Ziping Zhang, D. Guo, Bangning Zhang, Maoqiang Yang, Yu-zhen Huang, Jingming Hu
{"title":"多天线下行窃听网络中扫描-等待组合方案的保密中断分析","authors":"Ziping Zhang, D. Guo, Bangning Zhang, Maoqiang Yang, Yu-zhen Huang, Jingming Hu","doi":"10.1109/ICCS.2016.7833629","DOIUrl":null,"url":null,"abstract":"The secrecy outage performance of multi-antenna downlink wiretap networks with scan-and-wait (SWC) combining scheme is analyzed, where there exists a single-antenna base station communicating with a multi-antenna legitimate user in the presence of a multi-antenna eavesdropper. A new general closed-form expression of secrecy outage probability is derived to quantify the secrecy performance, and the asymptotic secrecy outage probability is also provided to gain further insights to the secrecy performance. Numerical results are presented to validate the theoretical analysis and demonstrate the impact of key system parameters on the secrecy performance.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secrecy outage analysis of scan-and-wait combining scheme in multi-antenna downlink wiretap networks\",\"authors\":\"Ziping Zhang, D. Guo, Bangning Zhang, Maoqiang Yang, Yu-zhen Huang, Jingming Hu\",\"doi\":\"10.1109/ICCS.2016.7833629\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The secrecy outage performance of multi-antenna downlink wiretap networks with scan-and-wait (SWC) combining scheme is analyzed, where there exists a single-antenna base station communicating with a multi-antenna legitimate user in the presence of a multi-antenna eavesdropper. A new general closed-form expression of secrecy outage probability is derived to quantify the secrecy performance, and the asymptotic secrecy outage probability is also provided to gain further insights to the secrecy performance. Numerical results are presented to validate the theoretical analysis and demonstrate the impact of key system parameters on the secrecy performance.\",\"PeriodicalId\":282352,\"journal\":{\"name\":\"2016 IEEE International Conference on Communication Systems (ICCS)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Communication Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS.2016.7833629\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Communication Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.2016.7833629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secrecy outage analysis of scan-and-wait combining scheme in multi-antenna downlink wiretap networks
The secrecy outage performance of multi-antenna downlink wiretap networks with scan-and-wait (SWC) combining scheme is analyzed, where there exists a single-antenna base station communicating with a multi-antenna legitimate user in the presence of a multi-antenna eavesdropper. A new general closed-form expression of secrecy outage probability is derived to quantify the secrecy performance, and the asymptotic secrecy outage probability is also provided to gain further insights to the secrecy performance. Numerical results are presented to validate the theoretical analysis and demonstrate the impact of key system parameters on the secrecy performance.