2000
DOI: 10.1109/4234.824754
|View full text |Cite
|
Sign up to set email alerts
|

Secure information transmission for mobile radio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
71
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 138 publications
(73 citation statements)
references
References 6 publications
1
71
0
1
Order By: Relevance
“…In this setup, both the IR and the ER are very close to the Tx, and thus their average SNRs are high. It thus follows from (19) that when SNRs for the IR and the ER are high enough, x = gp tends to be zero, and as a result, if the transmission is on, i.e.,p = 0, the optimal power splitting ratios to (P1.2) becomes α * (ν) ≈ 0.5, ∀ν. Last, we observe that the O-E trade-offs achieved by Fixed-ᾱ with other fixed values ofᾱ instead ofᾱ = 0.5 deviate more notably from that of the optimal solution.…”
Section: A Secrecy Outage-energy Trade-offmentioning
confidence: 99%
See 1 more Smart Citation
“…In this setup, both the IR and the ER are very close to the Tx, and thus their average SNRs are high. It thus follows from (19) that when SNRs for the IR and the ER are high enough, x = gp tends to be zero, and as a result, if the transmission is on, i.e.,p = 0, the optimal power splitting ratios to (P1.2) becomes α * (ν) ≈ 0.5, ∀ν. Last, we observe that the O-E trade-offs achieved by Fixed-ᾱ with other fixed values ofᾱ instead ofᾱ = 0.5 deviate more notably from that of the optimal solution.…”
Section: A Secrecy Outage-energy Trade-offmentioning
confidence: 99%
“…Hence, problem (P1.2) for all ν's can be solved according to (19). With both problems (P1.1) and (P1.2) solved, we can then iteratively solve the two problems to obtain a suboptimal solution for (P1).…”
Section: Proposition 42mentioning
confidence: 99%
“…Many schemes were proposed, leveraging the wireless channel properties to establish common information the eavesdropper cannot obtain, such as [11], [12], [13], [14], [15], [16], [17], [18], [19].…”
Section: Related Workmentioning
confidence: 99%
“…More recently, researchers have started to propose implementable solutions for n = 2 terminals. The first proposals assumed channel reciprocity between the two nodes and required a dynamic environment [13,7,32,8,17], or else risked compromising their security. A more recent one avoids these pitfalls but requires physical-layer changes and is specifically designed for OFDM [12].…”
Section: Introductionmentioning
confidence: 99%