A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Probabilistically Robust SWIPT for Secrecy MISOME Systems
2017
IEEE Transactions on Information Forensics and Security
This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna ...
As is well known, the secrecy rate outage constraints present a significant analytical and computational challenge. ...
Hence, this paper considers robust secrecy optimization problems with probabilistic secrecy rate and EH constraints for MISO systems with multiple multi-antenna eavesdroppers (MISOME). ...
doi:10.1109/tifs.2016.2611478
fatcat:iudag63pcfhfzfdflrotuta3be
Physical Layer Security for UAV Communications in 5G and Beyond Networks
[article]
2021
arXiv
pre-print
Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion ...
Recently, physical layer security (PLS), which exploits the inherent randomness of the wireless channels for secure communications, has been introduced to UAV systems as an important complement to the ...
ESR
Performance analysis
[52]
-
(Cooperative jamming,
SWIPT)
AF relay
(with SWIPT)
Fixed
-
-
Probabilistic LoS/NLoS
Rician
(angle-dependent K-factor)
Connection Prob. ...
arXiv:2105.11332v1
fatcat:d6oidecjcbaxrdz3kezdjxpypa
2019 Index IEEE Wireless Communications Letters Vol. 8
2019
IEEE Wireless Communications Letters
., +, LWC Feb. 2019 169-172 Robust Design of AC Computing-Enabled Receiver Architecture for SWIPT Networks. Tran, H., +, LWC June 2019 801-804 Robust Power Allocation in MIMO-NOMA Systems. ...
., +, LWC Aug. 2019 980-983
Robust Design of AC Computing-Enabled Receiver Architecture for SWIPT
Networks. ...
doi:10.1109/lwc.2019.2961756
fatcat:bwxehcl4ejew7a6m66prb6s4z4
Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI
2017
IEEE Transactions on Signal Processing
Our goal is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions by optimizing the transmit covariance matrices at Alice and Bob. ...
Consider a full-duplex (FD) bidirectional secure communication system, where two communication nodes, named Alice and Bob, simultaneously transmit and receive confidential information from each other, ...
power transfer (SWIPT) scenario [13] . ...
doi:10.1109/tsp.2017.2709270
fatcat:6ss6nex3vfbzvao6dgzpvfoliy