2017
DOI: 10.1109/lcomm.2016.2643159
|View full text |Cite
|
Sign up to set email alerts
|

Robust Beamforming Design for Secure Multiuser MISO Interference Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…We adopt the on–off transmission scheme [15] in this paper, Alice chooses a constant secrecy rate in transmitter. Moreover, Alice designs achievable secrecy rate RSk for user k , this method is widely used in previous research papers like [24, 33].…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…We adopt the on–off transmission scheme [15] in this paper, Alice chooses a constant secrecy rate in transmitter. Moreover, Alice designs achievable secrecy rate RSk for user k , this method is widely used in previous research papers like [24, 33].…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…The authors of [23] designed the optimal broadcast transmit BF matrix by a simple structure with intuitive properties and interpretations. And authors of [24] designed a robust BF method for secure multiuser MISO interference channel.…”
Section: Introductionmentioning
confidence: 99%
“…A second approach leads to a robust solution for the problem by considering a closed form expression for the CSI uncertainty. In particular, the authors of [11, 23–25] consider a robust solution when imperfect instantaneous‐based CSI is used while the authors of [26–29] consider the solution for the case of covariance‐based CSI. This second approach outperforms the approach in [21, 22].…”
Section: Introductionmentioning
confidence: 99%
“…The main contribution of our work is that we obtain a robust solution for the beamforming vector by following the SCA method, where we derive the beamforming vectors directly and avoid using the SDR method, following the previous work [11, 21–30], since the SDR method gives the solution by either ignoring the rank constraint (which requires the additional approximation step of reformulation) or by using a general rank beamforming technique, which reduces the rate of the system. We find the worst case CSI by modifying theorem 1 in [31], where Mohannad and Ho [31] found a solution of bold-italicX in the problem (MaxTrfalse(XYfalse)) when bold-italicY is known and positive (semi)definite.…”
Section: Introductionmentioning
confidence: 99%
“…A second approach leads to a robust solution for the problem by considering a closed form expression for the CSI uncertainty. In particular, the authors in [76,[88][89][90] consider a robust solution when imperfect instantaneous based CSI is used while the authors in [91][92][93][94] consider the solution for the case of covariance based CSI. This second approach outperforms the approach in [86,87].…”
Section: Introductionmentioning
confidence: 99%