2019
DOI: 10.3390/s19214757
|View full text |Cite
|
Sign up to set email alerts
|

On the Physical Layer Security Characteristics for MIMO-SVD Techniques for SC-FDE Schemes

Abstract: Multi-Input, Multi-Output (MIMO) techniques are seeing widespread usage in wireless communication systems due to their large capacity gains. On the other hand, security is a concern of any wireless system, which can make schemes that implement physical layer security key in assuring secure communications. In this paper, we study the physical layer security issues of MIMO with Singular Value Decomposition (SVD) schemes, employed along with Single-Carrier with Frequency-Domain Equalization (SC-FDE) techniques. M… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 36 publications
(40 reference statements)
0
8
0
Order By: Relevance
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
“…The transmitter sends C data blocks, with C ≤ R, and each data block is composed by the sum of two blocks of N Quadrature Phase Shift Keying (QPSK) symbols with differing power (the generalization to other constellations is straightforward [21]). Contrary to the single user system studied in [17], fir the power domain NOMA scenario of this work, we must define the symbols to be transmitted to both users. The data symbols transmitted for user B are denoted by the C × N matrix s B , with each data stream defined as an…”
Section: System Characterizationmentioning
confidence: 99%
“…The detection at User C is significantly different from the detection scheme employed in [17]. This is explained by the modifications required for the interleaving scheme and by the use of a partial key.…”
Section: Receiver Bmentioning
confidence: 99%
See 2 more Smart Citations