[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

On the Secrecy Capacity of Fading Channels

Published: 01 October 2008 Publication History

Abstract

We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the transmitter has access to the channel gains of the legitimate receiver and the eavesdropper. The secrecy capacity under this full CSI assumption serves as an upper bound for the secrecy capacity when only the CSI of the legitimate receiver is known at the transmitter, which is characterized next. In each scenario, the perfect secrecy capacity is obtained along with the optimal power and rate allocation strategies. We then propose a low-complexity on/off power allocation strategy that achieves near-optimal performance with only the main channel CSI. More specifically, this scheme is shown to be asymptotically optimal as the average signal-to-noise ratio (SNR) goes to infinity, and interestingly, is shown to attain the secrecy capacity under the full CSI assumption. Overall, channel fading has a positive impact on the secrecy capacity and rate adaptation, based on the main channel CSI, is critical in facilitating secure communications over slow fading channels.

Cited By

View all
  • (2024)Secure Body-Centric Internet of Things Networks: Physical Layer Security versus Covert CommunicationIEEE Transactions on Wireless Communications10.1109/TWC.2024.339574923:10_Part_1(12731-12748)Online publication date: 1-Oct-2024
  • (2024)Secrecy Enhancement of relay cooperative NOMA network based on user behaviorComputer Communications10.1016/j.comcom.2024.03.013220:C(23-34)Online publication date: 15-Apr-2024
  • (2024)Secret DMT Analysis for a Multiuser MIMO Fading ChannelWireless Personal Communications: An International Journal10.1007/s11277-024-11176-2135:4(2439-2463)Online publication date: 1-Apr-2024
  • Show More Cited By
  1. On the Secrecy Capacity of Fading Channels

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Information Theory
    IEEE Transactions on Information Theory  Volume 54, Issue 10
    October 2008
    381 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 October 2008

    Author Tags

    1. Channel state information (CSI)
    2. fading
    3. list decoding
    4. secrecy capacity
    5. wiretap channel

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secure Body-Centric Internet of Things Networks: Physical Layer Security versus Covert CommunicationIEEE Transactions on Wireless Communications10.1109/TWC.2024.339574923:10_Part_1(12731-12748)Online publication date: 1-Oct-2024
    • (2024)Secrecy Enhancement of relay cooperative NOMA network based on user behaviorComputer Communications10.1016/j.comcom.2024.03.013220:C(23-34)Online publication date: 15-Apr-2024
    • (2024)Secret DMT Analysis for a Multiuser MIMO Fading ChannelWireless Personal Communications: An International Journal10.1007/s11277-024-11176-2135:4(2439-2463)Online publication date: 1-Apr-2024
    • (2024)Physical‐layer security enhancement in wireless sensor networks through artificial noise optimizationSecurity and Privacy10.1002/spy2.3857:4Online publication date: 5-Jul-2024
    • (2023)Multi-Domain Resource Multiplexing Based Secure Transmission for Satellite-Assisted IoT: AO-SCA ApproachIEEE Transactions on Wireless Communications10.1109/TWC.2023.325022722:11(7319-7330)Online publication date: 1-Nov-2023
    • (2023)Secure Rate Splitting Multiple Access: How Much of the Split Signal to Reveal?IEEE Transactions on Wireless Communications10.1109/TWC.2022.322396122:6(4173-4187)Online publication date: 1-Jun-2023
    • (2023)Secure Vehicular Communications With Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation ApproachIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.328325924:11(13462-13471)Online publication date: 1-Nov-2023
    • (2023)Secrecy Analysis of ABCom-Based Intelligent Transportation Systems With JammingIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.325042725:3(2880-2892)Online publication date: 6-Mar-2023
    • (2023)Secrecy Analysis for IRS-Aided Wiretap MIMO Communications: Fundamental Limits and System DesignIEEE Transactions on Information Theory10.1109/TIT.2023.333664870:6(4140-4159)Online publication date: 23-Nov-2023
    • (2022)Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEsWireless Communications & Mobile Computing10.1155/2022/85934742022Online publication date: 1-Jan-2022
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media