided and verify that the proposed NADP scheme is superior to the existing one especially when the transmit power is high.

Original languageEnglish
Title of host publication18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781509030088
DOIs
StatePublished - 19 Dec 2017
Event18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2017 - Sapporo, Japan
Duration: 3 Jul 20176 Jul 2017

Publication series

NameIEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
Volume2017-July

Conference

Conference18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2017
Country/TerritoryJapan
CitySapporo
Period3/07/176/07/17

Keywords

  • Nonadaptive transmission
  • Physical layer security
  • Secrecy outage probability
  • Secrecy throughput maximization

Fingerprint

Dive into the research topics of 'A nonadaptive transmission scheme in slow fading wiretap channels with adjustable transmit power under secrecy outage constraint'. Together they form a unique fingerprint.

Cite this