2016
DOI: 10.1186/s13638-016-0560-1
|View full text |Cite
|
Sign up to set email alerts
|

Robust beamforming and cooperative jamming for secure transmission in DF relay systems

Abstract: In this paper, we study robust joint beamforming and cooperative jamming (CJ) in a secure decode-and-forward (DF) relay system in the presence of multiple eavesdroppers, in which a multi-antenna DF relay employs transmit beamforming to help the source deliver information to the destination and simultaneously generates Gaussian artificial noise to confuse these eavesdroppers. We assume that all the channel state information (CSI) is imperfectly known at the relay subject to norm-bounded CSI errors. Our objectiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…By observing (16), it is easy to find that U(k, θ) is a decreasing function of θ and/or k. Particularly, U(k, θ) → 0 as k or θ →∞. Since the term I 2 in (13) is a non-negative linear combination of the decreasing function U(k, θ), it decreases with n or R s increasing by fixing the other arguments.…”
Section: Secrecy Outage Probabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…By observing (16), it is easy to find that U(k, θ) is a decreasing function of θ and/or k. Particularly, U(k, θ) → 0 as k or θ →∞. Since the term I 2 in (13) is a non-negative linear combination of the decreasing function U(k, θ), it decreases with n or R s increasing by fixing the other arguments.…”
Section: Secrecy Outage Probabilitymentioning
confidence: 99%
“…A great deal of research work addressed how to improve secrecy performance, some from the perspective of precoding and beamforming [7][8][9][10], some via the utilization of artificial noise or jamming [11][12][13][14], and some jointly applying these approaches [15][16][17][18]. Overall, the purpose of exploiting these techniques is to enlarge the capacity difference between main and eavesdropper channels.…”
Section: Introductionmentioning
confidence: 99%
“…Observe (25) and (11), we can also apply Algorithm 1 to solve the problem (25). Then, we can obtain the optimal jamming vector w J for a given P j .…”
Section: W R H Rd Schemementioning
confidence: 99%
“…., L so that the problem (12) will be operated L times. According to [25] and [36], the computational complexity of an inner level optimization (12) is O (N + 1) 0.5 (2(N + 1) 3 + 4(N + 1) 2 + 8) log(1/ ) in which is the accuracy of solving the SDP. Please note that in Algorithm 1, running L times of problem (12) is activated after τ min and τ max are determined.…”
Section: Computational Complexity Of the Optimal Schemementioning
confidence: 99%
See 1 more Smart Citation