2015 International Conference on Wireless Communications &Amp; Signal Processing (WCSP) 2015
DOI: 10.1109/wcsp.2015.7341300
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting full Duplex techniques for secure communication in SWIPT system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…The physical-layer (PHY) security technique that uses the inherent randomness of wireless channels is an efficient approach to improving the secrecy of wireless networks [20] establishes a FSK based swipt system powered by DC power supply for full duplex communication through shared channel. In [21], the end point node working in the fullduplex (FD) pattern in a single-input-single-output (SISO) SWIPT system, to obtain the highest security throughput of the system by a cooperative majorization of time switching (TS) coefficient, as well as codeword transmission rate, was studied. As an extension of [21], the authors of [22] investigated secrecy rate maximization (SRM), beamforming and null-space beamforming for secure communications in AF relay systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The physical-layer (PHY) security technique that uses the inherent randomness of wireless channels is an efficient approach to improving the secrecy of wireless networks [20] establishes a FSK based swipt system powered by DC power supply for full duplex communication through shared channel. In [21], the end point node working in the fullduplex (FD) pattern in a single-input-single-output (SISO) SWIPT system, to obtain the highest security throughput of the system by a cooperative majorization of time switching (TS) coefficient, as well as codeword transmission rate, was studied. As an extension of [21], the authors of [22] investigated secrecy rate maximization (SRM), beamforming and null-space beamforming for secure communications in AF relay systems.…”
Section: Related Workmentioning
confidence: 99%
“…In [21], the end point node working in the fullduplex (FD) pattern in a single-input-single-output (SISO) SWIPT system, to obtain the highest security throughput of the system by a cooperative majorization of time switching (TS) coefficient, as well as codeword transmission rate, was studied. As an extension of [21], the authors of [22] investigated secrecy rate maximization (SRM), beamforming and null-space beamforming for secure communications in AF relay systems. The authors of [23] a scheme by which the destination is able to assist cooperative jamming to maximize the confidentiality rate.…”
Section: Related Workmentioning
confidence: 99%
“…As in [27], this depends on the rectification process and the energy harvesting circuit. Here, we do not consider the noise power, which is much smaller than the power of the energy signal [28]. As in [29,30], we assume that the system works in the original architecture used by the collector.…”
Section: Full-duplex Dual-antenna Energy Harvestingmentioning
confidence: 99%
“…where η is the energy harvesting efficiency, 0 < η ≤ 1, which depends on the rectification process and the energy harvesting circuitry [15]. Here, the power of noise (including both the antenna noise and the rectifier noise) is not taken into consideration, since it is much smaller than that of energy signal [37]. The harvested energy at relay will be stored in a battery for information relaying in the next transmission block.…”
Section: A System Modelmentioning
confidence: 99%