2017
DOI: 10.1109/tifs.2016.2611478
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistically Robust SWIPT for Secrecy MISOME Systems

Abstract: This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver (IR), multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the ERs' harvested energy outage caused by channel state informat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(59 citation statements)
references
References 36 publications
(101 reference statements)
0
59
0
Order By: Relevance
“…However, the CSI of satellite terminals may not be available at the SAT due to the large distance, we will consider this case in our future work. In this setup, we adopt a stochastic model [30], [37] to characterize the CSI imperfection, thus the channel vectors can be modeled, respectively, as g p =ĝ p + ∆g p , g e =ĝ e + ∆g e , g s =ĝ s + ∆g s , (14) whereĝ p ,ĝ e andĝ s denote the imperfect channel estimate vectors, which are known to the terrestrial BS. And ∆g p , ∆g e and ∆g s denote the corresponding channel errors/uncertainties, which tend to be Gaussian random variables with zero-mean and covariance regarding ∆g p ∼ CN (0, Ω p ), ∆g e ∼ CN (0, Ω e ), ∆g s ∼ CN (0, Ω s ), where Ω p ≽ 0, Ω e ≽ 0, and Ω s ≽ 0 stand for the covariance matrices corresponding channel estimation errors.…”
Section: Problem Formulationmentioning
confidence: 99%
“…However, the CSI of satellite terminals may not be available at the SAT due to the large distance, we will consider this case in our future work. In this setup, we adopt a stochastic model [30], [37] to characterize the CSI imperfection, thus the channel vectors can be modeled, respectively, as g p =ĝ p + ∆g p , g e =ĝ e + ∆g e , g s =ĝ s + ∆g s , (14) whereĝ p ,ĝ e andĝ s denote the imperfect channel estimate vectors, which are known to the terrestrial BS. And ∆g p , ∆g e and ∆g s denote the corresponding channel errors/uncertainties, which tend to be Gaussian random variables with zero-mean and covariance regarding ∆g p ∼ CN (0, Ω p ), ∆g e ∼ CN (0, Ω e ), ∆g s ∼ CN (0, Ω s ), where Ω p ≽ 0, Ω e ≽ 0, and Ω s ≽ 0 stand for the covariance matrices corresponding channel estimation errors.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The mapping decomposition {xx } → Q cited above fundamentally requires the constraint rank(Q) = 1 [28][29][30][31]. Inversely, Q being rank-1 unfavourably causes nonconvexity [29][30][31].…”
Section: Our Proposed Solutionmentioning
confidence: 99%
“…Inversely, Q being rank-1 unfavourably causes nonconvexity [29][30][31]. Of course under some circumstances, the aforementioned constraint holds and it can be alternatively dropped (e.g., in [32] in which nearly 99.79% rank-1 results in the simulations were witnessed).…”
Section: Our Proposed Solutionmentioning
confidence: 99%
“…On the other hand, secure resource allocation in the SWIPT systems was investigated in [8], [9], [20]- [25]. To guarantee system security, different performance metrics, such as secrecy capacity [8], [9], [21], [24] and transmission power [20], [25], are optimized. In SWIPT with a single legitimate UE, the authors in [9] and [21] investigated secrecy-capacity maximization for multiple single-antenna eavesdroppers and one single multiple-antenna eavesdropper, respectively.…”
Section: Introductionmentioning
confidence: 99%