University of Hertfordshire

By the same authors

Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT. / Papazafeiropoulos, Anastasios K.; Zhong, Caijun.

2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015. 7414068.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Papazafeiropoulos, AK & Zhong, C 2015, Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT. in 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings., 7414068, Institute of Electrical and Electronics Engineers Inc., IEEE Globecom Workshops, GC Wkshps 2015, San Diego, United States, 6/12/15. https://doi.org/10.1109/GLOCOMW.2015.7414068

APA

Papazafeiropoulos, A. K., & Zhong, C. (2015). Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT. In 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings [7414068] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOMW.2015.7414068

Vancouver

Papazafeiropoulos AK, Zhong C. Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT. In 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2015. 7414068 https://doi.org/10.1109/GLOCOMW.2015.7414068

Author

Papazafeiropoulos, Anastasios K. ; Zhong, Caijun. / Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT. 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015.

Bibtex

@inproceedings{ac8b7450c5a141c3a5fefe45288dfcdd,
title = "Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT",
abstract = "Application of multiple-input and multiple-output (MIMO) technology in wireless systems not only provides high spectral efficiency by the deployment of many number of antennas at both sides of a communication system for a given total transmit power, but it also enhances physical- layer security. Given the need for evaluation of realistic systems, this works studies the total information flow during multicast transmission in a region R, accounting for the unavoidable statistical spatial randomness of users locations, both in absence or presence of eavesdroppers under conditions of imperfect channel state information at the transmitter (CSIT) due to users' mobility. In particular, we first introduce a lower-bound of the space-time mutual information without any eavesdropping, and then we proceed with the derivation for both finite and infinitely large number of antennas. Moreover, in case that eavesdropping is present, we determine a metric, called space-time secrecy rate with imperfect CSIT, which characterizes the total amount of common confidential information flow per receive antenna, and we obtain it with asymptotic arguments in terms of the numbers of antennas at each side. Numerical results, validated by simulations, shed light on how the imperfect conditions affect the performance. Remarkably, imperfect CSIT may present benefits, since it engenders degradation in eavesdropper's performance.",
author = "Papazafeiropoulos, {Anastasios K.} and Caijun Zhong",
year = "2015",
doi = "10.1109/GLOCOMW.2015.7414068",
language = "English",
booktitle = "2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",
note = "IEEE Globecom Workshops, GC Wkshps 2015 ; Conference date: 06-12-2015 Through 10-12-2015",

}

RIS

TY - GEN

T1 - Confidentiality analysis in multicast stochastic MIMO networks with imperfect CSIT

AU - Papazafeiropoulos, Anastasios K.

AU - Zhong, Caijun

PY - 2015

Y1 - 2015

N2 - Application of multiple-input and multiple-output (MIMO) technology in wireless systems not only provides high spectral efficiency by the deployment of many number of antennas at both sides of a communication system for a given total transmit power, but it also enhances physical- layer security. Given the need for evaluation of realistic systems, this works studies the total information flow during multicast transmission in a region R, accounting for the unavoidable statistical spatial randomness of users locations, both in absence or presence of eavesdroppers under conditions of imperfect channel state information at the transmitter (CSIT) due to users' mobility. In particular, we first introduce a lower-bound of the space-time mutual information without any eavesdropping, and then we proceed with the derivation for both finite and infinitely large number of antennas. Moreover, in case that eavesdropping is present, we determine a metric, called space-time secrecy rate with imperfect CSIT, which characterizes the total amount of common confidential information flow per receive antenna, and we obtain it with asymptotic arguments in terms of the numbers of antennas at each side. Numerical results, validated by simulations, shed light on how the imperfect conditions affect the performance. Remarkably, imperfect CSIT may present benefits, since it engenders degradation in eavesdropper's performance.

AB - Application of multiple-input and multiple-output (MIMO) technology in wireless systems not only provides high spectral efficiency by the deployment of many number of antennas at both sides of a communication system for a given total transmit power, but it also enhances physical- layer security. Given the need for evaluation of realistic systems, this works studies the total information flow during multicast transmission in a region R, accounting for the unavoidable statistical spatial randomness of users locations, both in absence or presence of eavesdroppers under conditions of imperfect channel state information at the transmitter (CSIT) due to users' mobility. In particular, we first introduce a lower-bound of the space-time mutual information without any eavesdropping, and then we proceed with the derivation for both finite and infinitely large number of antennas. Moreover, in case that eavesdropping is present, we determine a metric, called space-time secrecy rate with imperfect CSIT, which characterizes the total amount of common confidential information flow per receive antenna, and we obtain it with asymptotic arguments in terms of the numbers of antennas at each side. Numerical results, validated by simulations, shed light on how the imperfect conditions affect the performance. Remarkably, imperfect CSIT may present benefits, since it engenders degradation in eavesdropper's performance.

UR - http://www.scopus.com/inward/record.url?scp=84971233872&partnerID=8YFLogxK

U2 - 10.1109/GLOCOMW.2015.7414068

DO - 10.1109/GLOCOMW.2015.7414068

M3 - Conference contribution

AN - SCOPUS:84971233872

BT - 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

T2 - IEEE Globecom Workshops, GC Wkshps 2015

Y2 - 6 December 2015 through 10 December 2015

ER -