2014
DOI: 10.1109/lsp.2014.2316999
|View full text |Cite
|
Sign up to set email alerts
|

Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
53
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 69 publications
(54 citation statements)
references
References 21 publications
1
53
0
Order By: Relevance
“…In particular the utilization of a FD jammer reduces the need to external helpers, which are commonly used to degrade the reception capability of the eavesdropper via cooperative jamming [10], [11], without having to trust external nodes, or demanding additional resources. The studied system [9] is then extended to a setup where all nodes are equipped with multiple antennas [12], [13]. Moreover, extensions on the operation the FD Bob is introduced by considering a simultaneous information and jamming transmission, i.e., operating as a base station [14], and considering a FD jamming Bob that simultaneously relays information to a third node, i.e., operating as a jamming relay [15].…”
Section: Introductionmentioning
confidence: 99%
“…In particular the utilization of a FD jammer reduces the need to external helpers, which are commonly used to degrade the reception capability of the eavesdropper via cooperative jamming [10], [11], without having to trust external nodes, or demanding additional resources. The studied system [9] is then extended to a setup where all nodes are equipped with multiple antennas [12], [13]. Moreover, extensions on the operation the FD Bob is introduced by considering a simultaneous information and jamming transmission, i.e., operating as a base station [14], and considering a FD jamming Bob that simultaneously relays information to a third node, i.e., operating as a jamming relay [15].…”
Section: Introductionmentioning
confidence: 99%
“…On the one hand, secure resource allocation in FD communication systems has been widely investigated for various topologies, e.g., point-to-point (PtP) topology [11], [12], [15], [16], point-to-multipoint (PtMP) topology [14], and wireless relaying topology [4], [11], [17]. Two major optimization problems are considered in secure FD communication systems, namely, secrecy-capacity maximization [11], [12], [16], [17] and transmission-power minimization [14]. For example, using jamming signals by the legitimate receiver, the authors in [11] studied secrecy-capacity maximization in FD communication systems with a PtP topology.…”
Section: Introductionmentioning
confidence: 99%
“…Another promising approach is the FD technique . Instead of transmitting and receiving signals from separate times or frequencies as the currently used half‐duplex (HD) schemes, the FD techniques have the ability to transmit and receive signals on the same channel (frequency or slot) as stated in one study . Obviously, the FD transmission has the potential to further improve or even double the capacity of the conventional HD systems.…”
Section: Introductionmentioning
confidence: 99%
“…11 Instead of transmitting and receiving signals from separate times or frequencies as the currently used half-duplex (HD) schemes, the FD techniques have the ability to transmit and receive signals on the same channel (frequency or slot) as stated in one study. 12 Obviously, the FD transmission has the potential to further improve or even double the capacity of the conventional HD systems. In single-antenna (or small-scale MIMO) systems, the main hamper for the implementation of FD is from the overwhelming loop interference (LI) generated by the transmitter to its own collocated receiver.…”
Section: Introductionmentioning
confidence: 99%