2014
DOI: 10.1109/tvt.2013.2288318
|View full text |Cite
|
Sign up to set email alerts
|

Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
84
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 111 publications
(84 citation statements)
references
References 22 publications
0
84
0
Order By: Relevance
“…6-8 and 10. It can be easily explained by (5) in Section II. The instantaneous secrecy capacity has a limitation, log 2 (1 + γ IR ), because increasing κ means that BS-IR link outperforms BS-ER eavesdropping links.…”
Section: A the Effect Of Small-scale Fadingmentioning
confidence: 99%
See 1 more Smart Citation
“…6-8 and 10. It can be easily explained by (5) in Section II. The instantaneous secrecy capacity has a limitation, log 2 (1 + γ IR ), because increasing κ means that BS-IR link outperforms BS-ER eavesdropping links.…”
Section: A the Effect Of Small-scale Fadingmentioning
confidence: 99%
“…Some of them, such as [3], [5], [8]- [11], [16]- [19], [22]- [23], [27]- [29], [34]- [35], studied the secrecy transmission in SWIPT while considering perfect/imperfect CSI. Making use of artificial noise method, the authors of [44] designed a joint information and energy transmit beamforming scheme to maximize the secrecy rate of the IR in a secret MISO SWIPT system.…”
Section: Introductionmentioning
confidence: 99%
“…In wireless energy harvesting and wireless powered networks, most of the work related to security is to analyze and optimize secrecy rate [3], [4], [5], [6], [7], [8]. For example, the authors of [3] optimized beamforming of the nodes in the network with passive eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [21] studied secure relay beamforming for SWIPT in one-way relay systems with an external energy-harvested receiver. In [22], the authors considered a wireless-powered jammer system, where the jammer can harvest energy from the wireless signal and use it to interfere with the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%