ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9148705
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation for Secure Multi-User Downlink MISO-URLLC Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(34 citation statements)
references
References 23 publications
0
34
0
Order By: Relevance
“…Next, in order to determine these beamforming vectors, we use the monotonic polyblock optimization framework in [29]. Finally, since the computational complexity of the optimal scheme is high, we also propose a suboptimal iterative algorithm based on SDR and SCA to obtain the beamforming vectors [33]- [35].…”
Section: Mimo Wpt Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Next, in order to determine these beamforming vectors, we use the monotonic polyblock optimization framework in [29]. Finally, since the computational complexity of the optimal scheme is high, we also propose a suboptimal iterative algorithm based on SDR and SCA to obtain the beamforming vectors [33]- [35].…”
Section: Mimo Wpt Systemsmentioning
confidence: 99%
“…1) Optimal Solution: In the following, we obtain the optimal solution of non-convex problem ( 14) exploiting monotonic optimization [29]. To this end, similar to the monotonic polyblock optimization framework in [29], [33], we obtain the optimal solution of ( 14) by exploring the feasible set V of ( 14) determined by constraint w 2 2 = ν. First, we enclose V by constructing an initial polyblock B (1) with an initial set of vertices L (1) = ỹ(1)…”
Section: Mimo Wpt Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], the optimization of weighted throughput, subject to the constraints on total transmit power and bandwidth, was investigated for a secure URLLC system. In [5], a transmit L. Wei and B. Jiao are with the Department of Electronics, School of EECS, Peking University, Beijing 100871, China (e-mail: future1997@pku.edu.cn; jiaobl@pku.edu.cn).…”
Section: Introductionmentioning
confidence: 99%
“…These resource allocation schemes were developed without considering the crucial low latency requirement of URLLC users, which is realized by short packet transmissions (SPT). To fill this gap, [4] investigated a secure URLLC multiuser downlink setup with a single carrier with multiple eavesdroppers. Still, unfavorable channel conditions, such as multipath fading, blockage, and spatial correlation between BS-users and BSeavesdroppers channels, would severely affect QoS, energy efficiency, and security [4].…”
Section: Introductionmentioning
confidence: 99%