Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2016
DOI: 10.1109/jstsp.2016.2603970
|View full text |Cite
|
Sign up to set email alerts
|

Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming

Abstract: Consider a two-way communication scenario where two single-antenna nodes, operating under full-duplex mode, exchange information to one another through the aid of a (full-duplex) multi-antenna relay, and there is another singleantenna node who intends to eavesdrop. The relay employs artificial noise (AN) to interfere the eavesdropper's channel, and amplify-forward (AF) Alamouti-based rank-two beamforming to establish the two-way communication links of the legitimate nodes. Our problem is to optimize the rank-t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 53 publications
(30 citation statements)
references
References 28 publications
0
30
0
Order By: Relevance
“…A classical way to handle this fractional objective is the Dinkelbach method [14], which translates the fractional program into a sequence of quadratic programs. Algorithm 2 summarizes the main procedure of the Dinkelbach method for problem (10). According to the classical convergence result of the Dinkelbach method [14], Algorithm 2 converges to an optimal solution of (10) whenever problem (13) is optimally solved throughout the iterations.…”
Section: : End Ifmentioning
confidence: 99%
See 2 more Smart Citations
“…A classical way to handle this fractional objective is the Dinkelbach method [14], which translates the fractional program into a sequence of quadratic programs. Algorithm 2 summarizes the main procedure of the Dinkelbach method for problem (10). According to the classical convergence result of the Dinkelbach method [14], Algorithm 2 converges to an optimal solution of (10) whenever problem (13) is optimally solved throughout the iterations.…”
Section: : End Ifmentioning
confidence: 99%
“…According to the classical convergence result of the Dinkelbach method [14], Algorithm 2 converges to an optimal solution of (10) whenever problem (13) is optimally solved throughout the iterations. Unfortunately, problem (13) can be as hard as the original problem (10). As a compromise, we propose to apply ADMM method to approximately solve (13), which is detailed in the remaining part of this section.…”
Section: : End Ifmentioning
confidence: 99%
See 1 more Smart Citation
“…Convexification [5,6], security is an absolutely central criterion in designing transceivers, in the context of telemedicine 2 Mathematical Problems in Engineering games [7,8]; cooperative relay networks [9,10]; wireless information power transfer and energy harvesting scenarios [11,12]; or low-rank beamforming issue [13].…”
Section: General Perspective Chiefly According To the Principlementioning
confidence: 99%
“…In relation to the complexity, we should compare (11) with (13). To this end, among the methods in the literature (e.g., [5,32,42]), we use the procedure of counting the flip-flops, as described in [5, Table 3].…”
Section: Complexitymentioning
confidence: 99%