Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








117 Hits in 3.2 sec

2018 IndexIEEE Wireless Communications LettersVol. 7

2018 IEEE Wireless Communications Letters  
., +, LWC Oct. 2018 860-863 Secure Beamforming Designs for Secrecy MIMO SWIPT Systems.  ...  ., +, LWC Feb. 2018 106-109 Secure Beamforming Designs for Secrecy MIMO SWIPT Systems.  ... 
doi:10.1109/lwc.2018.2888676 fatcat:olfvetmkt5bt3c572e5y76b5pm

Robust Secrecy Beamforming for MIMO SWIPT with Probabilistic Constraints

Muhammad R. A. Khandaker, Kai-Kit Wong
2016 2016 IEEE Globecom Workshops (GC Wkshps)  
This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input multipleoutput (MIMO) wiretap channel with energy harvesting receivers.  ...  This probabilisticconstrained secrecy rate maximization problem presents a significant analytical and computational challenge since any closedform for the probabilistic constraints with log − det functions  ...  CONCLUSIONS In this paper, we investigated probabilistically constrained secrecy rate maximization problem for SWIPT in a MIMO wiretap system where all the nodes are equipped with multiple antennas.  ... 
doi:10.1109/glocomw.2016.7849032 dblp:conf/globecom/KhandakerW16 fatcat:sfke6ybrjrbhfppzqf3uilla64

Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO [article]

Zahra Goli, S. Mohammad Razavizadeh, Hamed Farhadi, Tommy Svensson
2020 arXiv   pre-print
Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate.  ...  Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived.  ...  SWIPT for downlink of a multi-user massive MIMO system was studied in [16] and its achievable rates were computed.  ... 
arXiv:2008.04352v1 fatcat:5drupzkmvbcnlhuaqdribq7yhm

Author Index

2021 2021 IEEE Information Theory Workshop (ITW)  
Precoding for mmWave MIMO Systems to MIMO Channels via Sufficient Statistic Moltafet, Mohammad Namboodiri, K.  ...  Hybrid Precoding for mmWave MIMO Systems On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel, On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference  ...  Refined Convergence Rates of the Good-Turing Estimator Pang, Shuqin Generalized  ... 
doi:10.1109/itw48936.2021.9611435 fatcat:zuww6l6kwvejnby3txjocp6cp4

Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO

Zahra Goli, S. Mohammad Razavizadeh, Hamed Farhadi, Tommy Svensson
2020 IEEE Access  
SWIPT for the downlink of a multiuser massive MIMO system was studied in [16] and its achievable rates were computed.  ...  ASYMPTOTIC ANALYSIS To obtain an analytical insight, a massive MIMO system in which the number of antennas grows sufficiently large is considered.  ...  Citation information: DOI 10.1109/ACCESS.2020.3016718, IEEE Access APPENDIX C The partial derivatives of the secrecy rate lower bound according to θ and ρ k are detailed in (51) and (52).  ... 
doi:10.1109/access.2020.3016718 fatcat:lvztupn46zctvcwsp27qrbac5i

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security.  ...  The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  Alice Bob Eve h AB h A E Main channel Wiretap channel Fig. 3. Pilot Contamination Attack on massive MIMO systems.  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

OUTAGE CONSTRAINT ROBUST TRANSMISSION DESIGN FOR SECRECY MIMO SWIPT SYSTEM WITH TIME SWITCHING

Feng Zhou, Rugang Wang, Xiaofang Yang, Jinhong Bian
2019 Progress In Electromagnetics Research C  
In this paper, we investigate a robust secrecy transmission design for a multiple-input multiple-output simultaneous wireless information and power transfer system.  ...  Specifically, considering time switching at the transmitter, we aim to maximize the outage secrecy rate by jointly designing the information signal, energy signal, and time switching ratio, under the constraints  ...  Specifically, the outage constrained robust methods were investigated for secrecy MISO SWIPT systems in [11] [12] [13] and for secrecy MIMO SWIPT systems in [14] [15] [16] , respectively.  ... 
doi:10.2528/pierc18101605 fatcat:bhcqus6w7naohpffeiohu77ube

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security.  ...  Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided.  ...  [79] , performance analysis of wireless communications in a multi-user massive MIMO by using imperfect CSI [80] , and SOP analysis for massive MIMO scenarios [81] .  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi

