Since a wireless transmission requires to access to a shared medium, the communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be limited by resorting to waterfilling-like algorithms with additional constraints. A Gaussian wiretap channel (WTC) is considered in which a transmitter sends confidential messages to its reference receiver in the presence of a passive eavesdropper. We approach the problem from two different perspectives, focusing either on the rate of the main link or the secrecy level. Through numerical analysis, we show how the information-secrecy regions can be the means to evaluate the quality of the main link and the secrecy level, resulting from our algorithms application. Finally we analyze the case of interfering signals (induced by users sharing the same transmission resource) to show their effects on both information rate and secrecy, even in the case of an eavesdropper able to mitigate the interference.
A Secrecy Constrained Power Allocation for MIMO Wire-Tap Channels / Biagi, Mauro; Baccarelli, Enzo; N., Cordeschi; Polli, Valentina; Patriarca, Tatiana. - (2009), pp. 54-60. (Intervento presentato al convegno 9th IASTED International Conference on Wireless and Optical Communications, WOC 2009 tenutosi a Banff; Canada nel July 6 – 8, 2009).
A Secrecy Constrained Power Allocation for MIMO Wire-Tap Channels
BIAGI, MAURO;BACCARELLI, Enzo;POLLI, VALENTINA;PATRIARCA, TATIANA
2009
Abstract
Since a wireless transmission requires to access to a shared medium, the communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be limited by resorting to waterfilling-like algorithms with additional constraints. A Gaussian wiretap channel (WTC) is considered in which a transmitter sends confidential messages to its reference receiver in the presence of a passive eavesdropper. We approach the problem from two different perspectives, focusing either on the rate of the main link or the secrecy level. Through numerical analysis, we show how the information-secrecy regions can be the means to evaluate the quality of the main link and the secrecy level, resulting from our algorithms application. Finally we analyze the case of interfering signals (induced by users sharing the same transmission resource) to show their effects on both information rate and secrecy, even in the case of an eavesdropper able to mitigate the interference.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.