ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2019
DOI: 10.1109/icassp.2019.8683680
|View full text |Cite
|
Sign up to set email alerts
|

Robust Secure Precoding and Antenna Selection: A Probabilistic Optimization Approach for Interference Exploitation

Abstract: In this paper, to realize a power-efficient, user-centric and physical layer security-addressing system, we investigate total power minimization by jointly designing antenna selection and secure precoding for distributed antenna (DA) systems. Different from the conventional artificial noise (AN)-aided secure transmission, where AN is treated as an undesired element for the intended receiver (IR), we design AN such that it is constructive to the IR while keeping destructive to the eavesdroppers (Eves). Importan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
(26 reference statements)
0
3
0
Order By: Relevance
“…By observing problem (30), it is noted that the constraint (30b) is non-convex. To tackle the problem, likewise, we substitute µ w H U (θ p ) x 2 in the first term of (30b) with its first-order…”
Section: (29)mentioning
confidence: 99%
See 1 more Smart Citation
“…By observing problem (30), it is noted that the constraint (30b) is non-convex. To tackle the problem, likewise, we substitute µ w H U (θ p ) x 2 in the first term of (30b) with its first-order…”
Section: (29)mentioning
confidence: 99%
“…In addition to increasing the secrecy, the generated AN was exploited to be constructive to energy harvesting in [27]. AN-aided CI precoding designs were proposed in [29]- [31], where a deterministic robust optimization algorithm was presented in [29] and a probabilistic optimization method was presented in [30], respectively. Furthermore, the work of [31] expanded the scenario to more practical cases where the CSI of eavesdropper is totally unknown.…”
Section: Introductionmentioning
confidence: 99%
“…In [18], the authors investigated interference exploitation for secure transmission in MU-MIMO (multi-user multi-input multi-output) systems and proposed the beamforming designs. In [19], the robust secure precoding and antenna-selection method were proposed in a DA (distributed antenna) system to optimize the energy consumption of interference exploitation. In [20], the authors proposed a novel null-steering beamforming method to enhance the physical layer security in a non-orthogonal multiple access (NOMA) system.…”
Section: Related Workmentioning
confidence: 99%