메뉴 건너뛰기




Volumn 15, Issue 1, 2016, Pages 283-297

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers

Author keywords

convex optimization; MISO system; physical layer secrecy; robust optimization; secrecy capacity

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONVEX OPTIMIZATION; COVARIANCE MATRIX; NETWORK LAYERS; NUMERICAL METHODS; OPTIMIZATION;

EID: 84962184376     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2472405     Document Type: Article
Times cited : (125)

References (40)
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Jan. 1975
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun
    • Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.2    Shamai, S.3
  • 6
    • 80051779980 scopus 로고    scopus 로고
    • Secure communications over wireless broadcast networks: Stability and utility maximization
    • Sep
    • Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 682-692
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 7
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas II: The MIMOME wiretap channel
    • Nov
    • A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 8
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 9
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar
    • G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 10
    • 85027929481 scopus 로고    scopus 로고
    • Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting
    • Jun
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting," IEEE Trans. Wireless Commun., vol. 29, no. 10, pp. 2067-2076, Jun. 2011
    • (2011) IEEE Trans. Wireless Commun , vol.29 , Issue.10 , pp. 2067-2076
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 11
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communications
    • Feb
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012
    • (2012) IEEE J. Sel. Areas Commun , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 12
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 13
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
    • Mar
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 14
    • 84883395475 scopus 로고    scopus 로고
    • Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
    • May
    • Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013
    • (2013) IEEE Trans. Signal Process , vol.61 , Issue.10 , pp. 2704-2717
    • Li, Q.1    Ma, W.-K.2
  • 15
    • 84921405314 scopus 로고    scopus 로고
    • Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. Artificial fast fading
    • Jan
    • H.-M. Wang, T. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94-106, Jan. 2015
    • (2015) IEEE Trans. Wireless Commun , vol.14 , Issue.1 , pp. 94-106
    • Wang, H.-M.1    Zheng, T.2    Xia, X.-G.3
  • 16
    • 70349682785 scopus 로고    scopus 로고
    • Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization
    • Pacific Grove, CA, USA, Oct
    • K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization," in Proc. Asilomar Conf. Signals Syst. Comp., Pacific Grove, CA, USA, Oct. 2008, pp. 378-382
    • (2008) Proc. Asilomar Conf. Signals Syst. Comp , pp. 378-382
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 17
    • 67549134798 scopus 로고    scopus 로고
    • A robust beamforming based interference control technique and its performance for cognitive radios
    • Oct
    • K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. Int. Symp. Commun. Inf. Technol., Oct. 2008, pp. 9-13
    • (2008) Proc. Int. Symp. Commun. Inf. Technol , pp. 9-13
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 18
    • 77951114748 scopus 로고    scopus 로고
    • Robust interference control techniques for cognitive radios using worst-case performance optimization
    • Auckland, New Zealand, Dec
    • K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for cognitive radios using worst-case performance optimization," in Proc. Int. Symp. Inf. Theory Appl., Auckland, New Zealand, Dec. 2008, pp. 1-5
    • (2008) Proc. Int. Symp. Inf. Theory Appl , pp. 1-5
    • Cumanan, K.1    Krishna, R.2    Sharma, V.3    Lambotharan, S.4
  • 19
    • 67650663170 scopus 로고    scopus 로고
    • Energy-efficient multiuser SIMO: Achieving probabilistic robustness with Gaussian channel uncertainty
    • Jun
    • G. Zheng, K.-K. Wong, and T.-S. Ng, "Energy-efficient multiuser SIMO: Achieving probabilistic robustness with Gaussian channel uncertainty," IEEE Trans. Commun., vol. 57, no. 6, pp. 1866-1878, Jun. 2009
    • (2009) IEEE Trans. Commun , vol.57 , Issue.6 , pp. 1866-1878
    • Zheng, G.1    Wong, K.-K.2    Ng, T.-S.3
  • 20
    • 70450284436 scopus 로고    scopus 로고
    • Robust cognitive beamforming with bounded channel uncertainties
    • Dec
    • G. Zheng, K.-K. Wong, and B. Ottersten, "Robust cognitive beamforming with bounded channel uncertainties," IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4871-4881, Dec. 2009
    • (2009) IEEE Trans. Signal Process , vol.57 , Issue.12 , pp. 4871-4881
