The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2020
DOI: 10.3390/electronics9081222
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper

Abstract: In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 39 publications
(60 reference statements)
0
5
0
Order By: Relevance
“…So, problem ( 24) is still non-convex. Therefore, we use the penalty method to solve the rank-1 problem, as mentioned in [48], [49]. We know that all eigenvalues of Q are non-negative, since Q is a PSD matrix.…”
Section: The Proposed Ao-based Scheme For the Secure Transmission Pro...mentioning
confidence: 99%
See 1 more Smart Citation
“…So, problem ( 24) is still non-convex. Therefore, we use the penalty method to solve the rank-1 problem, as mentioned in [48], [49]. We know that all eigenvalues of Q are non-negative, since Q is a PSD matrix.…”
Section: The Proposed Ao-based Scheme For the Secure Transmission Pro...mentioning
confidence: 99%
“…Regarding non-convex function (−λ max (Q)), we observe that λ max (•) is a convex function [49]. Therefore, we can approximate the λ max (•) function in an iterative manner.…”
Section: The Proposed Ao-based Scheme For the Secure Transmission Pro...mentioning
confidence: 99%
“…The performance of multihop communications was studied extensively in [ 33 , 34 , 35 , 36 , 37 , 38 , 39 ]. Alnawafa and other authors in [ 34 ] proposed a novel routing algorithm that dramatically improves the lifespan, stability, and throughput of the networks compared with the state-of-the-art.…”
Section: Introductionmentioning
confidence: 99%
“…However, they simply considered multihop networks not combining with other advanced techniques such as NOMA and/or full-duplex relaying. Authors in [ 37 ] also investigated the secrecy performance of nonlinear SWIPT systems. They, nonetheless, focus on minimizing the total transmission in downlink and uplink power consumption instead of deriving the OP and system throughput.…”
Section: Introductionmentioning
confidence: 99%
“…• The simulation results are executed to validate the exact of our theory analysis. This simulation method is used effectively and widely in many studies [13]- [19] A. Organization In Section II, a description of the system model is presented.…”
Section: Introductionmentioning
confidence: 99%