2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC) 2014
DOI: 10.1109/pimrc.2014.7136130
|View full text |Cite
|
Sign up to set email alerts
|

Creating secure wireless regions using configurable beamforming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…In our previous work [16], [17], beamforming is used to create an 'exposure region' (ER) to protect the transmission to the legitimate user. However, the ER in [16], [17] is not based on information-theoretic parameters and lacks the theoretical analysis. Alternatively, in this paper, the ER is defined by the physical region where any PPP distributed Eve causes secrecy outage to the legitimate transmission in a general channel model, i.e., Rician fading channel.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [16], [17], beamforming is used to create an 'exposure region' (ER) to protect the transmission to the legitimate user. However, the ER in [16], [17] is not based on information-theoretic parameters and lacks the theoretical analysis. Alternatively, in this paper, the ER is defined by the physical region where any PPP distributed Eve causes secrecy outage to the legitimate transmission in a general channel model, i.e., Rician fading channel.…”
Section: Introductionmentioning
confidence: 99%
“…In our previous work [16], [17], beamforming is used to create an 'exposure region' (ER) to protect the transmission to the legitimate user. However, the ER in [16], [17] is not based on information-theoretic parameters and lacks the theoretical analysis.…”
Section: Introductionmentioning
confidence: 99%