Rethinking the secrecy outage formulation: A secure transmission design perspective
dc.contributor.author | McKay, Matthew R | en_AU |
dc.contributor.author | Maham , Behrouz | en_AU |
dc.contributor.author | Hjørungnes, Are | en_AU |
dc.contributor.author | Zhou, Xiangyun | en_AU |
dc.date.accessioned | 2015-12-13T22:41:30Z | |
dc.date.created | 2011 | en_AU |
dc.date.updated | 2016-02-24T09:33:18Z | |
dc.description.abstract | This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance. | en_AU |
dc.format.mimetype | application/pdf | en_AU |
dc.identifier.issn | 1089-7798 | en_AU |
dc.identifier.uri | http://hdl.handle.net/1885/78540 | |
dc.language.iso | en_AU | en_AU |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_AU |
dc.source | IEEE Communications Letters | en_AU |
dc.subject | Keywords: Channel fading; Information-theoretic security; Message transmissions; Perfect secrecy; secrecy outage probability; Secure transmission; Security requirements; Throughput performance; Transmission schemes; Channel state information; Information theory; Pr channel state information; Information-theoretic security; secrecy outage probability | en_AU |
dc.title | Rethinking the secrecy outage formulation: A secure transmission design perspective | en_AU |
dc.type | Journal article | en_AU |
local.bibliographicCitation.issue | 3 | |
local.bibliographicCitation.lastpage | 304 | |
local.bibliographicCitation.startpage | 302 | |
local.contributor.affiliation | Zhou, Xiangyun (Sean), College of Engineering and Computer Science, ANU | en_AU |
local.contributor.affiliation | McKay, Matthew R, University of Hong Kong | en_AU |
local.contributor.affiliation | Maham , Behrouz, University of Oslo | en_AU |
local.contributor.affiliation | Hjørungnes, Are, University of Oslo | en_AU |
local.contributor.authoremail | u2586105@anu.edu.au | en_AU |
local.contributor.authoruid | Zhou, Xiangyun (Sean), u2586105 | en_AU |
local.description.embargo | 2037-12-31 | |
local.description.notes | Imported from ARIES | |
local.identifier.absfor | 100599 - Communications Technologies not elsewhere classified | |
local.identifier.ariespublication | f5625xPUB7165 | |
local.identifier.citationvolume | 15 | |
local.identifier.doi | 10.1109/LCOMM.2011.011811.102433 | en_AU |
local.identifier.scopusID | 2-s2.0-79952706123 | |
local.identifier.uidSubmittedBy | f5625 | en_AU |
local.type.status | Published Version | en_AU |
Downloads
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 01_Zhou_Rethinking_the_secrecy_outage_2011.pdf
- Size:
- 219.71 KB
- Format:
- Adobe Portable Document Format