2019
DOI: 10.1109/tgcn.2019.2898442
|View full text |Cite
|
Sign up to set email alerts
|

Antenna Selection Method of Maximizing Secrecy Rate for Green Secure Spatial Modulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 41 publications
0
26
0
Order By: Relevance
“…Once the AAG has been determined, the corresponding Q is optimized by (38). According to [25], the ASR in terms of the AAG is…”
Section: Separate Optimization Of Aag By Sa and Of The Ancm By Maxmentioning
confidence: 99%
See 1 more Smart Citation
“…Once the AAG has been determined, the corresponding Q is optimized by (38). According to [25], the ASR in terms of the AAG is…”
Section: Separate Optimization Of Aag By Sa and Of The Ancm By Maxmentioning
confidence: 99%
“…When the number of TAs is not a power of two, selecting an active antenna group (AAG) can be adopted to further improve the security of SM systems [24] [25]. Although the AAG selection based on the minimum Euclidean distance criterion and minimizing the bit-error-rate (BER) has drawn considerable attention in conventional SM systems [26]- [29], none of these preceding contributions have considered the presence of eavesdroppers.…”
mentioning
confidence: 99%
“…By using R E (Q) and R B (Q) as our alternatives, the original optimization problem of maximizing the SR is reduced to maximize the 3 difference between R E (Q) and R B (Q), termed as maximizing approximate SR (Max-ASR) optimization algorithm, which avoids averaging over a large number of noise samples. In particular, its effectiveness has been demonstrated in [5]. However, R E (Q) is still lack of a closed-form expression, which imposes a challenge when designing an effective method for optimizing the beamformer of AN.…”
Section: A Proposed Algorithm For Maximizing the Srmentioning
confidence: 99%
“…In order to guarantee secure transmission in the high SNR region, the friendly jamming was investigated in [30]- [35]. Moreover, link adaptive techniques such as power allocation and antenna selection can be combined with the jamming schemes to further enhance the secrecy performance [36]- [38]. In order to avoid power dissipation, the authors of [39]- [45] used the legitimate channel as a secret key to encrypt the mapping rule.…”
Section: Introductionmentioning
confidence: 99%