A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
2018 IndexIEEE Wireless Communications LettersVol. 7
2018
IEEE Wireless Communications Letters
., +, LWC Oct. 2018 860-863 Secure Beamforming Designs for Secrecy MIMO SWIPT Systems. ...
., +, LWC Feb. 2018 106-109
Secure Beamforming Designs for Secrecy MIMO SWIPT Systems. ...
doi:10.1109/lwc.2018.2888676
fatcat:olfvetmkt5bt3c572e5y76b5pm
Robust Secrecy Beamforming for MIMO SWIPT with Probabilistic Constraints
2016
2016 IEEE Globecom Workshops (GC Wkshps)
This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input multipleoutput (MIMO) wiretap channel with energy harvesting receivers. ...
This probabilisticconstrained secrecy rate maximization problem presents a significant analytical and computational challenge since any closedform for the probabilistic constraints with log − det functions ...
CONCLUSIONS In this paper, we investigated probabilistically constrained secrecy rate maximization problem for SWIPT in a MIMO wiretap system where all the nodes are equipped with multiple antennas. ...
doi:10.1109/glocomw.2016.7849032
dblp:conf/globecom/KhandakerW16
fatcat:sfke6ybrjrbhfppzqf3uilla64
Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO
[article]
2020
arXiv
pre-print
Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate. ...
Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived. ...
SWIPT for downlink of a multi-user massive MIMO system was studied in [16] and its achievable rates were computed. ...
arXiv:2008.04352v1
fatcat:5drupzkmvbcnlhuaqdribq7yhm
Author Index
2021
2021 IEEE Information Theory Workshop (ITW)
Precoding for mmWave MIMO Systems to MIMO Channels via Sufficient Statistic Moltafet, Mohammad Namboodiri, K. ...
Hybrid Precoding for mmWave MIMO Systems On the Performance Analysis of Streaming Codes over the Gilbert-Elliott Channel, On the Universality of Spatially Coupled LDPC Codes Over Intersymbol Interference ...
Refined Convergence Rates of the Good-Turing Estimator
Pang, Shuqin Generalized ...
doi:10.1109/itw48936.2021.9611435
fatcat:zuww6l6kwvejnby3txjocp6cp4
Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO
2020
IEEE Access
SWIPT for the downlink of a multiuser massive MIMO system was studied in [16] and its achievable rates were computed. ...
ASYMPTOTIC ANALYSIS To obtain an analytical insight, a massive MIMO system in which the number of antennas grows sufficiently large is considered. ...
Citation information: DOI 10.1109/ACCESS.2020.3016718, IEEE Access
APPENDIX C The partial derivatives of the secrecy rate lower bound according to θ and ρ k are detailed in (51) and (52). ...
doi:10.1109/access.2020.3016718
fatcat:lvztupn46zctvcwsp27qrbac5i
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey
2019
Zenodo
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security. ...
The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. ...
Alice
Bob
Eve
h AB
h A E
Main channel
Wiretap channel
Fig. 3. Pilot Contamination Attack on massive MIMO systems. ...
doi:10.5281/zenodo.3532040
fatcat:lct4ai7lf5hzpmepwqwv6e72t4
OUTAGE CONSTRAINT ROBUST TRANSMISSION DESIGN FOR SECRECY MIMO SWIPT SYSTEM WITH TIME SWITCHING
2019
Progress In Electromagnetics Research C
In this paper, we investigate a robust secrecy transmission design for a multiple-input multiple-output simultaneous wireless information and power transfer system. ...
Specifically, considering time switching at the transmitter, we aim to maximize the outage secrecy rate by jointly designing the information signal, energy signal, and time switching ratio, under the constraints ...
Specifically, the outage constrained robust methods were investigated for secrecy MISO SWIPT systems in [11] [12] [13] and for secrecy MIMO SWIPT systems in [14] [15] [16] , respectively. ...
doi:10.2528/pierc18101605
fatcat:bhcqus6w7naohpffeiohu77ube
Survey on Physical Layer Security for 5G Wireless Networks
[article]
2020
arXiv
pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. ...
Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided. ...
[79] , performance analysis of wireless communications in a multi-user massive MIMO by using imperfect CSI [80] , and SOP analysis for massive MIMO scenarios [81] . ...
arXiv:2006.08044v1
fatcat:r5l25bicwjhanidz3qu7bbi4mi
2019 Index IEEE Wireless Communications Letters Vol. 8
2019
IEEE Wireless Communications Letters
., +, LWC June 2019 941-944 Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels. ...
., +, LWC April 2019 328-331
Outage Constrained Secrecy Rate Maximization for MIMOME Multicast
Wiretap Channels. ...
doi:10.1109/lwc.2019.2961756
fatcat:bwxehcl4ejew7a6m66prb6s4z4
Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming
2019
IEEE Transactions on Information Forensics and Security
Specifically, the exact and asymptotic closedform expressions of the connection outage probability (COP), the secrecy outage probability (SOP), and the secrecy throughput of the proposed system are obtained ...
By contrast, it will promote the COP and SOP performance at the same time in the SWIPT-FDSJ scheme, which eventually results in the great improvement of secrecy throughput. ...
) is the secrecy rate per channel use. ...
doi:10.1109/tifs.2018.2848630
fatcat:zc2kldxc4nh3ldsfpl263x7via
Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper
2021
Electronics
Numerical results show that the achievable secrecy rate of the proposed IRS-assisted SWIPT system is higher than that of the SWIPT system without the assistance of the IRS. ...
We aim to maximize the secrecy rate at the legitimate IR by jointly optimizing the information beamforming vector and the energy transfer beamforming vector at the access point (AP), and the phase shift ...
The secrecy rate maximization problem for an IRS aided MIMO channel with SWIPT was considered in [29] , assuming all nodes were equipped with multiple antennas. Xue et al. ...
doi:10.3390/electronics10202536
fatcat:agyjp6a5lfhy5ga2qitjzhew7m
Secure Wireless Information and Power Transfer Based on Tilt Adaptation in 3-D Massive MIMO Systems
2019
IEEE Access
system over Rician fading channels. ...
We first derive the approximate ergodic achievable secrecy rate and harvested power. ...
ANALYSIS OF SECRECY RATE AND HARVESTED POWER In this section, we analyze the ergodic achievable individual secrecy rate and the harvested power in 3-D massive MIMO SWIPT systems with Rician channels. ...
doi:10.1109/access.2018.2888541
fatcat:4pc2qm5exfccfgimvyciu3bn2i
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks
2018
Sensors
Sensors 2018, 18, 331 2 of 12 networks [10], two-way relay scenarios [11], multiple-input-multiple-output (MIMO) wiretap-channel settings [12], etc. ...
Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis. ...
It is not difficult for comprehension because a larger secrecy rate is much harder to support for a given channel condition, thus leading to a greater secrecy outage. ...
doi:10.3390/s18020331
pmid:29364185
pmcid:PMC5856085
fatcat:qqgtcsinijeehhfpxjzssydjxi
Interplay Between NOMA and Other Emerging Technologies: A Survey
[article]
2019
arXiv
pre-print
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative ...
the secrecy rate maximization in the MISO and MIMO wiretap channels. ...
secrecy rate region the system is to operate at. ...
arXiv:1903.10489v2
fatcat:4u6soepjfjeiply4v2e2luionm
Interplay Between NOMA and Other Emerging Technologies: A Survey
2019
IEEE Transactions on Cognitive Communications and Networking
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative ...
Index Terms-NOMA, massive MIMO, mmWave, cooperative communications, cognitive radio, energy harvesting, mobile edge computing, physical layer security, visible light communications, machine learning, deep ...
the secrecy rate maximization in the MISO and MIMO wiretap channels. ...
doi:10.1109/tccn.2019.2933835
fatcat:5utwrrgtujbsrf7q5yngpcodie
« Previous
Showing results 1 — 15 out of 117 results