메뉴 건너뛰기




Volumn 9, Issue 3, 2015, Pages 396-403

Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL STATE INFORMATION; TRANSMITTERS;

EID: 84923299449     PISSN: 17518628     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-com.2014.0310     Document Type: Article
Times cited : (52)

References (37)
  • 1
    • 84923291840 scopus 로고    scopus 로고
    • Emerging technologies and research challenges for 5G wireless networks
    • arXiv preprint arXiv:1402.6474, 2014
    • Chin, W.H., Fan, Z., Haines, R.J.: 'Emerging technologies and research challenges for 5G wireless networks', arXiv preprint arXiv:1402.6474, 2014
    • Chin, W.H.1    Fan, Z.2    Haines, R.J.3
  • 2
    • 72949120015 scopus 로고    scopus 로고
    • Device-to-device communication as an underlay to lte-advanced networks
    • Doppler, K., Rinne, M., Wijting, C., Ribeiro, C., Hugl, K.: 'Device-to-device communication as an underlay to lte-advanced networks', IEEE, Commun. Mag., 2009, 47, pp. 42-49
    • (2009) IEEE, Commun. Mag. , vol.47 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.4    Hugl, K.5
  • 3
    • 84893874939 scopus 로고    scopus 로고
    • Resource management for device-To-device underlay communication
    • (Springer-Verlag New York Incorporated)
    • Song, L., Han, Z., Xu, C.: 'Resource management for device-To-device underlay communication'. Springerbriefs in Computer Science, (Springer-Verlag New York Incorporated, 2013)
    • (2013) Springerbriefs in Computer Science
    • Song, L.1    Han, Z.2    Xu, C.3
  • 4
    • 84893337981 scopus 로고    scopus 로고
    • Interference constrained D2D communication with relay underlaying cellular networks
    • September
    • Wang, L., Peng, T., Yang, Y., Wang, W.: 'Interference constrained D2D communication with relay underlaying cellular networks'. Proc. IEEE VTC, Fall, September 2013, pp. 1-5
    • (2013) Proc. IEEE VTC, Fall , pp. 1-5
    • Wang, L.1    Peng, T.2    Yang, Y.3    Wang, W.4
  • 5
    • 79951679288 scopus 로고    scopus 로고
    • Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks
    • Min, H., Seo, W., Lee, J., Park, S., Hong, D.: 'Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks', IEEE Trans. Wirel. Commun., 2011, 10, pp. 413-418
    • (2011) IEEE Trans. Wirel. Commun. , vol.10 , pp. 413-418
    • Min, H.1    Seo, W.2    Lee, J.3    Park, S.4    Hong, D.5
  • 6
    • 84355161968 scopus 로고    scopus 로고
    • Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks
    • Min, H., Lee, J., Park, S., Hong, D.: 'Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks', IEEE Trans. Wirel. Commun., 2011, 10, pp. 3995-4000
    • (2011) IEEE Trans. Wirel. Commun. , vol.10 , pp. 3995-4000
    • Min, H.1    Lee, J.2    Park, S.3    Hong, D.4
  • 7
    • 84860538226 scopus 로고    scopus 로고
    • Distance-constrained resource-sharing criteria for device-to-device communications underlaying cellular networks
    • Wang, H., Chu, X.: 'Distance-constrained resource-sharing criteria for device-to-device communications underlaying cellular networks', Electron. Lett., 2012, 48, pp. 528-530
    • (2012) Electron. Lett. , vol.48 , pp. 528-530
    • Wang, H.1    Chu, X.2
  • 9
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: 'Improving wireless physical layer security via cooperating relays', IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875-1888
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 10
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Liang, Y., Poor, H., Shamai, S.: 'Secure communication over fading channels', IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 2470-2492
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.2    Shamai, S.3
  • 11
    • 77953222550 scopus 로고    scopus 로고
    • On the relationship between the multi-antenna secrecy communications and cognitive radio communications
    • Zhang, L., Zhang, R., Liang, Y.-C., Xin, Y., Cui, S.: 'On the relationship between the multi-antenna secrecy communications and cognitive radio communications', IEEE Trans. Commun., 2010, 58, (6), pp. 1877-1886
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.6 , pp. 1877-1886
    • Zhang, L.1    Zhang, R.2    Liang, Y.-C.3    Xin, Y.4    Cui, S.5
  • 12
    • 79951595646 scopus 로고    scopus 로고
    • Qos-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach
    • Liao, W.-C., Chang, T.-H., Ma, W.-K., Chi, C.-Y.: 'Qos-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach', IEEE Trans. Signal Process., 2011, 59, (3), pp. 1202-1216
