2015
DOI: 10.1109/lwc.2015.2445822
|View full text |Cite
|
Sign up to set email alerts
|

Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…We refer the interested readers to [92], [93], and [102] for a detailed explanation on the notations in P FD , where it is also shown that the formulated precoding design for FD communications can be solved via the SDR approach. Additional studies on FD communications include applications to PHY security in [94]- [96], and FD relays in [97]- [100].…”
Section: Full-duplex (Fd) Communicationsmentioning
confidence: 99%
“…We refer the interested readers to [92], [93], and [102] for a detailed explanation on the notations in P FD , where it is also shown that the formulated precoding design for FD communications can be solved via the SDR approach. Additional studies on FD communications include applications to PHY security in [94]- [96], and FD relays in [97]- [100].…”
Section: Full-duplex (Fd) Communicationsmentioning
confidence: 99%
“…There are some related works worth mentioning. In [7], [8], the authors considered similar secrecy design problems under both perfect and imperfect CSI of Eve. Our work differs from [7], [8] in both problem formulation and solution approach.…”
Section: A Related Workmentioning
confidence: 99%
“…In [7], [8], the authors considered similar secrecy design problems under both perfect and imperfect CSI of Eve. Our work differs from [7], [8] in both problem formulation and solution approach. Specifically, for the perfect CSI case the work [7] considered the SSRM problem under a single total power constraint, and proposed an SDP-based two-dimensional search approach and some low-complexity solutions to the SSRM problem.…”
Section: A Related Workmentioning
confidence: 99%
“…To name a few, for example, FD SWIPT has been considered in [13]. Also, PHY security in FD systems was addressed in [14], [15]. In contrast to previous work, our main contribution is the study of the integration of all three and the joint optimization of the sources' transmit power, the artificial noise (AN) covariance and the two-way relay beamforming matrix to maximize the secrecy sum-rate for SWIPT with a FD multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay employing power splitter (PS).…”
Section: Introductionmentioning
confidence: 99%