2011
DOI: 10.1109/tifs.2011.2156788
|View full text |Cite
|
Sign up to set email alerts
|

MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 61 publications
(67 citation statements)
references
References 24 publications
0
65
0
Order By: Relevance
“…Both examples plotted in this figure illustrate that the cooperative scheme (GSVD+ANA) allows for communication over larger secrecy rates compared with the non-cooperative schemes GSVD and NCJ. In fact, as we have shown in [11], the achievable secrecy rate region of GSVD+ANA is always bigger than (or at least equal to) that of the GSVD scheme, while NCJ always has the worst performance. Note that in this figure, the achievable secrecy rate region of GSVD+ANA is bigger than that of GSVD and NCJ even with a larger number of antennas at the unintended receivers.…”
Section: Numerical Resultsmentioning
confidence: 70%
See 2 more Smart Citations
“…Both examples plotted in this figure illustrate that the cooperative scheme (GSVD+ANA) allows for communication over larger secrecy rates compared with the non-cooperative schemes GSVD and NCJ. In fact, as we have shown in [11], the achievable secrecy rate region of GSVD+ANA is always bigger than (or at least equal to) that of the GSVD scheme, while NCJ always has the worst performance. Note that in this figure, the achievable secrecy rate region of GSVD+ANA is bigger than that of GSVD and NCJ even with a larger number of antennas at the unintended receivers.…”
Section: Numerical Resultsmentioning
confidence: 70%
“…Let q 12 be the number of non-zero elements of the vector s 2 that do not lie in the nullspace of G 2 , which can be determined using (11) and the specific form of the diagonal matrix D 2 . Consequently, Ψ e2 is the corresponding q 12 columns of the unitary matrix Ψ e2 .…”
Section: Cooperative Solution: Gsvd + Artificial Noise Alignmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The SINR for the eavesdropped message from BS j at MS i is hence ΓeijMathClass-rel=MathClass-rel|bold-italichijMathClass-bin†bold-italicwjMathClass-rel|2σ2MathClass-punc,1emnbspfor jMathClass-rel≠i Under this setting, the smallest message rate and the greatest equivocation rate are obtained at the MSs, and our analysis and optimization will address the worst‐case scenario. A similar argument has been used in for such formulation.…”
Section: K‐user Miso Ifc‐cm Modelmentioning
confidence: 99%
“…Each of the multiple messages is intended for one of the users but needs to be kept secret from the other users. The secrecy capacity of the two-user multi-antenna broadcast network was examined in [14,15]. The confidential broadcasting in the multi-user network where a multi-antenna base station (BS) serves an arbitrary number of receivers in a single cell was studied in [16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%