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 13
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Zheng, G., Choo, L.-C., Wong, K.-K.: 'Optimal cooperative jamming to enhance physical layer security using relays', IEEE Trans. Signal Process, 2011, 59, (3), pp. 1317-1322
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 14
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communications
    • Ding, Z., Leung, K.K., Goeckel, D.L., Towsley, D.: 'On the application of cooperative transmission to secrecy communications', IEEE J. Sel. Areas Commun., 2012, 30, (2), pp. 359-368
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 15
    • 84863359764 scopus 로고    scopus 로고
    • Robust secure transmission in MISO channels based on worst-case optimization
    • Huang, J., Swindlehurst, L.A.: 'Robust secure transmission in MISO channels based on worst-case optimization', IEEE Trans. Signal Process., 2012, 60, (4), pp. 1696-1702
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1696-1702
    • Huang, J.1    Swindlehurst, L.A.2
  • 16
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Krikidis, I., Thompson, J., McLaughlin, S.: 'Relay selection for secure cooperative networks with jamming', IEEE Trans. Wirel. Commun., 2009, 8, (10), pp. 5003-5011
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 17
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Chen, J., Zhang, R., Song, L., Han, Z., Jiao, B.: 'Joint relay and jammer selection for secure two-way relay networks', IEEE Trans. Inform. Forensics Sec., 2012, 7, (1), pp. 310-320
    • (2012) IEEE Trans. Inform. Forensics Sec. , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 18
    • 80054062591 scopus 로고    scopus 로고
    • Impact of imperfect channel state information on bi-directional communications with relay selection
    • Ding, Z., Leung, K.K.: 'Impact of imperfect channel state information on bi-directional communications with relay selection', IEEE Trans. Signal Process., 2011, 59, (11), pp. 5657-5662
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.11 , pp. 5657-5662
    • Ding, Z.1    Leung, K.K.2
  • 19
    • 70349682785 scopus 로고    scopus 로고
    • Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization
    • Pacific Grove, CA, October
    • Cumanan, K., Krishna, R., Sharma, V., Lambotharan, S.: 'Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization'. Proc. Asilomar Conf. Sign., Syst. and Comp., Pacific Grove, CA, October 2008, pp. 378-382
    • (2008) Proc. Asilomar Conf. Sign., Syst. and Comp. , pp. 378-382
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 21
    • 77951114748 scopus 로고    scopus 로고
    • Robust interference control techniques for cognitive radios using worst-case performance optimization
    • Auckland, New Zealand, December
    • Cumanan, K., Krishna, R., Sharma, V., Lambotharan, S.: 'Robust interference control techniques for cognitive radios using worst-case performance optimization'. Proc. ISITA 2008, Auckland, New Zealand, December 2008, pp. 1-5
    • (2008) Proc. ISITA 2008 , pp. 1-5
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 22
    • 67650663170 scopus 로고    scopus 로고
    • Energy-efficient multiuser SIMO: achieving probabilistic robustness with Gaussian channel uncertainty
    • Zheng, G., Wong, K.-K., Ng, T.-S.: 'Energy-efficient multiuser SIMO: achieving probabilistic robustness with Gaussian channel uncertainty', IEEE Trans. Commun., 2009, 57, (6), pp. 1866-1878
    • (2009) IEEE Trans. Commun. , vol.57 , Issue.6 , pp. 1866-1878
    • Zheng, G.1    Wong, K.-K.2    Ng, T.-S.3
  • 23
    • 70450284436 scopus 로고    scopus 로고
    • Robust cognitive beamforming with bounded channel uncertainties
    • Zheng, G., Wong, K.-K., Ottersten, B.: 'Robust cognitive beamforming with bounded channel uncertainties', IEEE Trans. Signal Process., 2009, 57, (12), pp. 4871-4881
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.12 , pp. 4871-4881
    • Zheng, G.1    Wong, K.-K.2    Ottersten, B.3
  • 24
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Li, Q., Ma, W.-K.: 'Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming', IEEE Trans. Signal Process., 2011, 59, (8), pp. 3799-3812
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 25
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Mukherjee, A., Swindlehurst, L.A.: 'Robust beamforming for security in MIMO wiretap channels with imperfect CSI', IEEE Trans. Signal Process., 2011, 59, (1), pp. 351-361
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, L.A.2
  • 26
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper
    • Cumanan, K., Ding, Z., Sharif, B., Tian, G., Leung, K.: 'Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper', IEEE Trans. Veh. Technol., 2013, 63, (4), pp. 1678-1690
    • (2013) IEEE Trans. Veh. Technol. , vol.63 , Issue.4 , pp. 1678-1690
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.4    Leung, K.5
  • 27
    • 84929359010 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
    • Chu, Z., Cumanan, K., Ding, Z., Johnston, M., Le Goff, S.: 'Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer', IEEE Trans. Veh. Technol. 2014, 59, (99), pp. 1-1, doi:10.1109/TVT.2014.2336092
    • (2014) IEEE Trans. Veh. Technol. , vol.59 , Issue.99 , pp. 1-1
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.5
  • 28
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Yue, J., Ma, C., Yu, H., Zhou, W.: 'Secrecy-based access control for device-to-device communication underlaying cellular networks', IEEE Commun. Lett., 2013, 17, pp. 2068-2071
    • (2013) IEEE Commun. Lett. , vol.17 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 30
    • 84907003865 scopus 로고    scopus 로고
    • Radio resource allocation for physical-layer security in D2D underlay communications
    • Sydney, Australia, June
    • Zhang, H., Wang, T., Song, L., Han, Z.: 'Radio resource allocation for physical-layer security in D2D underlay communications'. IEEE Int. Conf. Communications. (ICC), Sydney, Australia, June 2014, pp. 2325-2330
    • (2014) IEEE Int. Conf. Communications. (ICC) , pp. 2325-2330
    • Zhang, H.1    Wang, T.2    Song, L.3    Han, Z.4
  • 31
    • 84903282820 scopus 로고    scopus 로고
    • Outage constrained robust secure transmission for MISO wiretap channels
    • ArXiv preprint arXiv:1310.7158
    • Ma, S., Hong, M., Song, E., Wang, X., Sun, D.: 'Outage constrained robust secure transmission for MISO wiretap channels', ArXiv preprint arXiv:1310.7158, 2013
    • (2013)
    • Ma, S.1    Hong, M.2    Song, E.3    Wang, X.4    Sun, D.5
  • 32
    • 0004055894 scopus 로고    scopus 로고
    • Convex optimization
    • (Cambridge University Press, Cambridge, UK)
    • Boyd, S., Vandenberghe, L.: 'Convex optimization' (Cambridge University Press, Cambridge, UK, 2004)
    • (2004)
    • Boyd, S.1    Vandenberghe, L.2
  • 33
    • 80051624158 scopus 로고    scopus 로고
    • A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables
    • Bechar, I.: 'A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables', Available: http://arxiv.org/abs/0909.3595, 2009
    • (2009)
    • Bechar, I.1
  • 34
    • 84861322112 scopus 로고    scopus 로고
    • Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization
    • arXiv preprint arXiv:1108.0982
    • Wang, K.-Y., So, A.M.-C., Chang, T.-H., Ma, W.-K, Chi, C.-Y.: 'Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization', arXiv preprint arXiv:1108.0982, 2011
    • (2011)
    • Wang, K.-Y.1    So, A.M.-C.2    Chang, T.-H.3    Ma, W.-K.4    Chi, C.-Y.5
  • 35
    • 84890929385 scopus 로고    scopus 로고
    • A safe approximation approach to secrecy outage design for MIMO wiretap channels
    • Li, Q., Ma, W.-K., So, A.-C.: 'A safe approximation approach to secrecy outage design for MIMO wiretap channels', IEEE Signal Process. Lett., 2014, 21, pp. 118-121
    • (2014) IEEE Signal Process. Lett. , vol.21 , pp. 118-121
    • Li, Q.1    Ma, W.-K.2    So, A.-C.3
  • 36
    • 33744542350 scopus 로고    scopus 로고
    • Transmit beamforming for physical-layer multicasting
    • Sidiropoulos, N., Davidson, T., Luo, Z.-Q.: 'Transmit beamforming for physical-layer multicasting', IEEE Trans. Signal Process., 2006, 54, (6), pp. 2239-2251
    • (2006) IEEE Trans. Signal Process. , vol.54 , Issue.6 , pp. 2239-2251
    • Sidiropoulos, N.1    Davidson, T.2    Luo, Z.-Q.3
  • 37
    • 0003595806 scopus 로고
    • Linear matrix inequalities in system and control theory
    • (SIAM Studies in Applied Mathematics, Philadelphia, PA)
    • Boyd, S., Ghaoui, L.E., Feron, E., Balakrishnan, V.: 'Linear matrix inequalities in system and control theory' (SIAM Studies in Applied Mathematics, Philadelphia, PA, 1994)
    • (1994)
    • Boyd, S.1    Ghaoui, L.E.2    Feron, E.3    Balakrishnan, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.