Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints
In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending o...
Saved in:
Published in | IEEE transactions on wireless communications Vol. 17; no. 5; pp. 3487 - 3497 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.05.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1536-1276 1558-2248 |
DOI | 10.1109/TWC.2018.2815021 |
Cover
Abstract | In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: 1) the adaptive scheme, where Alice possesses the instantaneous CSI with respect to Bob and 2) the fixed-rate scheme, where such information is not available at Alice. The performance of the aforementioned schemes is evaluated in terms of a recently proposed metric named effective secrecy throughput (EST), which encompasses both the reliability and secrecy constraints. By constraining the system to operate below a given maximum allowed secrecy outage probability, we evaluate the EST analytically and through numerical results, showing that the use of multiple apertures at Alice is very important toward achieving the optimal EST. |
---|---|
AbstractList | In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: 1) the adaptive scheme, where Alice possesses the instantaneous CSI with respect to Bob and 2) the fixed-rate scheme, where such information is not available at Alice. The performance of the aforementioned schemes is evaluated in terms of a recently proposed metric named effective secrecy throughput (EST), which encompasses both the reliability and secrecy constraints. By constraining the system to operate below a given maximum allowed secrecy outage probability, we evaluate the EST analytically and through numerical results, showing that the use of multiple apertures at Alice is very important toward achieving the optimal EST. |
Author | Demo Souza, Richard Brante, Glauber Rebelatto, Joao Luiz Pivaro Monteiro, Marcos Eduardo |
Author_xml | – sequence: 1 givenname: Marcos Eduardo surname: Pivaro Monteiro fullname: Pivaro Monteiro, Marcos Eduardo email: marcosmonteiro@alunos.utfpr.edu.br organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil – sequence: 2 givenname: Joao Luiz surname: Rebelatto fullname: Rebelatto, Joao Luiz email: jlrebelatto@utfpr.edu.br organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil – sequence: 3 givenname: Richard surname: Demo Souza fullname: Demo Souza, Richard email: richard.demo@ufsc.br organization: Fed. Univ. of Santa Catarina, Florianopolis, Brazil – sequence: 4 givenname: Glauber surname: Brante fullname: Brante, Glauber email: gbrante@utfpr.edu.br organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil |
BookMark | eNp9kM9rwjAUx8NwMHW7D3Yp7Fz3kv5IPI6im6D0oMNjSNNEK7ZxSQrzv187ZYcddnoP3vfzvny_IzRoTKMQesQwwRimL5ttNiGA2YQwnADBN2iIk4SFhMRs0O9RGmJC0zs0cu4AgGmaJEOUr8RXVbd1sFbSKnkONntr2t3-1PrA6GC1WOWrWTBf50Fm6rptKil8ZRoXbCu_D_LWi53qTo3zVlSNd_foVoujUw_XOUYf89kmew-X-dsie12GkkyxD6UAKlKWUh1rQhVTWFAoaSqVxkpTKmGqC1IoVjBWgCxJiSEmFMcRjUsWF9EYPV_-nqz5bJXz_GBa23SWnEBEozgmQDoVXFTSGues0vxkq1rYM8fA-9p4Vxvva-PX2jok_YPIyv9k7hMe_wOfLmCllPr1YRGBJCLRN8jse18 |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_TCOMM_2023_3341912 crossref_primary_10_1007_s12243_020_00819_7 crossref_primary_10_1007_s12243_020_00799_8 crossref_primary_10_1109_TVT_2018_2870280 crossref_primary_10_1016_j_phycom_2019_100731 crossref_primary_10_1109_JIOT_2023_3296319 crossref_primary_10_1515_joc_2022_0085 crossref_primary_10_1109_JPHOT_2023_3262183 crossref_primary_10_1109_TIFS_2024_3410132 crossref_primary_10_1364_JOSAB_452857 crossref_primary_10_1109_ACCESS_2019_2914227 crossref_primary_10_1109_TCOMM_2020_2985028 crossref_primary_10_1364_JOSAA_35_001543 crossref_primary_10_1109_TVT_2022_3148238 crossref_primary_10_1109_JPHOT_2021_3132199 crossref_primary_10_1109_TVT_2022_3176119 crossref_primary_10_1109_ACCESS_2019_2920578 crossref_primary_10_1109_JPHOT_2020_3036244 crossref_primary_10_1364_OE_529982 crossref_primary_10_1109_TVT_2021_3066219 |
Cites_doi | 10.1109/LCOMM.2011.041411.110312 10.1109/JOCN.2014.6985899 10.1109/ICC.2014.6883448 10.1364/JOCN.6.000684 10.1007/BF02481123 10.1109/5.554222 10.1109/JSAC.2015.2432526 10.1109/WCNC.2009.4917849 10.1364/OE.22.021820 10.1049/iet-com.2010.0172 10.1109/ISIT.2006.261613 10.1364/JOSA.66.000207 10.1109/WCNC.2013.6555263 10.1364/JOCN.2.001087 10.1109/TWC.2007.06109 10.1109/LPT.2009.2022057 10.1109/TWC.2010.04.090172 10.1117/1.1386641 10.1002/j.1538-7305.1975.tb02040.x 10.1364/OE.16.014151 10.1109/TCOMM.2015.2469685 10.1364/JOCN.1.000580 10.1109/JPHOT.2015.2402158 10.1109/ICC.2009.5199306 10.1109/JLT.2016.2526053 10.1364/OE.17.002763 10.1017/CBO9780511977985 10.1109/TWC.2015.2453260 10.1109/TCOMM.2016.2524569 10.1109/JLT.2007.899174 10.1109/CSNT.2015.42 10.1049/el:20083028 10.1109/QBSC.2014.6841175 10.1109/TIT.2010.2068852 10.1109/LSP.2015.2458573 10.1109/JLT.2009.2024169 10.1364/JOSAA.16.001417 10.1117/3.626196 10.1017/CBO9780511841224 10.1109/LPT.2015.2405132 10.1109/LSP.2012.2195490 10.1109/PROC.1967.5377 10.1109/JPHOT.2016.2519279 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TWC.2018.2815021 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2248 |
EndPage | 3497 |
ExternalDocumentID | 10_1109_TWC_2018_2815021 8320532 |
Genre | orig-research |
GrantInformation_xml | – fundername: CAPES (Brazil) funderid: 10.13039/501100002322 – fundername: CNPq funderid: 10.13039/501100003593 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c291t-ca07a6867f4f27e8e1a70d76cef1ef77c09fb2be8b88b0cd2d1042714374d84b3 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Fri Jul 25 18:53:39 EDT 2025 Tue Jul 01 04:13:22 EDT 2025 Thu Apr 24 22:54:00 EDT 2025 Wed Aug 27 02:52:41 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-ca07a6867f4f27e8e1a70d76cef1ef77c09fb2be8b88b0cd2d1042714374d84b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7658-2025 0000-0002-7389-6245 0000-0002-1682-2215 |
PQID | 2037344202 |
PQPubID | 105736 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_1109_TWC_2018_2815021 crossref_citationtrail_10_1109_TWC_2018_2815021 proquest_journals_2037344202 ieee_primary_8320532 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-May 2018-5-00 20180501 |
PublicationDateYYYYMMDD | 2018-05-01 |
PublicationDate_xml | – month: 05 year: 2018 text: 2018-May |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2018 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref37 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref39 ref17 ref38 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref44 ref21 ref43 ref28 ref27 young (ref45) 1984; 11 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 niu (ref29) 2012 |
References_xml | – ident: ref34 doi: 10.1109/LCOMM.2011.041411.110312 – ident: ref10 doi: 10.1109/JOCN.2014.6985899 – ident: ref42 doi: 10.1109/ICC.2014.6883448 – ident: ref9 doi: 10.1364/JOCN.6.000684 – ident: ref44 doi: 10.1007/BF02481123 – ident: ref22 doi: 10.1109/5.554222 – ident: ref11 doi: 10.1109/JSAC.2015.2432526 – ident: ref43 doi: 10.1109/WCNC.2009.4917849 – ident: ref32 doi: 10.1364/OE.22.021820 – ident: ref40 doi: 10.1049/iet-com.2010.0172 – ident: ref2 doi: 10.1109/ISIT.2006.261613 – ident: ref41 doi: 10.1364/JOSA.66.000207 – ident: ref20 doi: 10.1109/WCNC.2013.6555263 – ident: ref16 doi: 10.1364/JOCN.2.001087 – ident: ref27 doi: 10.1109/TWC.2007.06109 – year: 2012 ident: ref29 publication-title: Optical Communication – ident: ref33 doi: 10.1109/LPT.2009.2022057 – ident: