2018
DOI: 10.1109/tifs.2017.2765500
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
53
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 80 publications
(63 citation statements)
references
References 30 publications
0
53
0
Order By: Relevance
“…In the first stage, we optimize the frequency offsets across the antennas to rotate the channels of LU and Eve as orthogonal as possible. Specifically, for the identified special cases, the optimal frequency offsets can be obtained; for the general case, however, we develop an iterative algorithm utilizing the block successive upper-bound minimization (BSUM) method to find a solution for frequency offsets with stationary convergence guarantee [16]. This is not covered in this paper due to space limitation.…”
Section: Two-stage Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first stage, we optimize the frequency offsets across the antennas to rotate the channels of LU and Eve as orthogonal as possible. Specifically, for the identified special cases, the optimal frequency offsets can be obtained; for the general case, however, we develop an iterative algorithm utilizing the block successive upper-bound minimization (BSUM) method to find a solution for frequency offsets with stationary convergence guarantee [16]. This is not covered in this paper due to space limitation.…”
Section: Two-stage Algorithmmentioning
confidence: 99%
“…This is not covered in this paper due to space limitation. The details can be found in the journal version [16] (submitted to IEEE TIFS). In the second stage, the beamformer is optimized based on the given frequency offsets according to (13).…”
Section: Two-stage Algorithmmentioning
confidence: 99%
“…Owing to the favorable characteristic that the beampattern is both range and angle dependent, FDA technology, in recent years [10]- [16], has been applied into DM synthesis for wireless PLS transmissions. Specifically, the authors in [10] achieved directional modulation synthesis using the FDA with linearly increasing frequency increments.…”
Section: Introductionmentioning
confidence: 99%
“…The spread spectrum technology was combined with orthogonal FDA in [15] to achieve multi-beam DM synthesis in free space. Recently, the work in [16] generalized the wireless PLS transmissions based on FDA technology for proximal legitimate user and eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…In the research of improving the physical layer security performance, the physical layer security performance is improved by transmitting artificial noise and optimizing the beamforming matrix [3][4][5]. In literature [6], the antenna selection method is proposed to improve the physical layer security performance of the HetNets.…”
Section: Introductionmentioning
confidence: 99%