2018
DOI: 10.1109/tccn.2018.2833848
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
27
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(28 citation statements)
references
References 40 publications
1
27
0
Order By: Relevance
“…where P Smax is the maximum SU transmit power and I P is the PIT, which is the maximum interference level that the PBS can endure without hindering its performance. The transmit power constraint in (19) is designed by only considering the same cell secondary CCI. However, under a cooperative secondary system, a more stringent transmit power constraint on the secondary transmissions can be defined by considering the both inter-cell and intra-cell secondary CCI as…”
Section: Secondary Transmit Power Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…where P Smax is the maximum SU transmit power and I P is the PIT, which is the maximum interference level that the PBS can endure without hindering its performance. The transmit power constraint in (19) is designed by only considering the same cell secondary CCI. However, under a cooperative secondary system, a more stringent transmit power constraint on the secondary transmissions can be defined by considering the both inter-cell and intra-cell secondary CCI as…”
Section: Secondary Transmit Power Constraintsmentioning
confidence: 99%
“…In [17], the wireless energy harvesting for cognitive massive MIMO systems is studied by deriving the fundamental energy-rate trade-off. In [18], [19], the achievable secrecy rates of single-cell cognitive massive MIMO systems with passive/active eavesdroppers are investigated. In [20], [21], the achievable rates of cognitive MIMO relay systems with underlay spectrum sharing are derived, and thereby, the detrimental effects of inter/intra cell pilot contamination are investigated.…”
Section: Introductionmentioning
confidence: 99%
“…are the small scale Rayleigh fading and where D m,m = β m , m = {1, ..., K} and ϑ are the path loss from BS-to-user and BS-to-eavesdropper channels, respectively. The path loss is modeled as β m = l −r m and ϑ = d −r , where r is the path loss exponent factor, l m is the distance between the BS and user m, and d is the distance between the BS and eavesdropper [5].…”
Section: System Modelmentioning
confidence: 99%
“…Secure problems in massive MIMO systems have been investigated in References [4][5][6][7][8][9][10][11]. The authors in Reference [4] studied the impact of residual hardware impairment (HWI) on massive MIMO secure communication and showed the HWI has a negative impact on information security.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation