2018
DOI: 10.1109/tvt.2017.2740282
|View full text |Cite
|
Sign up to set email alerts
|

Optimization for Maximizing Sum Secrecy Rate in MU-MISO SWIPT Systems

Abstract: In this paper, we consider the sum secrecy rate maximization problem in multiuser multiple-input single-output (MU-MISO) systems in the presence of multiple energy harvesters (EHs) which also have potential to wire-tap the information users (IUs). To facilitate delivering secure information to the IUs and increase the total harvested energy by the EHs simultaneously, we optimise the transmit beamforming vectors to direct the information signals toward the IUs and artificial noise (AN) toward the EHs. We assume… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…Without loss of generality, we assume that (22) is always feasible and focus on solving it. We use the exponential variable substitution method used in [32] and [33] to transform the logarithmic objective function of (22) into an equivalent linear function. By using the properties of logarithmic and exponential functions, the objective function of (22) can be expressed as log…”
Section: A Problem Formulationmentioning
confidence: 99%
“…Without loss of generality, we assume that (22) is always feasible and focus on solving it. We use the exponential variable substitution method used in [32] and [33] to transform the logarithmic objective function of (22) into an equivalent linear function. By using the properties of logarithmic and exponential functions, the objective function of (22) can be expressed as log…”
Section: A Problem Formulationmentioning
confidence: 99%
“…Our methods are compared to ZF method and SLNR method. The two methods are based on the schemes in [24] and [25], respectively, but the eavesdropping channels in these two methods are estimated in the same way as our VMD-SSRM method. The simulation parameters are set as shown in Table I, unless otherwise stated.…”
Section: Simulation and Analysismentioning
confidence: 99%
“…Si is still nonconvex, therefore, we use exponential variable substitution method [23], [32], [33] to convert min i R ′′…”
Section: A Information-untrusted Ehmentioning
confidence: 99%
“…Related Work: The concept of secure SWIPT has been studied for conventional MIMO/MISO systems in [20]- [23]. In [22], the authors proposed AN-aided SWIPT in a MISO system comprising a single IU and multiple untrusted EHs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation