About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on Secure Wireless Networks

Research Article

On the Multi-Antenna Wiretap Channel with Delayed CSI at the Transmitter

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.valuetools.2011.245781,
        author={Mari Kobayashi and Pablo  Piantanida and Sheng Yang and Shlomo Shamai (Shitz)},
        title={On the Multi-Antenna Wiretap Channel with Delayed CSI at the Transmitter},
        proceedings={1st International ICST Workshop on Secure Wireless Networks},
        publisher={ACM},
        proceedings_a={SECURENETS},
        year={2012},
        month={6},
        keywords={Physical layer security Wiretap channel},
        doi={10.4108/icst.valuetools.2011.245781}
    }
    
  • Mari Kobayashi
    Pablo Piantanida
    Sheng Yang
    Shlomo Shamai (Shitz)
    Year: 2012
    On the Multi-Antenna Wiretap Channel with Delayed CSI at the Transmitter
    SECURENETS
    ICST
    DOI: 10.4108/icst.valuetools.2011.245781
Mari Kobayashi1,*, Pablo Piantanida1, Sheng Yang1, Shlomo Shamai (Shitz)2
  • 1: Supelec
  • 2: Technion-Israel Institute of Technology
*Contact email: mari.kobayashi@supelec.fr

Abstract

The multi-input single-output (MISO) Gaussian wiretap channel with delayed channel state information (CSI) available at the transmitter and at the eavesdropper is investigated. This scenario may occur when the legitimate receiver sends its channel state to the transmitter via a delayed feedback link which can be also overheard by an eavesdropper. We show that delayed CSI, even completely outdated, offers the opportunity to ensure the secrecy. Namely, by aligning the artificial noise at the legitimate receiver, a secrecy degrees of freedom (SDoF) of 1/2 can be achieved. It turns out that the result is irrelevant to whether the transmitter knows the legitimate channel or the eavesdropper channel with a delay and both cases yield the equivalent opportunity. The artificial noise scheme can be further extended to the case of broadcast channel with two confidential messages.

Keywords
Physical layer security Wiretap channel
Published
2012-06-26
Publisher
ACM
http://dx.doi.org/10.4108/icst.valuetools.2011.245781
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL