2017
DOI: 10.1109/tcomm.2016.2641949
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks

Abstract: We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends K confidential information signals to K legitimate users (Bobs) in the presence of L eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerability region" around each Bob, which can be exploited by a nearby Eve. We address this problem by augmenting Tx-based frien… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 42 publications
0
22
0
Order By: Relevance
“…Multiuser MISO networks with jamming [192] The total power for secrecy information and jamming signals Perfect CSI of all channels Target secrecy rate Numerical analyses based on a line search method A non-orthogonal multiple access system with multiple users [193] Decoding order, transmission rates, and power Instantaneous channel gains of all users and the average channel gain of the eavesdropper Target secrecy rate and secrecy outage probability A closed-form solution by problem simplification Traffic offloading via dual-connectivity in cellular networks [194] Data rate and transmission power Perfect CSI of legitimate channel and statistics CSI of eavesdropper Traffic demand and secrecy outage requirement Performing a series of equivalent transformations and proposing an efficient algorithm to compute the optimal offloading solution jointly optimized to minimize the outage probability for delaylimited secrecy information transmission based on the approaches of dual decomposition and alternating optimization. In [189], the minimum secrecy outage probability is achieved by optimizing the optimal placement of energy harvesting node with physical layer security considerations.…”
Section: A Closed-form Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiuser MISO networks with jamming [192] The total power for secrecy information and jamming signals Perfect CSI of all channels Target secrecy rate Numerical analyses based on a line search method A non-orthogonal multiple access system with multiple users [193] Decoding order, transmission rates, and power Instantaneous channel gains of all users and the average channel gain of the eavesdropper Target secrecy rate and secrecy outage probability A closed-form solution by problem simplification Traffic offloading via dual-connectivity in cellular networks [194] Data rate and transmission power Perfect CSI of legitimate channel and statistics CSI of eavesdropper Traffic demand and secrecy outage requirement Performing a series of equivalent transformations and proposing an efficient algorithm to compute the optimal offloading solution jointly optimized to minimize the outage probability for delaylimited secrecy information transmission based on the approaches of dual decomposition and alternating optimization. In [189], the minimum secrecy outage probability is achieved by optimizing the optimal placement of energy harvesting node with physical layer security considerations.…”
Section: A Closed-form Solutionmentioning
confidence: 99%
“…In a MISO system in [86], the optimal power allocation between transmitted information and AN is developed for minimizing the transmission power while ensuring a given probability of secrecy. In [192] where a multiuser MISO network with friendly jamming is considered, the power allocation strategy is optimized to minimize the total power allocated to the information signals and jamming signals while maintaining secure QoS requirements. A non-orthogonal multiple access system is considered in [193] where a closed-form solution is derived to minimize the transmission power.…”
Section: A Closed-form Solutionmentioning
confidence: 99%
“…The work in [20] considered a MIMO Gaussian wiretap channel with an FD jamming receiver to secure the DoF. The authors in [21] extended the prior work to a multiuser scenario, where the transmitter is equipped with multiple antennas to guarantee the individual SR for multiple users. However, these approaches require high hardware complexity of the receivers, which may be difficult to achieve in practice because the end devices should be of very low complexity.…”
Section: A Related Workmentioning
confidence: 99%
“…As a result, the CSI of Eves may change, and thus, FD-BS and UL users can only estimate Eves' channel statistics based on their last known CSI. In this section, we consider the case in which the FD-BS and UL users have perfect CSI of all legitimate users as explained in Section III, but only the statistics of CSI for Eves (i.e., the first-order and second-order statistics) [16], [21] as follows:H…”
Section: Secure Transmission Design With Scsi On Evesmentioning
confidence: 99%
“…The MIMO channels between the legitimate transmitter and the legitimate user as well as Eave are principally denoted by H and G (please note that our scheme undoubtedly satisfies H and G of sizes × and ̸ = ; however, we considered them as × (square) for more convenience), in a Down-link paradigm. For G, we experience imperfect knowledge (which degrades QoS): that is, G ≜ G 1 ± Γ (our scheme is not applicable for some other frameworks [25,26] in which, for example, the channel matrix is an arbitrary known matrix physically multiplied by a clear matrix [27, p. 4]). Now, regarding the threshold , for G we merely define the ellipsoidal uncertainty set Γ ≜ {Γ ∈ C × : ‖Γ‖ 2 ⩽ }.…”
Section: Problem Descriptionmentioning
confidence: 99%