Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1109/jsyst.2019.2922848
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading—A Physical Layer Security Approach

Abstract: The existing investigations on artificial noise (AN) security systems assumed that only null spaces is used to send AN signals, and all eigen-subchannels should be used to transmit messages. Our previous work proposed an AN scheme that allocates some of eigen-subchannels to transmit AN signals for improving secrecy rates. Nevertheless, our previous work considered only uncorrelated MIMO Rayleigh fading channels. In fact, the correlations among antennas exist in realistic scattering channel environments. In thi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 39 publications
(68 reference statements)
0
11
0
Order By: Relevance
“…4a, we can find that the ergodic secrecy rate increases with the increasing number of IRS elements. Also, a comparison is taken between IRS-assisted PLS and the secure beamforming scheme that uses N t = N + 1 transmission antennas in the case of N b = 1 and N e = 1 [13]. From the comparison simulations, we find that the IRS-assisted PLS outperforms the secure beamforming scheme because the channel gain by IRS is larger than that of the beamforming scheme [37].…”
Section: Simulationsmentioning
confidence: 98%
See 3 more Smart Citations
“…4a, we can find that the ergodic secrecy rate increases with the increasing number of IRS elements. Also, a comparison is taken between IRS-assisted PLS and the secure beamforming scheme that uses N t = N + 1 transmission antennas in the case of N b = 1 and N e = 1 [13]. From the comparison simulations, we find that the IRS-assisted PLS outperforms the secure beamforming scheme because the channel gain by IRS is larger than that of the beamforming scheme [37].…”
Section: Simulationsmentioning
confidence: 98%
“…The secrecy rate can be viewed as the inherent property for a given instantaneous CSI realization. The ergodic secrecy rate is the average value of secrecy rates among all realizations of CSIs, which is a usual metric for PLS schemes [3], [13]. As the CSIs of wiretap channels are unknown, to calculate the ergodic secrecy rate, the gain of wiretap channels in Eq.…”
Section: B Ergodic Secrecy Ratementioning
confidence: 99%
See 2 more Smart Citations
“…14, NO. 4, DECEMBER 2020 + Check author entry for coauthors Xu, D., Legitimate Surveillance With Battery-Aided Wireless Powered Full- Du-plex Monitor; JSYST Dec. 2020 5229-5232 Xu, H., see Jiang, P., JSYST Sept. 2020 4344-4355 Xu, J., see Fan, X., JSYST Dec. 2020 4943-4954 Xu, K., Shen, Z., Wang, Y., and Xia, X., Location-Aided mMIMO Channel Tracking and Hybrid Beamforming for High-Speed Railway Communications: An Angle-Domain Approach; JSYST March 2020 93-104 Xu, L., see Zhao, L., JSYST Sept. 2020 3904-3915 Xu, S., Cao, J., Legg, P., Liu, B., and Li, S., Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks; JSYST June 2020 1740-1751 Xu, X., see Qu, H., JSYST Sept. 2020 3161-3172 Xu, X., Dai, Z., Shan, A., and Gu, T., Connected Target ϵ-probability Coverage in WSNs With Directional Probabilistic Sensors; JSYST Sept. 2020 3399-3409 Xu, Y., see Ding, R., JSYST March 2020 633-644 Xu, Y., see Wang, H., JSYST March 2020 538-547 Xu, Y., see Xu, C., 2443-2454, see Wang, Y., JSYST Dec. 2020 5373-5383 Xu, Y., see Xu, C., JSYST Dec. 2020 5384-5395 Xu, Y., see Xu, C., JSYST Dec. 2020 5384-5395 Xue, J., see Sang, Y., JSYST Sept. 2020 3245-3255 Y Yadav, A., see Chaitanya, B.K., JSYST March 2020 870-879 Yadav, A., see Kumar, R., 2085-2096 Yadav, S., Kumar, V., Dhok, S.B., and Jayakody, D.N.K., Energy-Efficient Design of MI Communication-Based 3-D Non-Conventional WSNs; JSYST June 2020 2585-2588 Yadav, V.K., see Mundhe, P., JSYST Dec. 2020 5463-5474 Yan, F., see Qu, H., JSYST Sept. 2020 3161-3172 Yan, H., Li, J., and Zhang, Y., Remote Data Checking With a Designated Verifier in Cloud Storage; JSYST June 2020 1788-1797 Yan, J., see Luo, X., 2901-2912 Yan, J., see Kabir, M.E., JSYST Sept. 2020 4221-4231 Yan, X., Gu, C., Zhang, X., and Li, F., Robust Optimization-Based Energy Storage Operation for System Congestion Management; 2694-2702 NOMA-Based Uplink Satellite Networks With Randomly Deployed Users;...…”
Section: Optimizing Efficient Energy Transmission On a Swiptmentioning
confidence: 99%