Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 3656547, 11 pages
https://doi.org/10.1155/2017/3656547
Research Article

Asymptotic Bound of Secrecy Capacity for MIMOME-Based Transceivers: A Suboptimally Tractable Solution for Imperfect CSI

Freelance Scholar, Tehran 1634776616, Iran

Correspondence should be addressed to Makan Zamanipour; gro.eeei@5102.ruopinamaz.nakam

Received 28 July 2017; Accepted 8 November 2017; Published 14 December 2017

Academic Editor: Dane Quinn

Copyright © 2017 Makan Zamanipour. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Zhang, J. Du, J. Cheng, and V. C. M. Leung, “Resource allocation in SWIPT enabled heterogeneous cloud small cell networks with incomplete CSI,” in Proceedings of the 59th IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. B. Han, S. Zhao, B. Yang, H. Zhang, P. Chen, and F. Yang, “Historical PMI Based multi-user scheduling for FDD massive MIMO systems,” in Proceedings of the 83rd IEEE Vehicular Technology Conference, VTC Spring 2016, Nanjing, China, May 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Wang and H. Wu, “Jamming partner selection for maximising the worst D2D secrecy rate based on social trust,” Transactions on Emerging Telecommunications Technologies, vol. 28, no. 2, Article ID e2992, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Soderi, L. Mucchi, M. Hämäläinen, A. Piva, and J. Iinatti, “Physical layer security based on spread-spectrum watermarking and jamming receiver,” Transactions on Emerging Telecommunications Technologies, vol. 28, no. 7, Article ID e3142, 2016. View at Publisher · View at Google Scholar
  5. M. Zamanipour, “Probabilistic-based secrecy rate maximisation for MIMOME wiretap channels: Towards novel convexification procedures,” Transactions on Emerging Telecommunications Technologies, Article ID e3154, 2017. View at Publisher · View at Google Scholar · View at Scopus
  6. S.-H. Lee, W. Zhao, and A. Khisti, “Secure degrees of freedom of the Gaussian diamond-wiretap channel,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 63, no. 1, pp. 496–508, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. B. C. Akdeniz, B. Tepekule, A. E. Pusane, and T. Tuğcu, “Novel network coding approaches for diffusion-based molecular nanonetworks,” Transactions on Emerging Telecommunications Technologies, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Han, L. Sun, and Q. Du, “Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation,” in Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 15–18, Nanjing, China, May 2016. View at Publisher · View at Google Scholar
  9. F. Zhu, F. Gao, T. Zhang, K. Sun, and M. Yao, “Physical-layer security for full duplex communications with self-interference mitigation,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 329–340, 2016. View at Google Scholar
  10. H. Xing, K.-K. Wong, A. Nallanathan, and R. Zhang, “Wireless powered cooperative jamming for secrecy multi-AF relaying networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 12, pp. 7971–7984, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Zhang and Y. Liu, “energy harvesting for physical-layer security in OFDMA networks,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 154–162, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Zhang, Y. Liu, and R. Zhang, “artificial noise aided secrecy information and power transfer in OFDMA systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 3085–3096, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. Q. Li, W.-K. Ma, and D. Han, “Sum secrecy rate maximization for full-duplex two-way relay networks using Alamouti-based rank-two beamforming,” IEEE Journal of Selected Topics in Signal Processing, vol. PP, no. 99, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Siyari, M. Krunz, and D. N. Nguyen, “Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 601–614, 2017. View at Publisher · View at Google Scholar
  15. D. Wang, B. Bai, W. Chen, and Z. Han, “Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach,” IEEE Transactions on Communications, vol. 64, no. 5, pp. 1861–1874, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Garnaev and W. Trappe, “Bargaining over the fair trade-off between secrecy and throughput in OFDM communications,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 242–251, 2017. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Jafari Siavoshani, S. Mishra, C. Fragouli, and S. N. Diggavi, “Multi-party secret key agreement over state-dependent wireless broadcast channels,” IEEE Transactions on Information Forensics and Security, vol. PP, no. 99, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Deng, L. Fan, R. Zhao, and R. Q. Hu, “Secure communications in multiple amplify-and-forward relay networks with outdated channel state information,” Transactions on Emerging Telecommunications Technologies, vol. 27, no. 4, pp. 494–503, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. D. B. Da Costa, N. S. Ferdinand, U. S. Dias, R. T. De Sousa, and M. Latva-Aho, “Secrecy performance of MIMO Nakagami-m wiretap channels with optimal TAS and different antenna schemes,” Transactions on Emerging Telecommunications Technologies, vol. 27, no. 6, pp. 828–841, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Ding, T. Song, Y. Zou, and X. Chen, “Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection,” Transactions on Emerging Telecommunications Technologies, vol. 27, no. 7, pp. 982–991, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. T. Zhang, Y. Cai, Y. Huang, T. Q. Duong, and W. Yang, “Secure full-duplex spectrum-sharing wiretap networks with different antenna reception schemes,” IEEE Transactions on Communications, vol. 65, no. 1, pp. 335–346, 2017. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Bastani Parizi, E. Telatar, and N. Merhav, “Exact random coding secrecy exponents for the wiretap channel,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 63, no. 1, pp. 509–531, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. S. Gherekhloo, A. Chaaban, and A. Sezgin, “Expanded GDoF-optimality regime of treating interference as noise in the M × 2 X-channel,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 63, no. 1, pp. 355–376, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  24. Y. Zhao, X. Zou, Z. Lu, and Z. Liu, “Chaotic encrypted polar coding scheme for general wiretap channel,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Du, X. Chen, and L. Lei, “Energy-efficient optimisation for secrecy wireless information and power transfer in massive MIMO relaying systems,” IET Communications, vol. 11, no. 1, pp. 10–16, 2017. View at Publisher · View at Google Scholar · View at Scopus
  26. B. Akgun, O. O. Koyluoglu, and M. Krunz, “Exploiting full-duplex receivers for achieving secret communications in multiuser MISO networks,” IEEE Transactions on Communications, vol. 65, no. 2, pp. 956–968, 2017. View at Publisher · View at Google Scholar · View at Scopus
  27. M. Sadeghzadeh, H. R. Bahrami, and N. H. Tran, “Clustered linear precoding for downlink network MIMO systems with partial CSI,” Wireless Communications and Mobile Computing, vol. 16, no. 15, pp. 2340–2355, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Xie, X. Jia, M. Zhou, and L. Yang, “Secure massive MIMO-enabled full-duplex 2-tier heterogeneous networks by exploiting in-band wireless backhauls,” Transactions on Emerging Telecommunications Technologies, 2017. View at Publisher · View at Google Scholar · View at Scopus
  29. A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Secrecy rate beamforming for multicell networks with information and energy harvesting,” IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 677–689, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. F. S. Al-Qahtani, Y. Huang, S. Hessien, R. M. Radaydeh, C. Zhong, and H. Alnuweiri, “Secrecy analysis of MIMO wiretap channels with low-complexity receivers under imperfect channel estimation,” IEEE Transactions on Information Forensics and Security, vol. PP, no. 99, 2016. View at Publisher · View at Google Scholar · View at Scopus
  31. M. R. A. Khandaker, K.-K. Wong, Y. Zhang, and Z. Zheng, “Probabilistically robust SWIPT for secrecy MISOME systems,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 211–226, 2017. View at Publisher · View at Google Scholar · View at Scopus
  32. K.-Y. Wang, A. M. So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization,” IEEE Transactions on Signal Processing, vol. 62, no. 21, pp. 5690–5705, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  33. Z. Chu, Z. Zhu, and J. Hussein, “Robust optimization for AN-aided transmission and power splitting for secure MISO SWIPT system,” IEEE Communications Letters, vol. 20, no. 8, pp. 1571–1574, 2016. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Yang, Q. Li, Y. Cai, Y. Zou, L. Hanzo, and B. Champagne, “Joint secure AF relaying and artificial noise optimization: a penalized difference-of-convex programming framework,” IEEE Access, vol. 4, pp. 10076–10095, 2016. View at Publisher · View at Google Scholar · View at Scopus
  35. M. R. A. Khandaker and K.-K. Wong, “Robust secrecy beamforming with energy-harvesting eavesdroppers,” IEEE Wireless Communications Letters, vol. 4, no. 1, pp. 10–13, 2015. View at Publisher · View at Google Scholar · View at Scopus
  36. K. Petersen and M. Pedersen, The Matrix Cookbook, Technical University of Denmark, Kongens Lyngby, Denmark, 2012.
  37. Z. Chu, H. Xing, M. Johnston, and S. Le Goff, “Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 283–297, 2016. View at Publisher · View at Google Scholar · View at Scopus
  38. R. Horn and C. Johnson, Matrix Analysis, Cambridge University Press, New York, NY, USA, 2013. View at MathSciNet
  39. Y. Tan, Q. Li, C. Xu, Q. Zhang, and J. Qin, “Robust transceiver design in multiuser MIMO system with energy harvesting constraints,” Wireless Personal Communications, pp. 1–12, 2017. View at Publisher · View at Google Scholar · View at Scopus
  40. S. Wang and B. Wang, “Robust secure transmit design in MIMO channels with simultaneous wireless information and power transfer,” IEEE Signal Processing Letters, vol. 22, no. 11, pp. 2147–2151, 2015. View at Publisher · View at Google Scholar · View at Scopus
  41. H. Zhang, Y. Huang, C. Li, and L. Yang, “Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7807–7819, 2016. View at Publisher · View at Google Scholar · View at Scopus
  42. T. A. Le, Q. Vien, H. X. Nguyen, D. W. Ng, and R. Schober, “Robust chance-constrained optimization for power-efficient and secure SWIPT systems,” IEEE Transactions on Green Communications and Networking, vol. 1, no. 3, pp. 333–346, 2017. View at Publisher · View at Google Scholar
  43. I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products, 2015.