2020
DOI: 10.1109/tvt.2020.3018083
|View full text |Cite
|
Sign up to set email alerts
|

Secure Beamforming and Jamming for Multibeam Satellite Systems With Correlated Wiretap Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 34 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…γ g k,m and θ g k,m represent the off-axis angle from GEO satellites to LBC m at the GEO transmitter and the UD-LSC receiver, respectively. The antenna gain of the GEO and LEO satellite systems can be modeled as ( 5) [13].…”
Section: Signal and Interference Modelmentioning
confidence: 99%
“…γ g k,m and θ g k,m represent the off-axis angle from GEO satellites to LBC m at the GEO transmitter and the UD-LSC receiver, respectively. The antenna gain of the GEO and LEO satellite systems can be modeled as ( 5) [13].…”
Section: Signal and Interference Modelmentioning
confidence: 99%
“…For HSTRN, the relay is adopted to forward signal due to the unavailability of the direct link between satellites and legitimate users. [7][8][9][10][11][12][13] Some of the relating researches have focused on the secrecy performances of the systems with different parameters. [7][8][9][10] The authors studied the ergodic secrecy rate performance of the hybrid satellite-terrestrial relay system with multiple eavesdroppers under two relay protocols in Reference 7.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, many algorithms were proposed to improve secrecy performance. [11][12][13] A legitimate user scheduling scheme based on the multi-user system was put forward in Reference 11, while attention was paid to the cooperative jamming algorithm with the relays to obtain the optimal secrecy performance in Reference 12. Furthermore, the authors proposed a method of joint beamforming and power allocation via alternating optimization in Reference 13.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations