2014
DOI: 10.1109/tvt.2013.2285244
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
134
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 165 publications
(137 citation statements)
references
References 43 publications
3
134
0
Order By: Relevance
“…When k = 0, w k satisfies (6b) as it is the solution of the initial subproblem (6). This deduces that t = 0 satisfies constraint (12b).…”
Section: Appendix B Proof Of Lemma 32mentioning
confidence: 83%
See 2 more Smart Citations
“…When k = 0, w k satisfies (6b) as it is the solution of the initial subproblem (6). This deduces that t = 0 satisfies constraint (12b).…”
Section: Appendix B Proof Of Lemma 32mentioning
confidence: 83%
“…The solution of subproblem (6) w 0 is a strictly feasible point of problem (5). The proof is shown in Appendix B. w 0 is a strictly feasible rather than a feasible point of problem (5), thanks to the parameters β and δ 0 in subproblem (6). It is an important technique for the improvement of the objective function during the iterations.…”
Section: Algorithm Preserving Feasibilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Then, at time slot , the received signals at the legitimate receiver and the eavesdropper from the transmit user are given by respectively, where ( ) represents the transmitted signal, and ( ) and ( ) denote the corresponding additive white Gaussian noise (AWGN) with zero-mean and unit variance at the the legitimate receiver and the eavesdropper, respectively. Like [5,7], we suppose that all the users have full knowledge of both the main channel state information (CSI) and the wiretap CSI which are described by the vectors h := [ℎ 1 , . .…”
Section: System Modelmentioning
confidence: 99%
“…The results were subsequently extended to the broadcast channels [3] and Gaussian channel [4], respectively. Various physical-layer techniques, such as the use of interference or artificial noise to confuse the eavesdropper, the multi-antenna, beamforming, and resource allocation techniques, were proposed in [5][6][7][8] to improve the secrecy capacity, also known as the largest secrecy rate.…”
Section: Introductionmentioning
confidence: 99%