TY - GEN
T1 - Broadcasting over fading wiretap channels
AU - Liang, Yingbin
AU - Lai, Lifeng
AU - Poor, H. Vincent
AU - Shamai, Shlomo
PY - 2012
Y1 - 2012
N2 - Broadcasting over the fading wiretap channel is investigated for the situation without the channel state information (CSI) at the transmitter and subject to a delay constraint. A new broadcast approach is developed, which integrates secure superposition coding studied in the authors' previous work and embedded coding in a hybrid fashion. This scheme outperforms the previous approaches for the cases when the eavesdropper's channel is fading. The secrecy rate achievable via the new broadcast approach is derived, and the structure of the optimal power allocation function across the secure coding layers is characterized via techniques for solving the problem of constrained calculus of variations. A notion of probabilistic secrecy is introduced and studied, which characterizes the probability that a certain secrecy rate is achieved for any given fading block. Numerical examples are provided to demonstrate the impact of CSI at the transmitter if not available and the channel fluctuation of the eavesdropper on the average secrecy rate.
AB - Broadcasting over the fading wiretap channel is investigated for the situation without the channel state information (CSI) at the transmitter and subject to a delay constraint. A new broadcast approach is developed, which integrates secure superposition coding studied in the authors' previous work and embedded coding in a hybrid fashion. This scheme outperforms the previous approaches for the cases when the eavesdropper's channel is fading. The secrecy rate achievable via the new broadcast approach is derived, and the structure of the optimal power allocation function across the secure coding layers is characterized via techniques for solving the problem of constrained calculus of variations. A notion of probabilistic secrecy is introduced and studied, which characterizes the probability that a certain secrecy rate is achieved for any given fading block. Numerical examples are provided to demonstrate the impact of CSI at the transmitter if not available and the channel fluctuation of the eavesdropper on the average secrecy rate.
UR - http://www.scopus.com/inward/record.url?scp=84867539889&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867539889&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2012.6283933
DO - 10.1109/ISIT.2012.6283933
M3 - Conference contribution
AN - SCOPUS:84867539889
SN - 9781467325790
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 234
EP - 238
BT - 2012 IEEE International Symposium on Information Theory Proceedings, ISIT 2012
T2 - 2012 IEEE International Symposium on Information Theory, ISIT 2012
Y2 - 1 July 2012 through 6 July 2012
ER -