2011
DOI: 10.1109/tsp.2010.2094610
|View full text |Cite
|
Sign up to set email alerts
|

QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
261
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 379 publications
(262 citation statements)
references
References 33 publications
1
261
0
Order By: Relevance
“…It is noted that the secrecy capacity of wireless communications is limited and degraded due to the multipath fading effect. To this end, considerable research efforts were devoted to improving the wireless physical-layer security by employing the multipleinput multiple-output (MIMO) [12], artificial noise [13], [14] and beamforming techniques [15]- [17]. In addition, the joint artificial noise and beamforming design was investigated in [18] to enhance the wireless physical-layer security, where the artificial noise covariance and beamforming weights were jointly optimized with a target secrecy rate requirement.…”
mentioning
confidence: 99%
“…It is noted that the secrecy capacity of wireless communications is limited and degraded due to the multipath fading effect. To this end, considerable research efforts were devoted to improving the wireless physical-layer security by employing the multipleinput multiple-output (MIMO) [12], artificial noise [13], [14] and beamforming techniques [15]- [17]. In addition, the joint artificial noise and beamforming design was investigated in [18] to enhance the wireless physical-layer security, where the artificial noise covariance and beamforming weights were jointly optimized with a target secrecy rate requirement.…”
mentioning
confidence: 99%
“…Then, according to the Weierstrass theorem, the global maximum exists for (13), and the solution can be found by applying Fermat's rule. Namely, the optimal solution either satisfies z (V ) = 0 or is at the boundary, i.e.,…”
Section: B Optimization With Secrecy Constraintmentioning
confidence: 99%
“…[1]- [7]) and transmission scenarios (e.g., with user or jammer cooperation to facilitate security [8]- [10]). Alternatively, quality-of-service frameworks based on signalto-noise-ratio [11]- [13] or estimation theoretic tools, such as mean-squared error (MSE) have recently been used to measure the security performance of communication systems. The latter framework is of particular interest to design low-complexity practical secure systems and has been adopted in various studies [14]- [18].…”
mentioning
confidence: 99%
“…By contrast, in the case of known CSI, the legitimate transmitter can optimize its beamformer to enhance the data transmission rate for the intended UE for the sake of exceeding the eavesdropper's capacity. In this case, the transmitter can also combine the beamformer design with artificial noise genaration to degrade the overheard signals and to simultaneously enhance the legitimate UE's rate [25]. Naturally, having more serving APs and more dedicated jammers is capable of enhancing the UE's secrecy rate.…”
Section: Introduction a Motivation And Scopesmentioning
confidence: 99%