Matrix computations (3rd ed.)
Random matrix theory and wireless communications
Communications and Information Theory
A note on the secrecy capacity of the multiple-antenna wiretap channel
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
Information-theoretic key agreement: from weak to strong secrecy for free
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Secure transmission with multiple antennas: part II: the MIMOME wiretap channel
IEEE Transactions on Information Theory
Hotelling's generalized distribution and performance of 2D-RAKE receivers
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Secure Broadcasting Over Fading Channels
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Secured communication over frequency-selective fading channels: a practical vandermonde precoding
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Authentication over noisy channels
IEEE Transactions on Information Theory
A note on the secrecy capacity of the multiple-antenna wiretap channel
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
MIMO Gaussian broadcast channels with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
Secure relaying: can publicly transferred keys increase degrees of freedom?
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Training signal design for discriminatory channel estimation
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The Gaussian wiretap channel with noisy public feedback: breaking the high-SNR ceiling
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Cooperative jamming in MIMO ad-hoc networks
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Cooperation with an untrusted relay: a secrecy perspective
IEEE Transactions on Information Theory
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
IEEE Transactions on Information Theory
Secure transmission with multiple antennas: part II: the MIMOME wiretap channel
IEEE Transactions on Information Theory
Training sequence design for discriminatory channel estimation in wireless MIMO systems
IEEE Transactions on Signal Processing
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
MAC with partially cooperating encoders and security constraints
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Wireless Personal Communications: An International Journal
SLNR-Based Transmit Beamforming for MIMO Wiretap Channel
Wireless Personal Communications: An International Journal
Secure cooperative physical-layer coding for the internet of things
Proceedings of the International Workshop on Adaptive Security
Hi-index | 755.26 |
The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and the channel matrices are fixed and known to all the terminals, and show that a beamforming strategy is capacity-achieving. In addition, we study a masked beamforming scheme that radiates power isotropically in all directions and show that it attains near-optimal performance in the high SNR regime. Insights into the scaling behavior of the capacity in the large antenna regime as well as extensions to ergodic fading channels are also provided.