© The Institution of Engineering and Technology
A closed-form expression of the achievable secrecy rate is derived in this study, which is used as the objective function to find the optimal time allocation of channel estimation and transmission. Theory analysis and numerical results demonstrate that the maximum secrecy capacity depends on the total time budget as well as the power at the transmitter.
References
-
-
1)
-
4. Liu, X., Li, B., Chen, H., et al: ‘Detecting pilot spoofing attack in MISO systems with trusted user’, IEEE Commun. Lett., 2019, 23, (2), pp. 314–317 (doi: 10.1109/LCOMM.2018.2889491).
-
2)
-
1. Li, B., Fei, Z., Zhou, C., et al: ‘Physical-layer security in space information networks: a survey’, IEEE IoT-J., 2020, 7, (1), pp. 33–52.
-
3)
-
6. Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic Press, USA, 2014).
-
4)
-
27. Zhou, X., McKay, M.R.: ‘Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation’, IEEE Trans. Veh. Technol., 2010, 59, (8), pp. 3831–3842 (doi: 10.1109/TVT.2010.2059057).
-
5)
-
3. Xiong, Q., Gong, Y., Liang, Y., et al: ‘Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information’, IEEE Wirel. Commun. Lett., 2014, 3, (4), pp. 357–360 (doi: 10.1109/LWC.2014.2317194).
-
6)
-
5. Xiong, Q., Liang, Y., Li, K.H., et al: ‘Secure transmission against pilot spoofing attack: a two-way training-based scheme’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (5), pp. 1017–1026 (doi: 10.1109/TIFS.2016.2516825).
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2020.0678
Related content
content/journals/10.1049/el.2020.0678
pub_keyword,iet_inspecKeyword,pub_concept
6
6