Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2013
DOI: 10.1109/lsp.2013.2252898
|View full text |Cite
|
Sign up to set email alerts
|

PHY Layer Security Based on Protected Zone and Artificial Noise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
31
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 58 publications
(32 citation statements)
references
References 7 publications
1
31
0
Order By: Relevance
“…The power allocation problem in (16) can be efficiently solved by linear search algorithms as in [20]. Finally, for the k th configuration we store the maximum value ofR k S in a normalised decreasing-order vectorδ 2 , similarly to what we did for the normalisedδ 1 .…”
Section: B Eigen-transmission Analysismentioning
confidence: 99%
“…The power allocation problem in (16) can be efficiently solved by linear search algorithms as in [20]. Finally, for the k th configuration we store the maximum value ofR k S in a normalised decreasing-order vectorδ 2 , similarly to what we did for the normalisedδ 1 .…”
Section: B Eigen-transmission Analysismentioning
confidence: 99%
“…In terms of the security issue, the authors in [8] designed a secure beamforming scheme in a SWIPT system, which can minimize the whole transmit power while maintaining the secrecy rate and energy harvesting at ER. Meanwhile, one of the technologies for enhancing the secrecy performance is to transmit artificial noise by jammers to interfere eavesdroppers [9]. The authors in [10,11] recently considered the PLS with the AN by treating energy harvesting (EH) receivers as potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, there have been efforts to better understand physical layer security in large-scale networks by using stochastic geometry. To enhance network security, various techniques, such as the protected zone [1], [2], artificial noise [3]- [8], and sectorized transmission [2], have been proposed in large-scale networks. Recently, artificial noise transmission with beamforming were developed against randomly distributed multiple eavesdroppers, assuming perfect channel state information (CSI) of the legitimate link [3]- [6].…”
Section: Introductionmentioning
confidence: 99%