2014
DOI: 10.1109/twc.2014.2326415
|View full text |Cite
|
Sign up to set email alerts
|

Outage Constrained Robust Secure Transmission for MISO Wiretap Channels

Abstract: In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceeds certain threshold with high probability.Therefore including such constraint in the design naturally ensures the desired robustness. Unfortunately, the pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(58 citation statements)
references
References 43 publications
(101 reference statements)
0
58
0
Order By: Relevance
“…Then, the uncertainties of legitimate channels can also be characterized by the three methods mentioned above. It is worth noting that, towards the uncertainties of real channels, the robust secure designs are commonly performed to ensure achieving the security, reliability, and robustness of information transmission [30], [39], [56], [234], [253], [275].…”
Section: B the Imperfect Csi Of Wiretap Channelsmentioning
confidence: 99%
“…Then, the uncertainties of legitimate channels can also be characterized by the three methods mentioned above. It is worth noting that, towards the uncertainties of real channels, the robust secure designs are commonly performed to ensure achieving the security, reliability, and robustness of information transmission [30], [39], [56], [234], [253], [275].…”
Section: B the Imperfect Csi Of Wiretap Channelsmentioning
confidence: 99%
“…Optimising the code-word transmission rate in the previous study, 21 a larger feasible set in connection with the outage constraints determined for the MIMOME transceiver was essentially achieved. Locality or globality-driven procedures: In the previous study by Ma et al, 22 a relaxation-restriction method was presented that was significantly able to achieve near-optimal solutions. In the previous study by Shi et al, 23 globally optimal solutions were accurately achieved regarding SDR.…”
Section: Numerical-based Approachesmentioning
confidence: 99%
“…Locality or globality‐driven procedures: In the previous study by Ma et al, a relaxation‐restriction method was presented that was significantly able to achieve near‐optimal solutions. In the previous study by Shi et al, globally optimal solutions were accurately achieved regarding SDR.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, security is also a fundamental problem in common wireless systems due to the broadcast nature of the wireless medium [36]. The most recent advance in physical (PHY) layer security is to exploit the PHY characteristics of the wireless fading channels for perfect secrecy of communication, especially there are some works have been presented to studied the PHY secrecy of the traditional wireless systems while considering imperfect CSI [37]- [43]. However, none of them is related to SWIPT systems.…”
Section: Introductionmentioning
confidence: 99%