2019 Index IEEE Wireless Communications Letters Vol. 8

2019 IEEE Wireless Communications Letters  
., +, LWC June 2019 941-944 Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels.  ...  ., +, LWC April 2019 328-331 Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels.  ... 
doi:10.1109/lwc.2019.2961756 fatcat:bwxehcl4ejew7a6m66prb6s4z4

Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming

Xuanxuan Tang, Yueming Cai, Yansha Deng, Yuzhen Huang, Wendong Yang, Weiwei Yang
2019 IEEE Transactions on Information Forensics and Security  
Specifically, the exact and asymptotic closedform expressions of the connection outage probability (COP), the secrecy outage probability (SOP), and the secrecy throughput of the proposed system are obtained  ...  By contrast, it will promote the COP and SOP performance at the same time in the SWIPT-FDSJ scheme, which eventually results in the great improvement of secrecy throughput.  ...  ) is the secrecy rate per channel use.  ... 
doi:10.1109/tifs.2018.2848630 fatcat:zc2kldxc4nh3ldsfpl263x7via

Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper

Zhixiang Deng, Yan Pan
2021 Electronics  
Numerical results show that the achievable secrecy rate of the proposed IRS-assisted SWIPT system is higher than that of the SWIPT system without the assistance of the IRS.  ...  We aim to maximize the secrecy rate at the legitimate IR by jointly optimizing the information beamforming vector and the energy transfer beamforming vector at the access point (AP), and the phase shift  ...  The secrecy rate maximization problem for an IRS aided MIMO channel with SWIPT was considered in [29] , assuming all nodes were equipped with multiple antennas. Xue et al.  ... 
doi:10.3390/electronics10202536 fatcat:agyjp6a5lfhy5ga2qitjzhew7m

Secure Wireless Information and Power Transfer Based on Tilt Adaptation in 3-D Massive MIMO Systems

Lixing Fan, Qi Wang, Yongming Huang, Luxi Yang
2019 IEEE Access  
system over Rician fading channels.  ...  We first derive the approximate ergodic achievable secrecy rate and harvested power.  ...  ANALYSIS OF SECRECY RATE AND HARVESTED POWER In this section, we analyze the ergodic achievable individual secrecy rate and the harvested power in 3-D massive MIMO SWIPT systems with Rician channels.  ... 
doi:10.1109/access.2018.2888541 fatcat:4pc2qm5exfccfgimvyciu3bn2i

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

2018 Sensors  
Sensors 2018, 18, 331 2 of 12 networks [10], two-way relay scenarios [11], multiple-input-multiple-output (MIMO) wiretap-channel settings [12], etc.  ...  Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.  ...  It is not difficult for comprehension because a larger secrecy rate is much harder to support for a given channel condition, thus leading to a greater secrecy outage.  ... 
doi:10.3390/s18020331 pmid:29364185 pmcid:PMC5856085 fatcat:qqgtcsinijeehhfpxjzssydjxi

Interplay Between NOMA and Other Emerging Technologies: A Survey [article]

Mojtaba Vaezi, Gayan Amarasuriya, Yuanwei Liu, Ahmed Arafa, Fang Fang,, Zhiguo Ding
2019 arXiv   pre-print
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative  ...  the secrecy rate maximization in the MISO and MIMO wiretap channels.  ...  secrecy rate region the system is to operate at.  ... 
arXiv:1903.10489v2 fatcat:4u6soepjfjeiply4v2e2luionm

Interplay Between NOMA and Other Emerging Technologies: A Survey

Mojtaba Vaezi, Gayan Amarasuriya, Yuanwei Liu, Ahmed Arafa, Fang Fang, Zhiguo Ding
2019 IEEE Transactions on Cognitive Communications and Networking  
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative  ...  Index Terms-NOMA, massive MIMO, mmWave, cooperative communications, cognitive radio, energy harvesting, mobile edge computing, physical layer security, visible light communications, machine learning, deep  ...  the secrecy rate maximization in the MISO and MIMO wiretap channels.  ... 
doi:10.1109/tccn.2019.2933835 fatcat:5utwrrgtujbsrf7q5yngpcodie
« Previous Showing results 1 — 15 out of 117 results