2019
DOI: 10.1109/tvt.2019.2905765
|View full text |Cite
|
Sign up to set email alerts
|

High-Performance Power Allocation Strategies for Secure Spatial Modulation

Abstract: Optimal power allocation (PA) strategies can make a significant rate improvement in secure spatial modulation (SM). Due to the lack of secrecy rate (SR) closed-form expression in secure SM networks, it is hard to optimize the PA factor. In this paper, two PA strategies are proposed: gradient descent, and maximum product of signal-to-interference-plusnoise ratio (SINR) and artificial-noise-to-signal-plus-noise ratio (ANSNR)(Max-P-SINR-ANSNR). The former is an iterative method and the latter is a closed-form sol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 14 publications
0
26
0
Order By: Relevance
“…For simplicity, during simulations, the eight schemes that will be investigated and compared are shown in Table 2. The proposed power allocation in [31] is named as 'max sum-rate approach'. The fixed approach A denotes that power ratio is β 1 : β 2 = 1 : 9, the fixed approach B is that power ratio is…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For simplicity, during simulations, the eight schemes that will be investigated and compared are shown in Table 2. The proposed power allocation in [31] is named as 'max sum-rate approach'. The fixed approach A denotes that power ratio is β 1 : β 2 = 1 : 9, the fixed approach B is that power ratio is…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Compared with scheme 2, the proposed scheme 1 has better performance in the ASRs. It means that the proposed power allocation is more effective than the max sum-rate power allocation in [31] for QSM-NOMA systems by considering users' target-rate requirements. Additionally, the proposed user grouping is a better scheme than the BNWF grouping in [9] and the random grouping by comparing with scheme 3 and scheme 8, respectively.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…As the total power is constrained, elaborately splitting the power allocated to the CM and allocated to the AN has a great impact on improving the SR performance. In [49] and [50], the approximation of SR based on cut-off rate was invoked to substitute the non-closed SR expression for secure SM systems. Using the approximation as the objection function, the authors in [49] proposed a gradient-based PA method which approached the optimal PA method based on ES.…”
Section: A Typical Sm Systemmentioning
confidence: 99%
“…Recently, PLS researches based on SM [2830] and OFDM‐IM [31] have been proposed. In [28], secure IM based PLS is proposed where the channel state information (CSI) is used to randomise a mapping rule for only IM symbols.…”
Section: Introductionmentioning
confidence: 99%