Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper investigates the parameter design and optimization on the artificial-noise-aided multi-antenna transmission in the presence of randomly located eavesdroppers. Our objective is to maximize the secrecy throughput subject to a secrecy outage constraint. We propose an on-off strategy in which the transmitter decides when to start transmissions according to the instantaneous channel state information of the main channel. System parameters, including the wiretap code rates, the transmission threshold of the on-off strategy, and the power allocation between information signals and artificial noises, are optimized based on the statistic channel state information of both the legitimate channel and the wiretap channels. The whole optimization procedure is performed off-line. We formulate the optimization problem and provide explicit solutions on the optimal parameters. Numerical results are demonstrated to verify our theoretical analysis and show the effectiveness of our design.

Original languageEnglish
Title of host publication2016 International Conference on Computing, Networking and Communications, ICNC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467385794
DOIs
StatePublished - 23 Mar 2016
EventInternational Conference on Computing, Networking and Communications, ICNC 2016 - Kauai, United States
Duration: 15 Feb 201618 Feb 2016

Publication series

Name2016 International Conference on Computing, Networking and Communications, ICNC 2016

Conference

ConferenceInternational Conference on Computing, Networking and Communications, ICNC 2016
Country/TerritoryUnited States
CityKauai
Period15/02/1618/02/16

Fingerprint

Dive into the research topics of 'Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers'. Together they form a unique fingerprint.

Cite this