Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis
Authors: Jia, S., Zhang, J., Chen, S., Hao, W. and Xu, W.
Journal: IEEE Transactions on Information Forensics and Security
Volume: 17
Pages: 2906-2919
eISSN: 1556-6021
ISSN: 1556-6013
DOI: 10.1109/TIFS.2022.3197062
Abstract:This paper investigates the power allocation problem for secure multiple-input single-output transmission with the injection of artificial noise (AN), in the presence of an unknown eavesdropper (Eve). Two power allocation schemes, the optimal adaptive power allocation (OAPA) and suboptimal fixed power allocation (SFPA) schemes, are proposed to enhance the physical layer security of the considered system. Since the noise power at Eve is unknown, both power allocation schemes are designed for the worst-case scenario in which the noise power at Eve is assumed to be zero, aiming to minimize the secrecy outage probability (SOP). To characterize the performance of the proposed power allocation schemes, approximate closed-form expressions for average SOP under a preset noise power level are derived by applying Gauss-Chebyshev quadrature. We also address the worst-case secrecy outage performance for the proposed OAPA and SFPA schemes. Our analytical and numerical results show that, compared with the exhaustive search method that requires Eve's prior information, the proposed OAPA scheme exhibits comparable secrecy outage performance without Eve's prior information. Additionally, the SFPA scheme, also without Eve's prior information, is capable of achieving almost the same worst-case SOP as the OAPA scheme, with a much lower implementation complexity.
https://eprints.bournemouth.ac.uk/37294/
Source: Scopus
Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis
Authors: Jia, S., Zhang, J., Chen, S., Hao, W. and Xu, W.
Journal: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Volume: 17
Pages: 2906-2919
eISSN: 1556-6021
ISSN: 1556-6013
DOI: 10.1109/TIFS.2022.3197062
https://eprints.bournemouth.ac.uk/37294/
Source: Web of Science (Lite)
Secure Multiantenna Transmission with an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis
Authors: Jia, S., Zhang, J., Chen, S., Hao, W. and Xu, W.
Journal: IEEE Transactions on Information Forensics and Security
Publisher: IEEE
ISSN: 1556-6013
https://eprints.bournemouth.ac.uk/37294/
Source: Manual
Secure Multiantenna Transmission with an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis
Authors: Jia, S., Zhang, J., Chen, S., Hao, W. and Xu, W.
Journal: IEEE Transactions on Information Forensics and Security
Volume: 17
Pages: 2906-2919
Publisher: IEEE
ISSN: 1556-6013
Abstract:—This paper investigates the power allocation problem for secure multiple-input single-output transmission with the injection of artificial noise (AN), in the presence of an unknown eavesdropper (Eve). Two power allocation schemes, the optimal adaptive power allocation (OAPA) and suboptimal fixed power allocation (SFPA) schemes, are proposed to enhance the physical layer security of the considered system. Since the noise power at Eve is unknown, both power allocation schemes are designed for the worst-case scenario in which the noise power at Eve is assumed to be zero, aiming to minimize the secrecy outage probability (SOP). To characterize the performance of the proposed power allocation schemes, approximate closedform expressions for average SOP under a preset noise power level are derived by applying Gauss-Chebyshev quadrature. We also address the worst-case secrecy outage performance for the proposed OAPA and SFPA schemes. Our analytical and numerical results show that, compared with the exhaustive search method that requires Eve’s prior information, the proposed OAPA scheme exhibits comparable secrecy outage performance without Eve’s prior information. Additionally, the SFPA scheme, also without Eve’s prior information, is capable of achieving almost the same worst-case SOP as the OAPA scheme, with a much lower implementation complexity.
https://eprints.bournemouth.ac.uk/37294/
Source: BURO EPrints