2018
DOI: 10.1109/jsac.2018.2824379
|View full text |Cite
|
Sign up to set email alerts
|

A New Design Paradigm for Secure Full-Duplex Multiuser Systems

Abstract: We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate the Eves' channels. To enhance the max-min SR, a major part of the power budget should be allocated to serve the user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 64 publications
(57 citation statements)
references
References 46 publications
(137 reference statements)
0
57
0
Order By: Relevance
“…From the discussions above, the successive convex program to solve (12) at iteration κ + 1 is given as (16), (18), (19), (23), (24), (27), (31),…”
Section: Concavity Of the Objective (12a): Let Us Start By Handling Tmentioning
confidence: 99%
See 3 more Smart Citations
“…From the discussions above, the successive convex program to solve (12) at iteration κ + 1 is given as (16), (18), (19), (23), (24), (27), (31),…”
Section: Concavity Of the Objective (12a): Let Us Start By Handling Tmentioning
confidence: 99%
“…Here, PL BS,U and PL ℓk represent the path loss (in dB), as given in Table II, with d BS,U and d ℓk being the distances (in km) between BS and user U and from U u ℓ to U d ik , respectively.ĥ andĝ ℓk are the small-scale fading and distributed as CN (0, I). The entries of the SI channel G SI are modeled as independent and identically distributed Rician random variables, with the Rician factor of 5 dB [19]. Unless specifically stated otherwise, the other parameters are set as given in Table II, following the studies in [12], [14], [40], [41].…”
Section: A Simulation Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, due to the fact that the IA method is employed, Algorithm 1 converges to a stationary point, which also satisfies the Karush-Kuhn-Tucker (KKT) conditions of (6). The detailed proof can be done by following the same steps in [8], [10]. Complexity analysis: Since problem (13) has x = (2(M + N ) + 3M N + 1) quadratic and linear constraints and y = L(M +N )+2M N +1 optimization variables , the per-iteration complexity of solving (13) is O x 2.5 (y 2 +x) [11].…”
Section: Proposed Iterative Algorithmmentioning
confidence: 99%