2017
DOI: 10.1109/tcomm.2017.2743208
|View full text |Cite
|
Sign up to set email alerts
|

Full-Duplex Cyber-Weapon With Massive Arrays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(30 citation statements)
references
References 29 publications
0
30
0
Order By: Relevance
“…Replacing (19) and (20) into (11), the OP of the considered HI-FD-MIMO relay system is derived as (12) in Theorem 1. The proof is complete.…”
Section: Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…Replacing (19) and (20) into (11), the OP of the considered HI-FD-MIMO relay system is derived as (12) in Theorem 1. The proof is complete.…”
Section: Theoremmentioning
confidence: 99%
“…Additionally, with the fast development of internet of things (IoT) and unmanned aerial vehicle (UAV) communication systems [7][8][9][10], FD can combine with many advanced techniques such as MIMO, nonorthogonal multiple access (NOMA) to enhance the performance of wireless systems. The combination of FD and MIMO techniques into wireless systems can significantly enhance the system capacity compared with traditional half-duplex (HD) or single-input single-output (SISO) systems [11][12][13]. However, using multiple radio frequency (RF) chains in MIMO systems causes difficulties in hardware deployment and signal processing, especially for small mobile users.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, the eavesdropper can take advantage on this knowledge to successfully decode the transmitted information from the base station in the downlink transmission. Therefore, protecting the training phases from exposing to the illegitimate side is crucial [14], where deploying AN in protecting downlink training phase of massive MIMO network is promising.…”
Section: Introductionmentioning
confidence: 99%
“…Alternatively, FD techniques were used in [12] to bridge the gap between the eavesdropper and legitimate receivers, but from the viewpoint of the adversary. Later, the results in [13] showed that when the legitimate user faces a FD attacker equipped with massive antennas, it is crucial to protect confidential message in the training phases for the legitimate transmitter. When the FD technology is deployed by the eavesdropper, using high power at the source does not enhance security of the protecting wireless communication.…”
Section: Introductionmentioning
confidence: 99%