Power Allocation and Outage Analysis for Secure MISO Networks with an Unknown Eavesdropper

Shaobo Jia, Di Zhang, Shahid Mumtaz, Joel J.P.C. Rodrigues

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper investigates power allocation problem for secure multiple-input single-output transmission with artificial noise (AN). With an unknown eavesdropper, we propose an optimal adaptive power allocation scheme, which adaptively adjust the power allocation factor (PAF) according to the instantaneous channel state information of the legitimate channel. On this basis, we derive a closed-form expression for the optimal PAF aiming to minimize the secrecy outage probability (SOP). A suboptimal fixed power allocation scheme is also proposed to reduce system complexity. Moreover, exact closed-form expressions of SOP for both schemes are also obtained.

Original languageEnglish
Title of host publication2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728182988
DOIs
Publication statusPublished - 2020 Dec
Event2020 IEEE Global Communications Conference, GLOBECOM 2020 - Virtual, Taipei, Taiwan, Province of China
Duration: 2020 Dec 72020 Dec 11

Publication series

Name2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings
Volume2020-January

Conference

Conference2020 IEEE Global Communications Conference, GLOBECOM 2020
Country/TerritoryTaiwan, Province of China
CityVirtual, Taipei
Period20/12/720/12/11

Keywords

  • artificial noise
  • Physical layer security
  • power allocation
  • secrecy outage probability

ASJC Scopus subject areas

  • Media Technology
  • Modelling and Simulation
  • Instrumentation
  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Power Allocation and Outage Analysis for Secure MISO Networks with an Unknown Eavesdropper'. Together they form a unique fingerprint.

Cite this