2018
DOI: 10.1109/tifs.2017.2746063
|View full text |Cite
|
Sign up to set email alerts
|

Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 43 publications
0
17
0
Order By: Relevance
“…The robust transmit scheme was designed in [13], where the CSI errors were described using the deterministic model. Although the stochastic model was taken in [25], [26], [29], [30], only the Gaussian distribution of the CSI errors was involved. In this paper, we extend the existing works and design the robust transmit schemes only based on the statistical characteristics of CSI errors.…”
Section: B Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The robust transmit scheme was designed in [13], where the CSI errors were described using the deterministic model. Although the stochastic model was taken in [25], [26], [29], [30], only the Gaussian distribution of the CSI errors was involved. In this paper, we extend the existing works and design the robust transmit schemes only based on the statistical characteristics of CSI errors.…”
Section: B Related Work and Motivationmentioning
confidence: 99%
“…• Considering the imperfect CSI, we propose the distributionally robust transmit schemes with the objective to minimize the total transmit power of transmitter and jammer subject to the reliability and security constraints, i.e., lower bound of connection probability at desired receiver and lower bound of outage probability at eavesdroppers. Unlike the state-of-the-art Gaussianity assumption in [25], [26], [29], [30], only the mean and the covariance of CSI errors can be obtained. The proposed transmit schemes show robustness against the possible CSI errors in despite of the distribution.…”
Section: Contributionsmentioning
confidence: 99%
“…Without using any encryption, an emerging technique termed as physical (PHY) layer security has attracted considerable interest in recent years [6,7]. By exploiting the coding techniques as well as physical properties of wireless channels, PHY layer security has a great potential to achieve "perfect secrecy" and is identified as a significant complement to traditional cryptographic techniques [8].…”
Section: Introductionmentioning
confidence: 99%
“…Motivated by the works above, we have also investigated the resource allocation problems for multicell multiuser systems. First, by using a universal multiuser interference channel model [17], we investigated the power minimization and sum rate maximization problems under the constraints on system power budget and individual users' QoS requirements, while taking into account wireless power transfer and physical layer security. Then, upon extending the multiuser interference channel model to a multicell multiuser massive MIMO system [18], we investigated the resource allocation problems for guaranteeing individual users' QoS requirements with causal time-splitting wireless power transfer.…”
Section: Introductionmentioning
confidence: 99%