pith. machine review for the scientific record. sign in

arxiv: 1407.7302 · v1 · submitted 2014-07-28 · 💻 cs.IT · math.IT

Recognition: unknown

Exploiting Large-Scale MIMO Techniques for Physical Layer Security with Imperfect Channel State Information

Authors on Pith no claims yet
classification 💻 cs.IT math.IT
keywords securitychanneleavesdropperimperfectinformationlayerlegitimatephysical
0
0 comments X
read the original abstract

In this paper, we study the problem of physical layer security in large-scale multiple input multiple output (LS-MIMO) systems. The large number of antenna elements in LS-MIMO system is exploited to enhance transmission security and improve system performance, especially when the eavesdropper is closer to the information source and has more antennas than the legitimate user. However, in practical systems, the problem becomes challenging because the eavesdropper channel state information (CSI) is usually unavailable without cooperation and the legitimate CSI may be imperfect due to channel estimation error. In this paper, we first analyze the performance of physical layer security without eavesdropper CSI and with imperfect legitimate CSI, and then propose an energy-efficient power allocation scheme to meet the demand for wireless security and quality of service (QoS) simultaneously. Finally, numerical results validate the effectiveness of the proposed scheme.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.