2014
DOI: 10.1109/tsp.2014.2364786
|View full text |Cite
|
Sign up to set email alerts
|

Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
120
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 187 publications
(121 citation statements)
references
References 30 publications
1
120
0
Order By: Relevance
“…After obtaining the equivalent form of the optimization problem, the optimal correlation matrix R z of jamming signal can be designed by following proposition whose proof is offered in Appendix B. Proposition 2: Consider the optimization problem in (25) (29) and the optimal U opt z and Λ opt…”
Section: A Known Both H Jb and H Abmentioning
confidence: 99%
“…After obtaining the equivalent form of the optimization problem, the optimal correlation matrix R z of jamming signal can be designed by following proposition whose proof is offered in Appendix B. Proposition 2: Consider the optimization problem in (25) (29) and the optimal U opt z and Λ opt…”
Section: A Known Both H Jb and H Abmentioning
confidence: 99%
“…Specifically, the SC can make the transmission from the source node to the legitimate destination node secure while achieving zero mutual information between the source node and malicious eavesdropper node. Based on this idea, extensive research efforts have been devoted to improving the SC from an information-theoretic perspective under different scenarios, for example, cooperative relaying [12][13][14][15] and beamforming techniques [16,17], cooperative jamming (CJ) methods [18][19][20], and multiple-input multipleoutput (MIMO) schemes [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…Considering multiple relays used to facilitate the downlink of multi-user networks, [26] and [27] analyzed the secrecy performance for AF-relay and selective-DF-relay selection, respectively. Besides these works, the secure communications of full-duplex relay and large systems were also investigated in the literature [30]- [33].…”
Section: Introductionmentioning
confidence: 99%