2015
DOI: 10.1109/tvt.2014.2336092
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
96
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 193 publications
(96 citation statements)
references
References 27 publications
0
96
0
Order By: Relevance
“…The authors [4,18,19] proposed distributed algorithms for assigning users to SCAs using auctioning, heuristic beamforming designs, Stackelberg games and evolutionary games. Despite all these auction-based algorithms reported in [20,21], algorithms that considered multiple user access through spatial beamforming and auctioning mechanism have not been reported in the literature, which is the focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The authors [4,18,19] proposed distributed algorithms for assigning users to SCAs using auctioning, heuristic beamforming designs, Stackelberg games and evolutionary games. Despite all these auction-based algorithms reported in [20,21], algorithms that considered multiple user access through spatial beamforming and auctioning mechanism have not been reported in the literature, which is the focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The results were subsequently extended to the broadcast channels [3] and Gaussian channel [4], respectively. Various physical-layer techniques, such as the use of interference or artificial noise to confuse the eavesdropper, the multi-antenna, beamforming, and resource allocation techniques, were proposed in [5][6][7][8] to improve the secrecy capacity, also known as the largest secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to helping relay the desirable information signals from source nodes to destination nodes, trusted relays can also implement CJ [12,13] to confuse the potential eavesdroppers by simultaneously sending jamming signals together with the information signals. Furthermore, due to the success of multi-antenna techniques in wireless communications, employing multiple antennas in the secure relay systems has also been investigated in the literature recently [14][15][16], in which the multi-antenna nodes can adjust the directions of their transmitted information and jamming signals so as to further improve the secure performance.…”
Section: Introductionmentioning
confidence: 99%