Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints

In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending o...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 17; no. 5; pp. 3487 - 3497
Main Authors Pivaro Monteiro, Marcos Eduardo, Rebelatto, Joao Luiz, Demo Souza, Richard, Brante, Glauber
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1536-1276
1558-2248
DOI10.1109/TWC.2018.2815021

Cover

Abstract In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: 1) the adaptive scheme, where Alice possesses the instantaneous CSI with respect to Bob and 2) the fixed-rate scheme, where such information is not available at Alice. The performance of the aforementioned schemes is evaluated in terms of a recently proposed metric named effective secrecy throughput (EST), which encompasses both the reliability and secrecy constraints. By constraining the system to operate below a given maximum allowed secrecy outage probability, we evaluate the EST analytically and through numerical results, showing that the use of multiple apertures at Alice is very important toward achieving the optimal EST.
AbstractList In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors. Two different schemes are considered depending on the availability of channel state information (CSI) at Alice: 1) the adaptive scheme, where Alice possesses the instantaneous CSI with respect to Bob and 2) the fixed-rate scheme, where such information is not available at Alice. The performance of the aforementioned schemes is evaluated in terms of a recently proposed metric named effective secrecy throughput (EST), which encompasses both the reliability and secrecy constraints. By constraining the system to operate below a given maximum allowed secrecy outage probability, we evaluate the EST analytically and through numerical results, showing that the use of multiple apertures at Alice is very important toward achieving the optimal EST.
Author Demo Souza, Richard
Brante, Glauber
Rebelatto, Joao Luiz
Pivaro Monteiro, Marcos Eduardo
Author_xml – sequence: 1
  givenname: Marcos Eduardo
  surname: Pivaro Monteiro
  fullname: Pivaro Monteiro, Marcos Eduardo
  email: marcosmonteiro@alunos.utfpr.edu.br
  organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil
– sequence: 2
  givenname: Joao Luiz
  surname: Rebelatto
  fullname: Rebelatto, Joao Luiz
  email: jlrebelatto@utfpr.edu.br
  organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil
– sequence: 3
  givenname: Richard
  surname: Demo Souza
  fullname: Demo Souza, Richard
  email: richard.demo@ufsc.br
  organization: Fed. Univ. of Santa Catarina, Florianopolis, Brazil
– sequence: 4
  givenname: Glauber
  surname: Brante
  fullname: Brante, Glauber
  email: gbrante@utfpr.edu.br
  organization: CPGEI, Fed. Univ. of Technol.-Parana, Curitiba, Brazil
BookMark eNp9kM9rwjAUx8NwMHW7D3Yp7Fz3kv5IPI6im6D0oMNjSNNEK7ZxSQrzv187ZYcddnoP3vfzvny_IzRoTKMQesQwwRimL5ttNiGA2YQwnADBN2iIk4SFhMRs0O9RGmJC0zs0cu4AgGmaJEOUr8RXVbd1sFbSKnkONntr2t3-1PrA6GC1WOWrWTBf50Fm6rptKil8ZRoXbCu_D_LWi53qTo3zVlSNd_foVoujUw_XOUYf89kmew-X-dsie12GkkyxD6UAKlKWUh1rQhVTWFAoaSqVxkpTKmGqC1IoVjBWgCxJiSEmFMcRjUsWF9EYPV_-nqz5bJXz_GBa23SWnEBEozgmQDoVXFTSGues0vxkq1rYM8fA-9p4Vxvva-PX2jok_YPIyv9k7hMe_wOfLmCllPr1YRGBJCLRN8jse18
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_TCOMM_2023_3341912
crossref_primary_10_1007_s12243_020_00819_7
crossref_primary_10_1007_s12243_020_00799_8
crossref_primary_10_1109_TVT_2018_2870280
crossref_primary_10_1016_j_phycom_2019_100731
crossref_primary_10_1109_JIOT_2023_3296319
crossref_primary_10_1515_joc_2022_0085
crossref_primary_10_1109_JPHOT_2023_3262183
crossref_primary_10_1109_TIFS_2024_3410132
crossref_primary_10_1364_JOSAB_452857
crossref_primary_10_1109_ACCESS_2019_2914227
