2017
DOI: 10.1002/ett.3158
|View full text |Cite
|
Sign up to set email alerts
|

Secure massive MIMO‐enabled full‐duplex 2‐tier heterogeneous networks by exploiting in‐band wireless backhauls

Abstract: To enhance the spectrum efficiency and secrecy performance, by using in‐band full‐duplex (FD) wireless backhaul technique, a secure massive multiple input multiple output (MIMO)–enabled heterogeneous cellular network (HCN) model is presented, where the macro base stations (MBSs) are equipped with massive MIMO antenna array, whereas the small cell base stations (SBSs) and user equipment have the single antenna. The ultradense small cells underlay the macro cells and offload traffic from macro cells. With FD mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…To address cybersecurity and physical security issues, 47‐49 Cao et al 50p resented a topology‐aware cyber‐physical access control model (TA‐CPAC). The topology configuration and the model itself were formally modeled using bigraph language and bigraph reactive system (BRS), respectively.…”
Section: Related Workmentioning
confidence: 99%
“…To address cybersecurity and physical security issues, 47‐49 Cao et al 50p resented a topology‐aware cyber‐physical access control model (TA‐CPAC). The topology configuration and the model itself were formally modeled using bigraph language and bigraph reactive system (BRS), respectively.…”
Section: Related Workmentioning
confidence: 99%
“…The mapping decomposition {xx } → Q cited above fundamentally requires the constraint rank(Q) = 1 [28][29][30][31]. Inversely, Q being rank-1 unfavourably causes nonconvexity [29][30][31].…”
Section: Our Proposed Solutionmentioning
confidence: 99%
“…However, the scheme inevitably occupies an extra spectrum resource, thus having low spectrum efficiency. Therefore, sparked by this consideration, in some works, the idea of in‐band wireless backhaul was proposed, where the radio access network spectrum is shared by the backhaul link. Since the introduction of these seminal works, the in‐band wireless backhaul has greatly attracted the attention of researchers (see other works and the references therein).…”
Section: Introductionmentioning
confidence: 99%