TY - GEN
T1 - Secrecy degrees of freedom of the two-user MISO broadcast channel with mixed CSIT
AU - Wang, Zhao
AU - Xiao, Ming
AU - Skoglund, Mikael
AU - Poor, H. Vincent
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/6/24
Y1 - 2015/6/24
N2 - The secrecy degrees of freedom (SDOF) of the multiple-input single-output (MISO) broadcast channel with confidential messages (BCC) is studied. The network consists of a two-antenna transmitter and two single-antenna receivers, each demanding a confidential message from the transmitter. The problem is investigated with mixed channel state information at transmitter (CSIT), which is a combination of perfect delayed CSIT and inaccurate current CSIT. When the variance of the estimation error for the current CSIT scales with O(P-α), with α ∈ [0, 1], it is shown that the optimal sum SDOF of the considered BCC is 1+α. Furthermore, the optimal SDOF region of the considered MISO BCC is shown to be a polygon scaling with α. The proposed scheme is based on an artificial noise alignment that can combine the benefits of both types of delayed and current CSIT. These results can be seen as an extension of results of Yang et al. and Gou-Jafar to multiuser networks with secrecy constraints.
AB - The secrecy degrees of freedom (SDOF) of the multiple-input single-output (MISO) broadcast channel with confidential messages (BCC) is studied. The network consists of a two-antenna transmitter and two single-antenna receivers, each demanding a confidential message from the transmitter. The problem is investigated with mixed channel state information at transmitter (CSIT), which is a combination of perfect delayed CSIT and inaccurate current CSIT. When the variance of the estimation error for the current CSIT scales with O(P-α), with α ∈ [0, 1], it is shown that the optimal sum SDOF of the considered BCC is 1+α. Furthermore, the optimal SDOF region of the considered MISO BCC is shown to be a polygon scaling with α. The proposed scheme is based on an artificial noise alignment that can combine the benefits of both types of delayed and current CSIT. These results can be seen as an extension of results of Yang et al. and Gou-Jafar to multiuser networks with secrecy constraints.
UR - http://www.scopus.com/inward/record.url?scp=84938943274&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84938943274&partnerID=8YFLogxK
U2 - 10.1109/ITW.2015.7133129
DO - 10.1109/ITW.2015.7133129
M3 - Conference contribution
AN - SCOPUS:84938943274
T3 - 2015 IEEE Information Theory Workshop, ITW 2015
BT - 2015 IEEE Information Theory Workshop, ITW 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2015 IEEE Information Theory Workshop, ITW 2015
Y2 - 26 April 2015 through 1 May 2015
ER -