crossref_primary_10_1109_TCOMM_2020_2985028
crossref_primary_10_1364_JOSAA_35_001543
crossref_primary_10_1109_TVT_2022_3148238
crossref_primary_10_1109_JPHOT_2021_3132199
crossref_primary_10_1109_TVT_2022_3176119
crossref_primary_10_1109_ACCESS_2019_2920578
crossref_primary_10_1109_JPHOT_2020_3036244
crossref_primary_10_1364_OE_529982
crossref_primary_10_1109_TVT_2021_3066219
Cites_doi 10.1109/LCOMM.2011.041411.110312
10.1109/JOCN.2014.6985899
10.1109/ICC.2014.6883448
10.1364/JOCN.6.000684
10.1007/BF02481123
10.1109/5.554222
10.1109/JSAC.2015.2432526
10.1109/WCNC.2009.4917849
10.1364/OE.22.021820
10.1049/iet-com.2010.0172
10.1109/ISIT.2006.261613
10.1364/JOSA.66.000207
10.1109/WCNC.2013.6555263
10.1364/JOCN.2.001087
10.1109/TWC.2007.06109
10.1109/LPT.2009.2022057
10.1109/TWC.2010.04.090172
10.1117/1.1386641
10.1002/j.1538-7305.1975.tb02040.x
10.1364/OE.16.014151
10.1109/TCOMM.2015.2469685
10.1364/JOCN.1.000580
10.1109/JPHOT.2015.2402158
10.1109/ICC.2009.5199306
10.1109/JLT.2016.2526053
10.1364/OE.17.002763
10.1017/CBO9780511977985
10.1109/TWC.2015.2453260
10.1109/TCOMM.2016.2524569
10.1109/JLT.2007.899174
10.1109/CSNT.2015.42
10.1049/el:20083028
10.1109/QBSC.2014.6841175
10.1109/TIT.2010.2068852
10.1109/LSP.2015.2458573
10.1109/JLT.2009.2024169
10.1364/JOSAA.16.001417
10.1117/3.626196
10.1017/CBO9780511841224
10.1109/LPT.2015.2405132
10.1109/LSP.2012.2195490
10.1109/PROC.1967.5377
10.1109/JPHOT.2016.2519279
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TWC.2018.2815021
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 3497
ExternalDocumentID 10_1109_TWC_2018_2815021
8320532
Genre orig-research
GrantInformation_xml – fundername: CAPES (Brazil)
  funderid: 10.13039/501100002322
– fundername: CNPq
  funderid: 10.13039/501100003593
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-ca07a6867f4f27e8e1a70d76cef1ef77c09fb2be8b88b0cd2d1042714374d84b3
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Fri Jul 25 18:53:39 EDT 2025
Tue Jul 01 04:13:22 EDT 2025
Thu Apr 24 22:54:00 EDT 2025
Wed Aug 27 02:52:41 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-ca07a6867f4f27e8e1a70d76cef1ef77c09fb2be8b88b0cd2d1042714374d84b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7658-2025
0000-0002-7389-6245
0000-0002-1682-2215
PQID 2037344202
PQPubID 105736
PageCount 11
ParticipantIDs crossref_primary_10_1109_TWC_2018_2815021
crossref_citationtrail_10_1109_TWC_2018_2815021
proquest_journals_2037344202
ieee_primary_8320532
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-May
2018-5-00
20180501
PublicationDateYYYYMMDD 2018-05-01
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-May
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref37
ref15
ref36
ref14
ref31
ref30
ref33
ref11
ref32
ref10
ref2
ref1
ref39
ref17
ref38
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref44
ref21
ref43
ref28
ref27
young (ref45) 1984; 11
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
niu (ref29) 2012
References_xml – ident: ref34
  doi: 10.1109/LCOMM.2011.041411.110312
– ident: ref10
  doi: 10.1109/JOCN.2014.6985899
– ident: ref42
  doi: 10.1109/ICC.2014.6883448
– ident: ref9
  doi: 10.1364/JOCN.6.000684
– ident: ref44
  doi: 10.1007/BF02481123
– ident: ref22
  doi: 10.1109/5.554222
– ident: ref11
  doi: 10.1109/JSAC.2015.2432526
– ident: ref43
  doi: 10.1109/WCNC.2009.4917849
– ident: ref32
  doi: 10.1364/OE.22.021820
– ident: ref40
  doi: 10.1049/iet-com.2010.0172
– ident: ref2
  doi: 10.1109/ISIT.2006.261613
– ident: ref41
  doi: 10.1364/JOSA.66.000207
– ident: ref20
  doi: 10.1109/WCNC.2013.6555263
– ident: ref16
  doi: 10.1364/JOCN.2.001087
– ident: ref27
  doi: 10.1109/TWC.2007.06109
– year: 2012
  ident: ref29
  publication-title: Optical Communication
– ident: ref33
  doi: 10.1109/LPT.2009.2022057
