{"title":"窃听器存在下的保密空间复用","authors":"T. Khalaf, S. Kim","doi":"10.1109/MILCOM.2013.167","DOIUrl":null,"url":null,"abstract":"In this paper, we present a confidential spatial multiplexing scheme in the presence of an eavesdropper, when the number of antennas at the source is less than that at the intended destination. To degrade the eavesdropper's channel, a pre-coded interference is added to the message at the source. The interference power at the intended destination is minimized via least square solution while it cannot be removed at the eavesdropper, thereby disabling a reliable reception of data at the eavesdropper. Secrecy capacity and the symbol error rate at the intended destination and the eavesdropper are analyzed.","PeriodicalId":379382,"journal":{"name":"MILCOM 2013 - 2013 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Confidential Spatial Multiplexing in the Presence of Eavesdropper\",\"authors\":\"T. Khalaf, S. Kim\",\"doi\":\"10.1109/MILCOM.2013.167\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a confidential spatial multiplexing scheme in the presence of an eavesdropper, when the number of antennas at the source is less than that at the intended destination. To degrade the eavesdropper's channel, a pre-coded interference is added to the message at the source. The interference power at the intended destination is minimized via least square solution while it cannot be removed at the eavesdropper, thereby disabling a reliable reception of data at the eavesdropper. Secrecy capacity and the symbol error rate at the intended destination and the eavesdropper are analyzed.\",\"PeriodicalId\":379382,\"journal\":{\"name\":\"MILCOM 2013 - 2013 IEEE Military Communications Conference\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2013 - 2013 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2013.167\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2013 - 2013 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2013.167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Confidential Spatial Multiplexing in the Presence of Eavesdropper
In this paper, we present a confidential spatial multiplexing scheme in the presence of an eavesdropper, when the number of antennas at the source is less than that at the intended destination. To degrade the eavesdropper's channel, a pre-coded interference is added to the message at the source. The interference power at the intended destination is minimized via least square solution while it cannot be removed at the eavesdropper, thereby disabling a reliable reception of data at the eavesdropper. Secrecy capacity and the symbol error rate at the intended destination and the eavesdropper are analyzed.