    • Zheng, G.1    Wong, K.-K.2    Ottersten, B.3
  • 21
    • 77951542370 scopus 로고    scopus 로고
    • Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels
    • Nov
    • L. Zhang, Y.-C. Liang, Y. Pei, and R. Zhang, "Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels," in Proc. IEEE GLOBECOM, Nov. 2009, pp. 1-5
    • (2009) Proc. IEEE GLOBECOM , pp. 1-5
    • Zhang, L.1    Liang, Y.-C.2    Pei, Y.3    Zhang, R.4
  • 22
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 23
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
    • May
    • K. Cumanan, Z. Ding, B. Sharif, G. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014
    • (2014) IEEE Trans. Veh. Technol , vol.63 , Issue.4 , pp. 1678-1690
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.4    Leung, K.5
  • 24
    • 84929359010 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
    • May
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015
    • (2015) IEEE Trans. Veh. Technol , vol.64 , Issue.5 , pp. 1833-1847
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.5
  • 25
    • 84962152700 scopus 로고    scopus 로고
    • To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying
    • H. Xing, K. Wong, Z. Chu, and A. Nallanathan. "To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying," IEEE Trans. Signal process., [Online]. Available: http://arxiv.org/abs/1502.07066
    • IEEE Trans. Signal Process
    • Xing, H.1    Wong, K.2    Chu, Z.3    Nallanathan, A.4
  • 26
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan
    • A. Mukherjee and L. A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011
    • (2011) IEEE Trans. Signal Process , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, L.A.2
  • 27
    • 84923886792 scopus 로고    scopus 로고
    • Robust outage secrecy rate optimizations for a MIMO secrecy channel
    • Feb
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Robust outage secrecy rate optimizations for a MIMO secrecy channel," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 86-89, Feb. 2015
    • (2015) IEEE Wireless Commun. Lett , vol.4 , Issue.1 , pp. 86-89
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Le Goff, S.5
  • 28
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr
    • S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.3
  • 32
    • 84907983591 scopus 로고    scopus 로고
    • Outage constrained robust secure transmission for MISO wiretap channels
    • Oct
    • S. Ma, M. Hong, E. Song, X. Wang, and D. Sun, "Outage constrained robust secure transmission for MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5558-5570, Oct. 2014
    • (2014) IEEE Trans. Wireless Commun , vol.13 , Issue.10 , pp. 5558-5570
    • Ma, S.1    Hong, M.2    Song, E.3    Wang, X.4    Sun, D.5
  • 35
    • 84908023928 scopus 로고    scopus 로고
    • Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization
    • Nov
    • K.-Y. Wang, A.-C. So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization," IEEE Trans. Signal Process., vol. 62, no. 21, pp. 5690-5705, Nov. 2014
    • (2014) IEEE Trans. Signal Process , vol.62 , Issue.21 , pp. 5690-5705
    • Wang, K.-Y.1    So, A.-C.2    Chang, T.-H.3    Ma, W.-K.4    Chi, C.-Y.5
  • 37
    • 30344443099 scopus 로고    scopus 로고
    • A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization
    • Jan
    • A. Pascual-Iserte, D. Palomar, A. Perez-Neira, andM. Lagunas, "A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization," IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346-360, Jan. 2006
    • (2006) IEEE Trans. Signal Process , vol.54 , Issue.1 , pp. 346-360
    • Pascual-Iserte, A.1    Palomar, D.2    Perez-Neira, A.3    Lagunas, M.4
  • 38
    • 70450200104 scopus 로고    scopus 로고
    • Strong duality for the CDT problem: A necessary and sufficient condition
    • Feb
    • W. Ai and S. Zhang, "Strong duality for the CDT problem: A necessary and sufficient condition," SIAM J. Optim., vol. 19, pp. 1735-1756, Feb. 2009
    • (2009) SIAM J. Optim , vol.19 , pp. 1735-1756
    • Ai, W.1    Zhang, S.2
  • 39
    • 11844289605 scopus 로고    scopus 로고
    • Robust mean-squared error estimation in the presence of model uncertainties
    • Jan
    • Y. Eldar, A. Ben-Tal, and A. Nemirovski, "Robust mean-squared error estimation in the presence of model uncertainties," IEEE Trans. Signal Process., vol. 53, no. 1, pp. 168-181, Jan. 2005
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.1 , pp. 168-181
    • Eldar, Y.1    Ben-Tal, A.2    Nemirovski, A.3
  • 40
    • 84916620311 scopus 로고    scopus 로고
    • Masked beamforming in the presence of energy-harvesting eavesdroppers
    • Jan
    • M. Khandaker and K. Wong, "Masked beamforming in the presence of energy-harvesting eavesdroppers," IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 40-54, Jan. 2015
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.1 , pp. 40-54
    • Khandaker, M.1    Wong, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.