– ident: ref31
  doi: 10.1109/TWC.2010.04.090172
– ident: ref23
  doi: 10.1117/1.1386641
– ident: ref1
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref25
  doi: 10.1364/OE.16.014151
– ident: ref18
  doi: 10.1109/TCOMM.2015.2469685
– ident: ref37
  doi: 10.1364/JOCN.1.000580
– volume: 11
  start-page: 171
  year: 1984
  ident: ref45
  article-title: Orbits of the unit sphere of $\mathcal {L}$ ( $\mathcal {H}$ , $\mathcal {K}$ ) under symplectic transformations
  publication-title: J Oper Theory
– ident: ref3
  doi: 10.1109/JPHOT.2015.2402158
– ident: ref30
  doi: 10.1109/ICC.2009.5199306
– ident: ref14
  doi: 10.1109/JLT.2016.2526053
– ident: ref28
  doi: 10.1364/OE.17.002763
– ident: ref4
  doi: 10.1017/CBO9780511977985
– ident: ref6
  doi: 10.1109/TWC.2015.2453260
– ident: ref17
  doi: 10.1109/TCOMM.2016.2524569
– ident: ref15
  doi: 10.1109/JLT.2007.899174
– ident: ref19
  doi: 10.1109/CSNT.2015.42
– ident: ref36
  doi: 10.1049/el:20083028
– ident: ref26
  doi: 10.1109/QBSC.2014.6841175
– ident: ref5
  doi: 10.1109/TIT.2010.2068852
– ident: ref7
  doi: 10.1109/LSP.2015.2458573
– ident: ref13
  doi: 10.1109/JLT.2009.2024169
– ident: ref39
  doi: 10.1364/JOSAA.16.001417
– ident: ref38
  doi: 10.1117/3.626196
– ident: ref12
  doi: 10.1017/CBO9780511841224
– ident: ref21
  doi: 10.1109/LPT.2015.2405132
– ident: ref35
  doi: 10.1109/LSP.2012.2195490
– ident: ref24
  doi: 10.1109/PROC.1967.5377
– ident: ref8
  doi: 10.1109/JPHOT.2016.2519279
SSID ssj0017655
Score 2.4305313
Snippet In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3487
SubjectTerms Adaptive optics
Apertures
Effective secrecy throughput
free-space optical
Free-space optical communication
Laser beams
Optical receivers
Optical transmitters
physical layer security
Reliability
wiretap channel
Title Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints
URI https://ieeexplore.ieee.org/document/8320532
https://www.proquest.com/docview/2037344202
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB50T3rwLa4vcvAi2N02TZv0KOKyCnUPu6K3kqQJiu4DtwX115uk3eIL8dZDpgwzk-Rr5_EBnDCiMAkF93KplUd4IjwmWORRpXEoacBzx96Q3sT9W3J9H90vwVnTC6OUcsVnqmMfXS4_n8rS_irrmuizRAbLsGzCrOrVajIGNHYMp2YDW14Z2qQk_aQ7uruwNVysg5mBPzj4cgU5TpUfB7G7XXrrkC70qopKnjplITry_dvIxv8qvgFrNcxE51VcbMKSmmzB6qfhg9swSPnr47gco6FFjvINjSrKnllZoKlG6VU6SC9RbzhAX5pI5ujusXhAg7IwJxGyfJ-OZaKY78Bt73J00fdqegVP4iQoPMl9ymMWU000poqpgFM_p7FUOlCaUuknWmChjO-Y8GWO88AScxiARUnOiAh3oTWZTtQeoCjK7dAazgJJiIw011HMOTfQJWA6inQbuguLZ7KePW6Ve87cN4ifZMZHmfVRVvuoDaeNxKyau_HH2m1r8mZdbe02HC6cmtUbc27kQhoSgn28_7vUAazYd1c1jYfQKl5KdWRwRyGOXcB9AMwL06s
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT9swFH6Cchg7wBhM6-g2H7hMIm3i2LFzRIiqMEIPFMEtsh1bq4AW0URi_PXYThoBmxC3HGz56b1n-3Pejw9gjxONSSxFUCijAyJSGXDJacC0wbFikSg8e0N2lowuyMkVvVqB_bYWRmvtk8903336WH4xV5X7VTaw3ueIDFZhjdpXBa-rtdqYAUs8x6ndwo5ZhrVByTAdTC4PXRYX72NuARCOXlxCnlXln6PY3y_DTciWktVpJdf9qpR99fiqaeN7Rf8EGw3QRAe1Z2zBip59ho_P2g9uwzgTD9Pb6hadO-yo_qJJTdpzV5VoblB2nI2zIzQ8H6MXZSQLdDkt_6BxVdqzCDnGT88zUS524GJ4NDkcBQ3BQqBwGpWBEiETCU-YIQYzzXUkWFiwRGkTacOYClMjsdTWelyGqsBF5Kg5LMRipOBExl-gM5vP9FdAlBaubY3gkSJEUSMMTYQQFrxE3FBqujBYajxXTfdxJ9xN7l8hYZpbG-XORnljoy78amfc1Z033hi77VTejmu03YXe0qh5szUXdl7MYkJwiL_9f9ZP-DCaZKf56fHZ711Yd-vUGY496JT3lf5uUUgpf3jnewIcIdb-
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Maximum+Secrecy+Throughput+of+MIMOME+FSO+Communications+With+Outage+Constraints&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Pivaro+Monteiro%2C+Marcos+Eduardo&rft.au=Rebelatto%2C+Joao+Luiz&rft.au=Demo+Souza%2C+Richard&rft.au=Brante%2C+Glauber&rft.date=2018-05-01&rft.pub=IEEE&rft.issn=1536-1276&rft.volume=17&rft.issue=5&rft.spage=3487&rft.epage=3497&rft_id=info:doi/10.1109%2FTWC.2018.2815021&rft.externalDocID=8320532
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon