Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Jue | - |
dc.contributor.author | Lee, Jemin | - |
dc.contributor.author | Quek, Tony Q. S. | - |
dc.date.available | 2017-07-05T08:34:28Z | - |
dc.date.created | 2017-04-10 | - |
dc.date.issued | 2016-09 | - |
dc.identifier.issn | 1089-7798 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/2203 | - |
dc.description.abstract | In this letter, we investigate the best antenna placement for eavesdroppers (Eves), who intend to wiretap information from the legitimate transmitter (Alice). Two configurations of co-located or distributed antennas (CA or DA) are compared to find the most harmful eavesdropper setting, which achieves higher average eavesdropping rate, i.e., the long-term leakage rate to Eves averaged over channel fading and random locations. For K → ∞, where K is the number of available antennas for Eves, we prove that without a guard zone (i.e., a geometric zone around Alice where Eves cannot be located in), DA Eves are more harmful, while with a nonzero guard zone, CA Eve is superior. For the finite-K case, we derive upper/lower bounds for the average eavesdropping rate. The bounds are then used to find a DA region, in which the DA Eves definitely outperform CA Eve. It is shown that this region depends on the value of K, the radius of the guard zone, and the jamming at Alice. © 2016 IEEE. | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Best Antenna Placement for Eavesdroppers: Distributed or Co-Located? | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/LCOMM.2016.2578927 | - |
dc.identifier.scopusid | 2-s2.0-84987740928 | - |
dc.identifier.bibliographicCitation | IEEE Communications Letters, v.20, no.9, pp.1820 - 1823 | - |
dc.subject.keywordAuthor | MIMO | - |
dc.subject.keywordAuthor | jamming | - |
dc.subject.keywordAuthor | eavesdropper | - |
dc.subject.keywordAuthor | artificial noise | - |
dc.subject.keywordAuthor | physical-layer security | - |
dc.subject.keywordPlus | Antenna Placement | - |
dc.subject.keywordPlus | Antennas | - |
dc.subject.keywordPlus | Artificial Noise | - |
dc.subject.keywordPlus | Co-Located | - |
dc.subject.keywordPlus | Distributed Antennas | - |
dc.subject.keywordPlus | Eavesdropper | - |
dc.subject.keywordPlus | Fading Channels | - |
dc.subject.keywordPlus | Jamming | - |
dc.subject.keywordPlus | Leakage Rates | - |
dc.subject.keywordPlus | MIMO | - |
dc.subject.keywordPlus | Mimo Systems | - |
dc.subject.keywordPlus | Network Layers | - |
dc.subject.keywordPlus | Networks | - |
dc.subject.keywordPlus | Physical-Layer Security | - |
dc.subject.keywordPlus | Physical Layer Security | - |
dc.subject.keywordPlus | Random Location | - |
dc.subject.keywordPlus | Security Systems | - |
dc.subject.keywordPlus | SYSTemS | - |
dc.subject.keywordPlus | TRANSMISSION | - |
dc.citation.endPage | 1823 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1820 | - |
dc.citation.title | IEEE Communications Letters | - |
dc.citation.volume | 20 | - |
There are no files associated with this item.