2020
DOI: 10.1109/access.2020.3026359
|View full text |Cite
|
Sign up to set email alerts
|

Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWIPT Secrecy Networks

Abstract: We explore physical layer security of simultaneous wireless information and power transfer (SWIPT) relay network in this paper. Modeling channel error between relay and eavesdroppers (Eves) as random channel state information (CSI) error, we present an algorithm to optimize secret rate of SWIPT in the constraints of relay forward power, receiver signal-to-interference-plus-noise ratio (SINR) and Eves SINR. A slack variable is introduced to decompose original non-convex problem into upper and lower sub-problems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…Next, we present extensive numerical simulation results to prove the performance of the proposed algorithm. Our comparison algorithm comes from similar works presented in [ 7 , 12 , 13 ]. As shown in Figure 1 , we assume that the S is located at the edge of a circular region and the legitimate destination is located at a symmetrical position of the source on the circle.…”
Section: Complexity Analysis and Numerical Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Next, we present extensive numerical simulation results to prove the performance of the proposed algorithm. Our comparison algorithm comes from similar works presented in [ 7 , 12 , 13 ]. As shown in Figure 1 , we assume that the S is located at the edge of a circular region and the legitimate destination is located at a symmetrical position of the source on the circle.…”
Section: Complexity Analysis and Numerical Resultsmentioning
confidence: 99%
“…Although AN is introduced to interfere with eavesdroppers, the security of the system is still deteriorating in the presence of CSI errors. Since designs for CSI error follow Gaussian distribution, the probabilistic constraint beamforming (PC-SPS) algorithm [ 13 ] has a certain robustness, and its performance is slightly better than the CJ-SPS algorithm, while the proposed algorithm can achieve a higher security rate at the ellipsoidal bounded CSI error.…”
Section: Complexity Analysis and Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, Hu Z explored physical layer security of SWIPT relay network with imperfect the CSI model. An algorithm is presented to optimize secret rate of SWIPT network in the constraints of relay forward power and eavesdroppers SINR [30]. Cao and Wang studied the security transmission of uplink NOMA with the aid of the EH receivers.…”
mentioning
confidence: 99%