Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2011
DOI: 10.1016/j.phycom.2011.10.004
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security of MIMO–OFDM systems by beamforming and artificial noise generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(29 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…Typically, the transmission power of a jamming signal is equal to the transmission power of the information-bearing signal [48], which means that an additional radio unit is required to transmit the jamming signal. As a result, the energy consumption of the transmitter employing secrecy-coding is doubled.…”
Section: Efficiency Of Polar-ldpc Secrecy Coding Schemementioning
confidence: 99%
“…Typically, the transmission power of a jamming signal is equal to the transmission power of the information-bearing signal [48], which means that an additional radio unit is required to transmit the jamming signal. As a result, the energy consumption of the transmitter employing secrecy-coding is doubled.…”
Section: Efficiency Of Polar-ldpc Secrecy Coding Schemementioning
confidence: 99%
“…As such, the relationship between the information signal power (P x ) and the total source power (P s ) can be written as P x = εP s , where ε ∈ [0, 1) is the fraction factor, whereas the relationship between the AN power and the total power is σ . To allocate the source power, we consider the following two approaches [6], [16]. In the first approach, the fraction factor is progressively varied from 0 to 1, then the impact of this variation on the secrecy rate can be observed.…”
Section: B Source Power Allocationmentioning
confidence: 99%
“…During this iterative process, periodically, a member sensor node observes its fitness in an entirely distributed mode and evaluates its current fitness with the average fitness of the whole WSNs. If the difference is larger than a predefined maximum bound, then the member International Journal of Distributed Sensor Networks 7 sensor node selects a new power level strategy according to the selection dynamics from (15). This interactive process goes on until the ESS of the secrecy rate game towards WSNs is achieved.…”
Section: Secrecy Rate Adaptationmentioning
confidence: 99%