Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint

Xi Zhang*, Xiangyun Zhou, Matthew R. McKay

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)

    Abstract

    This paper investigates secure multi-antenna transmission in slow fading channels without the eavesdropper's channel state information. The use of multiple transmit antennas enables the transmitter to strengthen the signal reception at the intended receiver while simultaneously confusing the eavesdropper by delivering artificial noise. A recently developed secrecy outage formulation, which can separately measure the quality of service and the level of security, is used to characterize the security performance. We show that an arbitrarily low secrecy outage probability cannot be achieved by adding more transmit antennas alone without optimizing other system parameters. To facilitate the practical system design, we present an on-off transmission scheme with optimal artificial noise power allocation, which minimizes the secrecy outage probability whilst guaranteeing a minimum required quality of service.

    Original languageEnglish
    Title of host publicationConference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
    Pages212-216
    Number of pages5
    DOIs
    Publication statusPublished - 2011
    Event45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011 - Pacific Grove, CA, United States
    Duration: 6 Nov 20119 Nov 2011

    Publication series

    NameConference Record - Asilomar Conference on Signals, Systems and Computers
    ISSN (Print)1058-6393

    Conference

    Conference45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
    Country/TerritoryUnited States
    CityPacific Grove, CA
    Period6/11/119/11/11

    Fingerprint

    Dive into the research topics of 'Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint'. Together they form a unique fingerprint.

    Cite this