2012
DOI: 10.1109/twc.2011.120911.111460
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security in Multibeam Satellite Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
77
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 171 publications
(77 citation statements)
references
References 26 publications
0
77
0
Order By: Relevance
“…In the seminal work of [26], Lei et al studied the security oriented beamforming and power control in a multibeam satellite communication in order to minimize the transmit power, while maintaining individual secrecy rate constraint. Subsequently, [27] proposed the optimal strategy design to improve the security of multibeam satellite communication, and the artificial noise was explored as an additional degree-of-freedom to protect against Eves. To circumvent the masking effect from the satellite to the terrestrial terminals, the authors of [28] investigated the secure transmission with the assistance of a relay for a hybrid satellite-terrestrial network.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…In the seminal work of [26], Lei et al studied the security oriented beamforming and power control in a multibeam satellite communication in order to minimize the transmit power, while maintaining individual secrecy rate constraint. Subsequently, [27] proposed the optimal strategy design to improve the security of multibeam satellite communication, and the artificial noise was explored as an additional degree-of-freedom to protect against Eves. To circumvent the masking effect from the satellite to the terrestrial terminals, the authors of [28] investigated the secure transmission with the assistance of a relay for a hybrid satellite-terrestrial network.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…In general, there are two classes of models to characterize imperfect CSI: the deterministic (worst-case) and stochastic uncertainty models. Taking the deterministic uncertainty model into account, a growing body of robust secure transmission for satellite communications has been studied in [26], [27], in which the CSI uncertainty is bounded by possible values. We note that the worst-case setting characterized by deterministic uncertainty model infrequently occurs and may not reflect practical channels accurately.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, they can only be solved by numerical methods with high complexity, such as in [29], [52]- [56]. To mitigate the computational cost, some low-complexity suboptimal algorithms have been proposed to simplify the beamforming designs [57], [58].…”
Section: B Secure Beamforming and Precodingmentioning
confidence: 99%
“…Noteworthily, several existing beamforming techniques which are simple but not optimal have been also adopted widely in different scenarios of secure communications, such as null-space beamforming (also named zero-forcing beamforming) [57]- [61] and maximum ratio transmission (MRT) beamforming [58], [62]- [64]. Null-space beamforming chooses the beamforming vector lying in the null space of the eavesdropper's channel vector.…”
Section: B Secure Beamforming and Precodingmentioning
confidence: 99%