Wireless transmission requires the access to a shared medium, so the communication may be susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be limited by resorting to waterfilling-like algorithms by introducing additional constraints. A Gaussian Wire-Tap Channel (WTC) has been considered as the channel in which a transmitter sends confidential messages to its reference receiver in the presence of a passive eavesdropper. In the more general context of an ad-hoc network, we propose two different Space Division Multiple Access (SDMA) techniques by paying attention to the rate of the main link and to secrecy level. Through numerical analysis, we show the information-secrecy regions to evaluate the quality of main link and secrecy level that the algorithms can allow when constrained SDMA is considered. Finally, we evaluate the effect of interference (induced by users sharing the same transmission resource) to evaluate the effect of disturbing signals on information rate and secrecy.

SDMA with Secrecy Constraints / Biagi, Mauro; Baccarelli, Enzo; Cordeschi, Nicola; Polli, Valentina; Patriarca, Tatiana. - (2010), pp. 1-6. (Intervento presentato al convegno 2010 IEEE Sarnoff Symposium tenutosi a Princeton; United States nel 12-14 Aprile 2010) [10.1109/sarnof.2010.5469803].

SDMA with Secrecy Constraints

BIAGI, MAURO;BACCARELLI, Enzo;CORDESCHI, Nicola;POLLI, VALENTINA;PATRIARCA, TATIANA
2010

Abstract

Wireless transmission requires the access to a shared medium, so the communication may be susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be limited by resorting to waterfilling-like algorithms by introducing additional constraints. A Gaussian Wire-Tap Channel (WTC) has been considered as the channel in which a transmitter sends confidential messages to its reference receiver in the presence of a passive eavesdropper. In the more general context of an ad-hoc network, we propose two different Space Division Multiple Access (SDMA) techniques by paying attention to the rate of the main link and to secrecy level. Through numerical analysis, we show the information-secrecy regions to evaluate the quality of main link and secrecy level that the algorithms can allow when constrained SDMA is considered. Finally, we evaluate the effect of interference (induced by users sharing the same transmission resource) to evaluate the effect of disturbing signals on information rate and secrecy.
2010
2010 IEEE Sarnoff Symposium
Interference; MIMO; SDMA
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
SDMA with Secrecy Constraints / Biagi, Mauro; Baccarelli, Enzo; Cordeschi, Nicola; Polli, Valentina; Patriarca, Tatiana. - (2010), pp. 1-6. (Intervento presentato al convegno 2010 IEEE Sarnoff Symposium tenutosi a Princeton; United States nel 12-14 Aprile 2010) [10.1109/sarnof.2010.5469803].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/366037
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact