메뉴 건너뛰기




Volumn 4, Issue 1, 2015, Pages 86-89

Robust outage secrecy rate optimizations for a MIMO secrecy channel

Author keywords

Bernstein type inequality; convex optimization; MIMO system; outage secrecy rate; physical layer secrecy

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONVEX OPTIMIZATION; COVARIANCE MATRIX; LOCAL AREA NETWORKS; MIMO SYSTEMS; NETWORK LAYERS; OPTIMIZATION; OUTAGES;

EID: 84923886792     PISSN: 21622337     EISSN: 21622345     Source Type: Journal    
DOI: 10.1109/LWC.2014.2374611     Document Type: Article
Times cited : (65)

References (15)
  • 1
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 2
    • 80051779980 scopus 로고    scopus 로고
    • Secure communications over wireless broadcast networks: Stability and utility maximization
    • Sep.
    • Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 682-692
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 3
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 4
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 5
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communication in MIMO relay networks
    • Oct.
    • J. Huang and L. A. Swindlehurst, "Cooperative jamming for secure communication in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, L.A.2
  • 6
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communications
    • Feb.
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 7
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
    • Mar.
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 8
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Jun.
    • L. Wang, M. Elkashlan, J. Huang, N. Tran, and T. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
    • (2014) IEEE Wireless Commun. Lett. , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Tran, N.4    Duong, T.5
  • 9
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb.
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5
  • 10
    • 67549134798 scopus 로고    scopus 로고
    • A robust beamforming based interference control technique and its performance for cognitive radios
    • K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. ISCIT, Oct. 2008, pp. 9-13.
    • Proc. ISCIT, Oct.2008 , pp. 9-13
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 11
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug.
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 12
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
    • May
    • K. Cumanan, Z. Ding, B. Sharif, G. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.4 , pp. 1678-1690
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.4    Leung, K.5
  • 13
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
    • to be published
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., 2014, to be published.
    • (2014) IEEE Trans. Veh. Technol.
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.5
  • 14
    • 0004055894 scopus 로고    scopus 로고
    • Cambridge. Cambridge, U.K.: Cambridge Univ. Press
    • S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge. Cambridge, U.K.: Cambridge Univ. Press, 2004.
    • (2004) Convex Optimization
    • Boyd, S.1    Vandenberghe, L.2
  • 15
    • 84923852477 scopus 로고    scopus 로고
    • A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables
    • [Online]. Available
    • I. Bechar, "A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables," in Proc. Statist. Theory, 2009, pp. 1-6. [Online]. Available: http://arxiv.org/abs/0909.3595
    • Proc. Statist. Theory, 2009 , pp. 1-6
    • Bechar, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.