2016
DOI: 10.1109/tvt.2015.2394370
|View full text |Cite
|
Sign up to set email alerts
|

Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications

Abstract: Considering worst-case channel uncertainties, we investigate the robust secure beamforming design problem in multiple-input-single-output full-duplex two-way secure communications. Our objective is to maximize worst-case sum secrecy rate under weak secrecy conditions and individual transmit power constraints. Since the objective function of the optimization problem includes both convex and concave terms, we propose to transform convex terms into linear terms. We decouple the problem into four optimization prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(56 citation statements)
references
References 23 publications
0
56
0
Order By: Relevance
“…If an optimal solution to (25) satisfies the rank-one constraints, the optimal solution to (25) is also an optimal solution to (23), which is verified in Appendix A. Since the inequality constraints in the optimization problem (25) are affine, the Slater's condition holds when the optimization problem (25) is feasible [38].…”
Section: B Optimal Joint Beamforming and An Vectors To Sitr-maximizamentioning
confidence: 78%
“…If an optimal solution to (25) satisfies the rank-one constraints, the optimal solution to (25) is also an optimal solution to (23), which is verified in Appendix A. Since the inequality constraints in the optimization problem (25) are affine, the Slater's condition holds when the optimization problem (25) is feasible [38].…”
Section: B Optimal Joint Beamforming and An Vectors To Sitr-maximizamentioning
confidence: 78%
“…On the other hand, when the Eve is completely passive, the BS and UT may know nothing about the CSI of the wiretap channels, implying thatH E andḡ E can take arbitrary values. We characterize the uncertainty associated with the CSI estimation and residual self-interference channel by the widely adopted deterministic uncertainty model [18], [19]. In this model, H L , ∆H E , and ∆g E are bounded by the sets ξ HL…”
Section: B Channel State Information Modelmentioning
confidence: 99%
“…and ) where W a,b = w a,b w H a,b and W b,a = w b,a w H b,a . Substituting (13)-(15) into the P-SRM problem, we obtain a simplified P-SRM (SP-SRM) problem (16)…”
Section: Hence the An Vectors Can Be Denoted Asmentioning
confidence: 99%
“…On the one hand, secure resource allocation in FD communication systems has been widely investigated for various topologies, e.g., point-to-point (PtP) topology [11], [12], [15], [16], point-to-multipoint (PtMP) topology [14], and wireless relaying topology [4], [11], [17]. Two major optimization problems are considered in secure FD communication systems, namely, secrecy-capacity maximization [11], [12], [16], [17] and transmission-power minimization [14]. For example, using jamming signals by the legitimate receiver, the authors in [11] studied secrecy-capacity maximization in FD communication systems with a PtP topology.…”
Section: Introductionmentioning
confidence: 99%