Skip to main content

On the Study of Secrecy Capacity with Outdated CSI

  • Conference paper
  • First Online:
Smart Grid Inspired Future Technologies

Abstract

In this paper, we study the secrecy capacity of the proposed transmission scheme. It is provided that the SNR at the selected best relay, destination and eavesdropper are same due to the symmetrical setup. The outage probability is considered here to evaluate the performance of such a secrecy communication system. Then the system will be extended into outdated channel state information (CSI) scenarios. The correlation coefficients between the actual and outdated channel will influence the system performance. The closed-form expressions of the achievable outage probability will be derived to demonstrate the performance of the proposed secure transmission scheme, and numerical results are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  2. Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  3. Csiszár, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  4. Khisti, A., Wornell, G.W.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory 56(7), 3088–3104 (2010)

    Article  MathSciNet  Google Scholar 

  5. Oggier, F., Hassibi, B.: The MIMO wiretap channel. In: 3rd International Symposium on Communications, Control and Signal Processing, ISCCSP 2008. IEEE (2008)

    Google Scholar 

  6. Khisti, A., Wornell, G.W.: Secure transmission with multiple antennas—Part II: the MIMOME wiretap channel. IEEE Trans. Inf. Theory 56(11), 5515–5532 (2010)

    Article  MathSciNet  Google Scholar 

  7. Liu, T., Shamai, S.: A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans. Inf. Theory 55(6), 2547–2553 (2009)

    Article  MathSciNet  Google Scholar 

  8. Lai, L., El Gamal, H.: The relay–eavesdropper channel: cooperation for secrecy. IEEE Trans. Inf. Theory 54(9), 4005–4019 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  9. Ekrem, E., Ulukus, S.: Secrecy in cooperative relay broadcast channels. IEEE Trans. Inf. Theory 57(1), 137–155 (2011)

    Article  MathSciNet  Google Scholar 

  10. He, X., Yener, A.: Two-hop secure communication using an untrusted relay: a case for cooperative jamming. In: Global Telecommunications Conference, IEEE GLOBECOM 2008. IEEE (2008)

    Google Scholar 

  11. Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  12. Bletsas, A., Lippnian, A., Reed, D.P.: A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements. In: Vehicular Technology Conference, VTC 2005-Spring. 2005 IEEE 61st, vol. 3. IEEE (2005)

    Google Scholar 

  13. Ding, Z., Chin, W.H., Leung, K.K.: Distributed beamforming and power allocation for cooperative networks. IEEE Trans. Wirel. Commun. 7(5), 1817–1822 (2008)

    Article  Google Scholar 

  14. Ding, Z., Leung, K.K., Goeckel, D.L., Towsley, D.: On the application of cooperative transmission to secrecy communications. IEEE J. Sel. Areas Commun. 30(2), 359–368 (2012)

    Article  Google Scholar 

  15. Chen, T., Cumanan, K., Ding, Z., Tian, G.: Network coding with diversity and outdated channel state information. J. Mod. Transp. 20(4), 261–267 (2012)

    Article  Google Scholar 

  16. Abramowitz, M., Stegun, I.A.: Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables. No. 55. Courier Corporation, New York (1964)

    MATH  Google Scholar 

  17. Gradshteyn, I.S., Ryzhik, I.M.: Table of Integrals, Series and Products, 6th edn. Academic Press, New York (2000)

    MATH  Google Scholar 

  18. Vicario, J.L., Anton-Haro, C.: Analytical assessment of multi-user vs. spatial diversity trade-offs with delayed channel state information. IEEE Commun. Lett. 10(8), 588–590 (2006)

    Article  Google Scholar 

  19. Kim, S., Park, S., Hong, D.: Performance analysis of opportunistic relaying scheme with outdated channel information. IEEE Trans. Wirel. Commun. 12(2), 538–549 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chen, T., Xu, P., Ding, Z., Dai, X. (2017). On the Study of Secrecy Capacity with Outdated CSI. In: Hu, J., Leung, V., Yang, K., Zhang, Y., Gao, J., Yang, S. (eds) Smart Grid Inspired Future Technologies. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-319-47729-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47729-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47728-2

  • Online ISBN: 978-3-319-47729-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics