2018
DOI: 10.1007/s11432-017-9399-6
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy energy efficiency optimization for AN-aided SWIPT system with power splitting receiver

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…For each random channel, the predefined convergence performance can be obtained with no more than 10 times. T 2 is the number of times to search ρ, which is related with M , here we let M = 10 [37]. Therefore, the upper bound of the computational complexity for the second level algorithm is O(T 1 T 2 ) = 100.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…For each random channel, the predefined convergence performance can be obtained with no more than 10 times. T 2 is the number of times to search ρ, which is related with M , here we let M = 10 [37]. Therefore, the upper bound of the computational complexity for the second level algorithm is O(T 1 T 2 ) = 100.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…The comparison of cryptography and PHY-security techniques is given in Table 2. From an information-theoretical viewpoint, the essence of PHY-security is to increase the capacity of the legitimate channel and to decrease the capacity of the eavesdropping channel simultaneously, and hence maximizes the secrecy rate [20][21][22]. Inspired by that, many effective physical layer security techniques have been proposed [23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…As mMTC scenarios generally have strict requirements of low latency, it is more valuable to analyze the instantaneous performance within a single grant-free time frame than to analyze the steady-state performance with consideration of backoff and retransmission procedures. Moreover, we optimize the energy efficiency (EE) and the access point coverage efficieny (APCE) of the GF-NOMA network via numerical method, which will be presented with the numerical results in Section V. The energy consumption is especially important for the system design of IoT because the user devices are required to sustain long battery life for the purpose of lower maintenance cost [26]. The APCE concerns the ability of an AP to support massive connectivity.…”
Section: Introductionmentioning
confidence: 99%