2014
DOI: 10.1109/lcomm.2014.2332172
|View full text |Cite
|
Sign up to set email alerts
|

On Transmission Secrecy Outage of a Multi-Antenna System With Randomly Located Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
88
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 91 publications
(88 citation statements)
references
References 13 publications
0
88
0
Order By: Relevance
“…The double summation of Bessel functions in (18) is intractable to analyze. In the following, A 0 will be further simplified.…”
Section: Closed-form Expression For the Upper Bound For Ssopmentioning
confidence: 99%
See 2 more Smart Citations
“…The double summation of Bessel functions in (18) is intractable to analyze. In the following, A 0 will be further simplified.…”
Section: Closed-form Expression For the Upper Bound For Ssopmentioning
confidence: 99%
“…3 to illustrate how to use the previous properties to simplify the summation of A 0 in (18). For N = 4, the table is extended to j = 8.…”
Section: Closed-form Expression For the Upper Bound For Ssopmentioning
confidence: 99%
See 1 more Smart Citation
“…The difficulty of researching the secrecy performance in such wireless networks is how to model the random locations distribution of nodes accurately. Fortunately, stochastic geometry has provided a powerful tool to address this difficulty and achieved great success in ad hoc networks [9,10], random cognitive radio networks [11,12], and largescale cellular networks [13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…In [13], the authors derived the secrecy outage probability in the scenario where a transmitter transmits confidential information to an intended receiver in the presence of PPP distributed eavesdroppers. In order to further enhance physical layer security of networks, the researchers exploited various signal processing technologies, e.g., beamforming [14], transmit antenna selection (TAS) [15], regularized channel inversion linear precoding [16], and artificial noise (AN) [17], and designed different transmission schemes, e.g., on-off transmission [18] and secrecy guard zone [19]. It is worth noting that [14,15] simultaneously considered the noncooperative and cooperative eavesdroppers cases and analyzed the secrecy performance under various network factors.…”
Section: Introductionmentioning
confidence: 99%