Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers |
Liu, Xiaochen
(Collage of Communications Engineering, University of Army Engineering University of PLA)
Gao, Yuanyuan (Collage of Communications Engineering, University of Army Engineering University of PLA) Sha, Nan (Collage of Communications Engineering, University of Army Engineering University of PLA) Zang, Guozhen (Collage of Communications Engineering, University of Army Engineering University of PLA) Wang, Shijie (Collage of Communications Engineering, University of Army Engineering University of PLA) |
1 | I. Csiszar, and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978. DOI |
2 | J. Zhu, W. Xu, and N. Wang, "Secure Massive MIMO Systems With Limited RF Chains," IEEE Trans. Veh. Technol., vol. 66, no. 6, pp. 5455-5460, Jun. 2017. DOI |
3 | S. Shafiee, and S. Ulukus, "Achievable Rates in Gaussian MISO Channels with Secrecy Constraints," in Proc. of 2007 IEEE International Symposium on Information Theory, Nice, France, pp. 2466-2470, 2007. |
4 | J. Li, A. P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011. DOI |
5 | F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, "Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT," IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017. DOI |
6 | Wyner, and D. A., "The wire-tap channel," Bell Labs Tech., vol. 54, no. 8, pp. 1355-1387, Oct. 1975. DOI |
7 | G. J. Foschini, and M. J. Gans, "On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas," Wirel. Pers. Commun., vol. 6, no. 3, pp. 311-335, Mar. 1998. DOI |
8 | S. Goel, and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008. DOI |
9 | F. Oggier, and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. of 2008 IEEE International Symposium on Information Theory, pp. 524-528, 2008. |
10 | T. R. Dean, and A. J. Goldsmith, "Physical-Layer Cryptography Through Massive MIMO," in Proc. of 2013 IEEE Information Theory Workshop (ITW), pp. 1-5, 2013. |
11 | J. Wang, and D. P. Palomar, "Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge," IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3086-3100, Aug. 2009. DOI |
12 | L. Li, Z. Chen, and J. Fang, "Robust transmit design for secure AF relay networks based on worst-case optimization," in Proc. of 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, pp. 2719-2723, 2014. |
13 | Y. Huang, P. Zhang, Q. Wu, and J. Wang, "Secrecy performance of wireless powered communication networks with multiple eavesdroppers and outdated CSI," IEEE Access, vol. 6, pp. 33774-33788, 2018. DOI |
14 | S. G. Nash, "Linear and Nonlinear Programming," International Encyclopedia of the Social & Behavioral Sciences, vol. 67, no. 2, pp. 8868-8874, 2001. |
15 | S. Ma, M. Hong, E. Song, X. Wang, and D. Sun, "Outage Constrained Robust Secure Transmission for MISO Wiretap Channels," IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5558-5570, Oct. 2014. DOI |
16 | Q. Li, and W. K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011. DOI |
17 | J. Huang, and A. L. Swindlehurst, "Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012. DOI |
18 | X. Zhou, Z. Rezki, B. Alomair, and M. S. Alouini, "Achievable Rates of Secure Transmission in Gaussian MISO Channel with Imperfect Main Channel Estimation," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4470-4485, Jun. 2016. DOI |
19 | C. Shen, T. H. Chang, K. Y. Wang, Z. Qiu, and C. Y. Chi, "Distributed Robust Multicell Coordinated Beamforming With Imperfect CSI: An ADMM Approach," IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2988-3003, Jun. 2012. DOI |
20 | G. C. Alexandropoulos, and K. P. Peppas, "Secrecy outage analysis over correlated composite Nakagami-m Gamma fading channels," IEEE Commun. Lett., vol. 22, no. 1, pp. 77-80, Jan. 2017. DOI |
21 | D. W. K. Ng, E. S. Lo, and R. Schober, "Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014. DOI |
22 | G. G. Raleigh, and J. M. Cioffi, "Spatio-temporal coding for wireless communications," IEEE Trans. Commun., vol. 46, no. 3, pp. 357-366, Mar. 1998. DOI |
23 | L. El Ghaoui, and S. L. Niculescu, "Advances in linear matrix inequality methods in control: advances in design and control," Society for Industrial & Applied Mathematics Philadelphia Pa, 1999. |
24 | M. Grant and S. Boyd. (Mar. 2014). CVX: MATLAB Software for Disciplined Convex Programming, Version 2.1. [Online]. Available: http://cvxr.com/cvx |
25 | A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," J. Global Optim., vol. 47, no. 1,pp. 29-51, May 2010. DOI |
26 | C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech., vol. 28, no. 4, pp. 656-715, Oct. 1949. DOI |
27 | E. Telatar, "Capacity of Multi-antenna Gaussian Channels," Eur. Trans. Telecommun, vol. 10, no. 6, pp. 585-595, 1999. DOI |
28 | K. Cumanan, G. C. Alexandropoulos, Z. Ding, and G. K. Karagiannidis, "Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis," IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7495-7505, Aug. 2017. DOI |
29 | W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011. DOI |
30 | X. Zhou, and M. R. Mckay, "Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010. DOI |
31 | A. Khisti, and G. W. Wornell, "Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. DOI |
32 | Y. Liu, L. Li, G. Alexandropoulos, and M. Pesavento, "Securing relay networks with artificial noise: An error performance-based approach," Entropy, vol. 19, no. 8, pp. 384, Jul. 2017. DOI |
33 | J. Zhu, Y. Li, N. Wang, and W. Xu, "Wireless Information and Power Transfer in Secure Massive MIMO Downlink With Phase Noise," IEEE Wireless Commun. Lett., vol. 6, no. 3, pp. 298-301, Jun. 2017. DOI |
34 | Z. Chu, H. Xing, M. Johnston, and S. L. Goff, "Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283-297, Jan. 2016. DOI |
35 | Khisti, Wornell, and W. G., "Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010. DOI |
36 | Q. Li, Y. Zhang, J. Lin, and S. X. Wu, "Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI," IEEE Trans. Signal Process., vol. 65, no. 17, pp. 4684-4697, Sep. 2017. DOI |
37 | Y. Huang, Z. Li, F. Zhou, and R. Zhu, "Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model," IEEE Access, vol. 5, pp. 14011-14019, 2017. DOI |
![]() |