{"title":"MIMO窃听信道的点阵码设计准则","authors":"Hamed Mirghasemi, J. Belfiore","doi":"10.1109/ITWF.2015.7360779","DOIUrl":null,"url":null,"abstract":"We consider the MIMO wiretap channel, where a legitimate transmitter (Alice) wishes to communicate a confidential message to the legitimate receiver (Bob) over a MIMO channel, while its messages are being eavesdropped by Eve through another MIMO channel. Supposing that Alice uses the nested lattice code proposed in [8], we characterize the expected value of amount of information leakage to Eve, and from minimizing this expected value, we derive a code design criterion for MIMO lattice wiretap codes. The special cases of block and fast fading channels are also studied. We also illustrate our lattice code design criterion using the Alamouti Code as the simplest MIMO code available in the literature.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Lattice code design criterion for MIMO wiretap channels\",\"authors\":\"Hamed Mirghasemi, J. Belfiore\",\"doi\":\"10.1109/ITWF.2015.7360779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the MIMO wiretap channel, where a legitimate transmitter (Alice) wishes to communicate a confidential message to the legitimate receiver (Bob) over a MIMO channel, while its messages are being eavesdropped by Eve through another MIMO channel. Supposing that Alice uses the nested lattice code proposed in [8], we characterize the expected value of amount of information leakage to Eve, and from minimizing this expected value, we derive a code design criterion for MIMO lattice wiretap codes. The special cases of block and fast fading channels are also studied. We also illustrate our lattice code design criterion using the Alamouti Code as the simplest MIMO code available in the literature.\",\"PeriodicalId\":281890,\"journal\":{\"name\":\"2015 IEEE Information Theory Workshop - Fall (ITW)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Information Theory Workshop - Fall (ITW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITWF.2015.7360779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Information Theory Workshop - Fall (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITWF.2015.7360779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lattice code design criterion for MIMO wiretap channels
We consider the MIMO wiretap channel, where a legitimate transmitter (Alice) wishes to communicate a confidential message to the legitimate receiver (Bob) over a MIMO channel, while its messages are being eavesdropped by Eve through another MIMO channel. Supposing that Alice uses the nested lattice code proposed in [8], we characterize the expected value of amount of information leakage to Eve, and from minimizing this expected value, we derive a code design criterion for MIMO lattice wiretap codes. The special cases of block and fast fading channels are also studied. We also illustrate our lattice code design criterion using the Alamouti Code as the simplest MIMO code available in the literature.