{"title":"块衰落擦除窃听信道编码策略的比较","authors":"A. Wickramasooriya, I. Land, R. Subramanian","doi":"10.1109/AusCTW.2013.6510062","DOIUrl":null,"url":null,"abstract":"In this paper we study the block fading binary erasure wiretap channel, where the transmitter sends secret messages to a legitimate receiver over a block fading erasure channel in the presence of an eavesdropper. The eavesdropper receives the transmitted secret message over a separate block fading binary erasure channel. It is assumed that the transmitter knows the instantaneous channel state information (CSI) of the main channel and knows only the probability distribution of the capacity of the wiretap channel. We mainly consider the case where the transmitter adapts the code based on the CSI of the main channel in order to achieve either a certain secrecy rate or a certain level of secrecy. We compare the two proposed scenarios for the adaptive coding method based on the probability of secrecy outage and the average throughput.","PeriodicalId":177106,"journal":{"name":"2013 Australian Communications Theory Workshop (AusCTW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparison of coding strategies for the block fading erasure wiretap channel\",\"authors\":\"A. Wickramasooriya, I. Land, R. Subramanian\",\"doi\":\"10.1109/AusCTW.2013.6510062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we study the block fading binary erasure wiretap channel, where the transmitter sends secret messages to a legitimate receiver over a block fading erasure channel in the presence of an eavesdropper. The eavesdropper receives the transmitted secret message over a separate block fading binary erasure channel. It is assumed that the transmitter knows the instantaneous channel state information (CSI) of the main channel and knows only the probability distribution of the capacity of the wiretap channel. We mainly consider the case where the transmitter adapts the code based on the CSI of the main channel in order to achieve either a certain secrecy rate or a certain level of secrecy. We compare the two proposed scenarios for the adaptive coding method based on the probability of secrecy outage and the average throughput.\",\"PeriodicalId\":177106,\"journal\":{\"name\":\"2013 Australian Communications Theory Workshop (AusCTW)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Australian Communications Theory Workshop (AusCTW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AusCTW.2013.6510062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Australian Communications Theory Workshop (AusCTW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AusCTW.2013.6510062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of coding strategies for the block fading erasure wiretap channel
In this paper we study the block fading binary erasure wiretap channel, where the transmitter sends secret messages to a legitimate receiver over a block fading erasure channel in the presence of an eavesdropper. The eavesdropper receives the transmitted secret message over a separate block fading binary erasure channel. It is assumed that the transmitter knows the instantaneous channel state information (CSI) of the main channel and knows only the probability distribution of the capacity of the wiretap channel. We mainly consider the case where the transmitter adapts the code based on the CSI of the main channel in order to achieve either a certain secrecy rate or a certain level of secrecy. We compare the two proposed scenarios for the adaptive coding method based on the probability of secrecy outage and the average throughput.