2016
DOI: 10.1109/twc.2015.2472405
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers

Abstract: This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multi-antenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network. First, we formulate the power minimization problem based on the assumption that the legitimate transmitter has perfect channel state information (CSI) of the legitimate user and the eavesdroppers, where this problem can be reformul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
80
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 117 publications
(80 citation statements)
references
References 37 publications
(44 reference statements)
0
80
0
Order By: Relevance
“…As a complementary solution, physical-layer security has attracted significant attention for safeguarding wireless networks. In this line of research, physical-layer security for the multiple-input singleoutput channels [6], multiple-input multiple-output channels [7], relay channels [8], interference channels [9] and cognitive channels [10] have been well pursued. Additionally, the concept of directional modulation is recently exploited to enhance the security from a practical implementation perspective [11].…”
mentioning
confidence: 99%
“…As a complementary solution, physical-layer security has attracted significant attention for safeguarding wireless networks. In this line of research, physical-layer security for the multiple-input singleoutput channels [6], multiple-input multiple-output channels [7], relay channels [8], interference channels [9] and cognitive channels [10] have been well pursued. Additionally, the concept of directional modulation is recently exploited to enhance the security from a practical implementation perspective [11].…”
mentioning
confidence: 99%
“…Perform a one-dimensional search over ν to obtain the optimal values (ν * , Θ(λ i , ν * )) for the outer problem in (43), where each Θ(λ i , ν) is obtained by solving the inner problem in (50); 4: Retrieve the corresponding Q * s through (46); 5:…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Another curve is related to Bernstein inequality–based method. See, for example, the works of Chu et al and Xu et al in order to study this approach.…”
Section: Results and Evaluationmentioning
confidence: 99%