ref31 doi: 10.1109/TWC.2010.04.090172 – ident: ref23 doi: 10.1117/1.1386641 – ident: ref1 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref25 doi: 10.1364/OE.16.014151 – ident: ref18 doi: 10.1109/TCOMM.2015.2469685 – ident: ref37 doi: 10.1364/JOCN.1.000580 – volume: 11 start-page: 171 year: 1984 ident: ref45 article-title: Orbits of the unit sphere of $\mathcal {L}$ ( $\mathcal {H}$ , $\mathcal {K}$ ) under symplectic transformations publication-title: J Oper Theory – ident: ref3 doi: 10.1109/JPHOT.2015.2402158 – ident: ref30 doi: 10.1109/ICC.2009.5199306 – ident: ref14 doi: 10.1109/JLT.2016.2526053 – ident: ref28 doi: 10.1364/OE.17.002763 – ident: ref4 doi: 10.1017/CBO9780511977985 – ident: ref6 doi: 10.1109/TWC.2015.2453260 – ident: ref17 doi: 10.1109/TCOMM.2016.2524569 – ident: ref15 doi: 10.1109/JLT.2007.899174 – ident: ref19 doi: 10.1109/CSNT.2015.42 – ident: ref36 doi: 10.1049/el:20083028 – ident: ref26 doi: 10.1109/QBSC.2014.6841175 – ident: ref5 doi: 10.1109/TIT.2010.2068852 – ident: ref7 doi: 10.1109/LSP.2015.2458573 – ident: ref13 doi: 10.1109/JLT.2009.2024169 – ident: ref39 doi: 10.1364/JOSAA.16.001417 – ident: ref38 doi: 10.1117/3.626196 – ident: ref12 doi: 10.1017/CBO9780511841224 – ident: ref21 doi: 10.1109/LPT.2015.2405132 – ident: ref35 doi: 10.1109/LSP.2012.2195490 – ident: ref24 doi: 10.1109/PROC.1967.5377 – ident: ref8 doi: 10.1109/JPHOT.2016.2519279 |
SSID | ssj0017655 |
Score | 2.4305313 |
Snippet | In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3487 |
SubjectTerms | Adaptive optics Apertures Effective secrecy throughput free-space optical Free-space optical communication Laser beams Optical receivers Optical transmitters physical layer security Reliability wiretap channel |
Title | Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints |
URI | https://ieeexplore.ieee.org/document/8320532 https://www.proquest.com/docview/2037344202 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB50T3rwLa4vcvAi2N02TZv0KOKyCnUPu6K3kqQJiu4DtwX115uk3eIL8dZDpgwzk-Rr5_EBnDCiMAkF93KplUd4IjwmWORRpXEoacBzx96Q3sT9W3J9H90vwVnTC6OUcsVnqmMfXS4_n8rS_irrmuizRAbLsGzCrOrVajIGNHYMp2YDW14Z2qQk_aQ7uruwNVysg5mBPzj4cgU5TpUfB7G7XXrrkC70qopKnjplITry_dvIxv8qvgFrNcxE51VcbMKSmmzB6qfhg9swSPnr47gco6FFjvINjSrKnllZoKlG6VU6SC9RbzhAX5pI5ujusXhAg7IwJxGyfJ-OZaKY78Bt73J00fdqegVP4iQoPMl9ymMWU000poqpgFM_p7FUOlCaUuknWmChjO-Y8GWO88AScxiARUnOiAh3oTWZTtQeoCjK7dAazgJJiIw011HMOTfQJWA6inQbuguLZ7KePW6Ve87cN4ifZMZHmfVRVvuoDaeNxKyau_HH2m1r8mZdbe02HC6cmtUbc27kQhoSgn28_7vUAazYd1c1jYfQKl5KdWRwRyGOXcB9AMwL06s |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT9swFH6Cchg7wBhM6-g2H7hMIm3i2LFzRIiqMEIPFMEtsh1bq4AW0URi_PXYThoBmxC3HGz56b1n-3Pejw9gjxONSSxFUCijAyJSGXDJacC0wbFikSg8e0N2lowuyMkVvVqB_bYWRmvtk8903336WH4xV5X7VTaw3ueIDFZhjdpXBa-rtdqYAUs8x6ndwo5ZhrVByTAdTC4PXRYX72NuARCOXlxCnlXln6PY3y_DTciWktVpJdf9qpR99fiqaeN7Rf8EGw3QRAe1Z2zBip59ho_P2g9uwzgTD9Pb6hadO-yo_qJJTdpzV5VoblB2nI2zIzQ8H6MXZSQLdDkt_6BxVdqzCDnGT88zUS524GJ4NDkcBQ3BQqBwGpWBEiETCU-YIQYzzXUkWFiwRGkTacOYClMjsdTWelyGqsBF5Kg5LMRipOBExl-gM5vP9FdAlBaubY3gkSJEUSMMTYQQFrxE3FBqujBYajxXTfdxJ9xN7l8hYZpbG-XORnljoy78amfc1Z033hi77VTejmu03YXe0qh5szUXdl7MYkJwiL_9f9ZP-DCaZKf56fHZ711Yd-vUGY496JT3lf5uUUgpf3jnewIcIdb- |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Maximum+Secrecy+Throughput+of+MIMOME+FSO+Communications+With+Outage+Constraints&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Pivaro+Monteiro%2C+Marcos+Eduardo&rft.au=Rebelatto%2C+Joao+Luiz&rft.au=Demo+Souza%2C+Richard&rft.au=Brante%2C+Glauber&rft.date=2018-05-01&rft.pub=IEEE&rft.issn=1536-1276&rft.volume=17&rft.issue=5&rft.spage=3487&rft.epage=3497&rft_id=info:doi/10.1109%2FTWC.2018.2815021&rft.externalDocID=8320532 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |