更全的杂志信息网

Secure Beamforming Design for SWIPT in MISO Full-Duplex Systems

更新时间:2016-07-05

1 Introduction

Since the continuous operation of wireless devices is mostly constrained by the limited capacity of their power sources,radio frequency(RF)energy harvesting(EH)has been identified as a promising technique to power future wireless devices.Technically,RF signals that carry information can also be used as a vehicle for transporting energy at the same time.For this reason,the study of simultaneous wireless information and power transfer(SWIPT)has attracted huge interest from industrial and academic communities[1][7].Effectively,wireless data and energy access can be made available to mobile users through the application of SWIPT,which in turn gives mobile users great convenience.SWIPT technology has been practically deployed in wireless communication networks.For example,[8]considered the practical deployment of SWIPT in a wireless sensor network mounted at a remote and difficult to access location,and powered only by a battery with limited operation time.Recharging or replacing the battery may be inconvenient,and often attract huge cost.Consequently,electromagnetic energy emanating from numerous radio and television broadcasting in the environment may serve as an opportunistic as well as greener alternative for harvesting energy to power such devices.

SWIPT was first introduced in[9]to describe the trade off between the rates at which energy and dependable information is transmitted over a noisy channel and thus,a capacity energy function was proposed.A key assumption in[9]was the possibility of the receiver capable of simultaneously decoding information and harvesting energy from the same received signal.However,this assumption does not hold in practice as practical circuits for harvesting energy from the received signal are notable to decode information directly.Consequently,to facilitate wireless information and power transfer at the receiver,the work done in[10]proposed two practical receiver architecture designs for SWIPT,namely time switching(TS)and power splitting(PS).Specifically,in the TS design architecture,the receiver switches over time to achieve information decoding and energy harvesting,while with PS,the receiver splits the receive signal into two streams of different power in order to decode information and harvest energy separately.It was shown in[10]that PS generally achieves better performance than TS as the TS receiver architecture scheme,in general,can be regarded as a special form of PS with only a binary split power ratio.In this paper,we focus on the PS design architecture.

Conventionally,half-duplex(HD)communication modes,in which the transmission and reception of radio signals occur over orthogonal time or frequency resources in order to avoid crosstalk,have been employed for wireless communications.Recent advances,however,suggest full-duplex(FD)communications that allow simultaneous transmission and reception of signals over the same radio channel in order to maximally use the limited available spectral resource[11],[12].The key challenge to achieve FD communications is the presence of self-interference(SI).Thus,for wireless communication systems to communicate in FD mode,the generated SI must be significantly suppressed,if not can celled completely,to receiver’s noise floor[13].Digital SI cancellation(SIC)for FD wireless systems was studied in[14].Authors in[14]demonstrated the possibility of achieving SIC of 70 dB and 76 dB for antenna separation and digital cancellation at 20 cm and 40 cm spacing,respectively,between interfering antennas.It suffices to say therefore that radios can work in FD if SI can be significantly suppressed.Interestingly,the study of FD systems brings a new opportunity for SWIPT in FD systems[1],[7].In particular,authors in[1]investigated the end-to-end sum-rate maximization approach for SWIPT in FD system while maintaining the energy harvesting threshold at each node by optimizing the receive power splitter and transmit power at each node.In contrast,[7]investigated the joint optimization of the transmit power at the source nodes and the two way relay beamforming matrix for SWIPT with a FD MIMO amplify and forward(AF)relay employing PS,where the achievable sum-rate is maximized subject to energy harvesting and individual power constraints.

Wireless communication networks are susceptible to eavesdropping;however,SWIPT systems are more susceptible to eavesdropping due to the inherent characteristics of SWIPT and the open nature of wireless channel.The security issue in SWIPT systems is therefore a critical issue that needs to be addressed.Existing works on communication security have adopted the cryptographic technique.Although this technique may guarantee communication security to some degree in the application layer,the suitability of these technique on SWIPT systems is not guaranteed since it requires complex encryption/decryption algorithms and key distribution[15].Alternatively, physical-layer(PHY)security has been identified to perfectly guarantee secure wireless information transmission against eavesdropping by using the physical properties of wireless channels such as fading and interference[16],[17].In this context,artificial noise(AN),injected into the transmitted signal,is used to confuse the eavesdropper[18].

自我国高校扩招政策实施以来,我国多数高校录取的学生数量不断上升,学生的学习水平以及能力之间的差异十分明显,虽然部分大学生出现学业不良问题是由其自身因素造成,但也有很多学生是由于一些外部原因的影响。近年来,国内高校出现退学、留级、无法毕业、未被授学位等情况比比皆是,这引起了人们对高校教育的深入思考,也有不少研究者对学业不良大学生的成因进行了深入分析,但在实践的教育中,还需要进一步的改善,以促进我国高校教育的教学质量得到进一步提升。笔者综合自己的教育经验以及相关研究者的文献研究,对学业不良大学生的成因及教育转化策略进行探讨,希望为我国高校教育质量的提升尽绵薄之力。

The fundamental study of the integration of PHY security and SWIPT was first considered in[15].In particular,authors in[15]investigated the joint design of the beamforming vectors and power allocation to maximize the secrecy rate or the total harvested energy under a multi-user multiple-input single-output(MISO)SWIPT scenario.The work done in[19]proposed a robust secure transmission scheme which mini mises the total transmit power in a multi-user MISO SWIPT system.In contrast,authors in[20]and[21]extended the study of PHY security into a multiple-input multiple output(MIMO)broadcast SWIPT system.To maximise the secrecy rate in a MIMO SWIPT scenario,[20]investigated the secure transceiver beamforming design while ensuring efficient energy harvesting.On the other hand,authors in[21]considered the harvested energy maximization approach subject to secure information transmission by designing the transmit covariance.

We first proceed by solving problem(23)to determine the optimal value of andThe optimal receivercan be defined as the Wiener filter[28]

▲Figure1.An FDM ISO SW IPT system.

We denote scalars by non bold letters and boldface lowercase letters are used to represent vectors,while boldface uppercase letters are used for matrices.For a square matrix A,Tr(A),Rank(A),A T and A H denote its trace,rank,transpose and conjugate transpose,respectively,while means that A is a positive semidefinite matrix.Also,I n denotes an n×n identity matrix,‖∙‖returns the Euclidean norm.The distribution of a circularly symmetric complex Gaussian(CSCG)random vector with mean μ and covariance matrix C is denoted by (μ,C).Finally,ℂm×n denotes the space of m×n complex matrices.

2 System Model and Problem Statement

2.1 System Model

In this paper,we consider the end-to-end transmit power minimization approach for secure SWIPT in a MISO FD system where the BS simultaneously transmits K independent confidential messages to K dual-antenna(one for transmission,one for reception)receivers in the downlink,in the presence of L external single-antenna eavesdroppers,and receives information in the uplink in FD mode.In addition to the external eavesdroppers,each receiver attempts to eavesdrop messages intended for other receivers.Hence we call them potential eavesdroppers.To ensure secure information transmission,AN is superimposed to the transmitted signal to confuse these potential as well as the external eavesdroppers.We denote the number of transmit and receive antennas at the BS,respectively,as Nt and Nr,and each MS uses an identical pair of transmitter and receiver antennas for signal transmission and reception.In the downlink transmission,the BS performs transmit beamforming to send information to the receivers while the MSs,using the harvested energy from the received signal,send feedback to the BS in the uplink with transmit power P up,k,k=1,...,K.Therefore,the complex baseband signal transmitted at the BS is expressed as

s.t.

where sk(0,1)denotes the confidential message intended for the k th receiver,a k ∈ ℂNt×1 denotes the corresponding precoding vector.b ∈ ℂNt×1 is the AN vector modelled as b ~(0,V),where V=bb H denotes the covariance matrix of b.For convenience,we use ={1,...,K},ℒ={1,...,L}andℳk={1,...,k1,k+1,...,K}to denote the index set of receivers,external eavesdroppers,and receivers except the k th receiver,respectively.The received signal at the k th receiver and l th external eavesdropper can be expressed as

其中Pi表示并购方选择现金支付的概率。β0表示常数项,β1,β2,…,β8为回归系数。xip(p=1,2,…,8)为解释变量。表1描述了各解释变量的含义。

where andrepresent the channel vectors from the BS to the k th receiver,and from the BS to the l th external eavesdropper,respectively,and mk denotes the information bearing symbol transmitted by MS k.The antenna noises at the k th receiver and the l th external eavesdropper are modelled asandWe assume each receiver adopts the PS scheme to coordinate the process of information decoding and energy harvesting.Specifically,aρportion of the received signal power is split to the information decoder(ID)while the remaining(1−ρ)portion is split to the EH.Accordingly,the signal split to the ID of MS k isgiven by

我八岁的时候,我父亲就去世了,我母亲一个人带大我们哥俩。我们在内蒙古偏远的地方带大,我在北京没有一个亲戚,我没有因为自己的工作送过一回礼,我不也走到了今天吗?我知道社会上有很多不良的现象,我告诉你,信那些该信的东西,因为它能改变你。因为如果你要信那些你没法不愤怒的事情,它只能害了你。

wheredenotes the additional processing noise introduced by the ID of the k th receiver.Consequently,the signal to interference plus noise ratio(SINR)at the ID of the k th receiver can be expressed as

Then,the energy harvesting rate(i.e.,power)at the k th EH can be expressed as[22]

where ηk is the energy conversion efficiency which for notational simplicity is assumed to be unity throughout this paper.

where h ul is the channel vector from the MS to the transmit antennas at the BSand n BS denotes the additive white Gaussian noise(AWGN)vector at the BS modelled asTo equalize the uplink signal from MS,we assume k that the BS applies a receive beamformer w k expressed as given in[24]

3.在旅游经济的管理过程中,企业必须树立融合意识,构建整合体系。旅游产品既要有个性,又需要有独立化的美学表达,同时需要将旅游政策、产业特色、配套设施等进行融合,整合管理体系,这样才能让该体系的价值实现最大化,特别是要结合智能化的时代特点,打造智慧管理模式。

In this work,we consider the case where each MS k is characterised by strict quality of service(QoS)requirement.In particular,to ensure a continuous information transfer,the QoS constraints require that the SINR of the downlink channel at all times should be above a given threshold denoted by.Furthermore,it is required that the harvested energy by each MSmustbe above a certain useful level specified by a prescribed threshold denoted by Qk,∀k.In addition,for the uplink channel,we also assume that each MS is expected to send feedback to the BS and a strict QoS is required such that the SINR of the uplink channel is expected to be higher than a given threshold denoted as

As in[22],we also assume that the legitimate receivers themselves may attempt to overhear the signals transmitted to other receivers and we want to guarantee secrecy against any such attempt.As such,we denote the received SINR which corresponds to the signal transmitted for the k th receiver at the m th potential eavesdropper and the l th external eavesdropper as

and

In this work,the communication security is considered from the viewpoint of individual security[25],[26].Consequently,the achievable individual secrecy rate at the k th receiver is given as[22]

节水增粮行动项目的建设实施均利用取水工程取用地表水或地下水,为促进水资源的高效利用和有效保护,需切实加强取水许可管理。项目法人或建设管理机构应在水资源论证报告书审批通过后,按《取水许可管理和水资源费征收管理条例》《取水许可管理办法》规定,依法向县级水行政主管部门提出取水许可申请,由具有管理权限的水行政主管部门审批,并按有关规定办理取水许可手续。节水灌溉设施建成运行后,取水许可审批机关依法对其取水行为进行监督管理。

where[x]+=max(0,x).

2.2 Modelling the SI

Due to the insufficient knowledge of the SI channel,it is impossible to completely eliminate residual SI(RSI).For this reason,we consider a deterministic model for imperfect SI channels.In particular,the actual SI channels h SI,k and H SI,BS are assumed to respectively lie in the neighbourhood of the estimated channels ĥSI,k and ĤSI,BS that are available at the corresponding nodes.Therefore,the actual channels due to imperfect channel estimates can be modelled as

Then,by defining andproblem(24)can be equivalently rewritten as

where△h SI,k and△H SI,BS represent the channel uncertainties assumed to be bounded as

for some ϵ12≥0.It is worth noting that the bounding values{ϵk} are dependent on the accuracy of the CSI estimates.Consequently,to efficiently define the worst case SI level,we modify(14a)and(14b)using the triangle inequality and the Cauchy Schwarz inequality,respectively[27].It follows from(14a)and(14b)that

Note that in the absence of statistical information about the error,we useϵk to represent the minimal knowledge of the upper bound of the channel error which is sufficient enough to describe the error.Thus from(16a)and(16b),we obtain

教师在实验教学时将学生分为4组,每组2人,每组学生独立进行实验,获得的数据作为平行实验数据共享。教师发放给学生两张指导单,第一张为实验过程指导单(表1),第二张为实验数据处理指导单(表2),学生根据指导单分小组独立进行实验。学生是高二年级,实验时间为1节课85min。

In addition,it holds that

Here,we assume,in general,that implies that the error is sufficiently small relative to the estimate or the estimate is not meaningful.Consequently,

2.3 Problem Statement

Therefore,the SINR at the BS for the k th user’s signal can be written as[24]

FD communication is feasible subject to the effective cancellation of SI.As an increase in transmit power causes a corresponding increase in the SI,it is important for communication nodes to transmit at optimality.To this end,our aim is to minimize the total transmit power while maintaining the achievable secrecy rate and energy harvesting constraints at each receiver as well as the nonzero uplink and downlink SINR( γUL>0;γDL>0).We achieve this by jointly designing the transmit beamforming vector(a)at the BS,the AN covariance(V),the uplink transmit power(P up,k)and the receive PS ratio( ρk)at MS k,k=1,...,K.Thus we formulate the optimization problem as

where Rk and Qˉk,respectively,denote the required secrecy rate and the energy harvesting constraints at each receiver.Problem(20)can explicitly be written as given in(21).Problem(21)is a non-convex problem due to the coupled optimization variables in the constraints,and hence it is very difficult to solve in closed form.Thus,we solve(21)in an alternating manner.

It is worth noting that the upper bound of the SI at the BS and the MS k is obtained when the source node transmits at maximum available power[24],i.e.,.Consequently,we denote the upper bounds of the SI power at the BS and MS k as Eˉand Gˉ,respectively.Thus,the optimization problem in(21)can be upper bounded as given in(22).

To solve problem(22),first we observe that the QoS uplink constraint does not have the PS coefficient and this is because the BS does not need to harvest energy.As a consequence,problem(22)can be decomposed into two subproblems given in(23)and(24),

with the energy harvesting constraints.

Note that problem(23)corresponds to optimizing the variables involved in the uplink while problem(24)corresponds to those in the downlink.We then apply semidefinite relaxation(SDR)to the subproblems as discussed below.

Upon investigation,the optimal is the minimum P up,k which satisfies(26b)to equality.Consequently,optimalis given by

3 Proposed Solution

Clearly,even with the fixed set of,problem(22)is non-convex.As a result of the possibility of decomposing problem(22)into two subproblems,namely,problems(23)and(24),we will solve problem(23)analytically and use SDR technique to solve(24).

In contrast to existing works,this paper considers the novel integration of SWIPT,FD technology and PHY security.In particular,this paper extends the secure HD MISO SWIPT communication scenario in[22]to the FD case,where the harvested energy at the MSs is utilized to send feedback information to the BS.We aim to minimize the end-to-end transmit power for SWIPT in FDMISO systems(Fig.1)while satisfying the secrecy rate at each MSs,and the QoS requirements for each MS by optimizing jointly the receive PS ratio and the transmit power at the MSs,the beamforming matrix at the BS,and the AN covariance matrix.Specifically,we assume perfect CSI,which is accomplished from fine estimation by transmitting dedicated training symbols at the receiver,for the uplink and downlink channels for the MISO SWIPT system.In contrast,loop channels are assumed to be imperfect due to the fact that the distribution of SI channels are unknown.Also,SI channel measurement results obtained in[23]indicate that the SI channel has a multi path nature.Specifically,it was shown in[23]that multiple paths arising from SI channel measurements are known to have higher power relative to the line-of-sight(LOS)path.Consequently,there is the need to suppress SI with multiple path nature,through the use of an adaptive cancellation technique whose measurement can be used to cancel both the LOS path and the delayed version of the same,which is not the objective to be achieved in this work.Nonetheless,for convenience,SI channels can be modelled as Gaussian channels[7].Accordingly,due to insufficient knowledge of the SI channel,a deterministic model for channel uncertainties is considered,where the magnitude of the estimation error as well as the SI power is bounded.Since the problem is non-convex,we propose an alternating optimization approach.

Forgiven,the problem(23)can be reformulated as

反观摩拜、OFO这些所谓的“共享”单车平台,前期投入大量的资本,储备大量的单车。后期大量的单车由于使用不恰当或是乱停放,造成资源的浪费,造成了非常不好的社会影响。

响应面法可通过建立连续变量曲面模型,对影响生物过程的因子及其交互作用进行评价,最终确定各因素的最优水平取值[14]。近年来,响应面法逐渐被用于中药提取条件的优化中。美国MathWorks公司发布的MATLAB遗传算法与直接搜索工具箱(GADS)是一系列函数的集合,可让用户在响应面法结果的基础上同时使用遗传算法[15-16]和直接搜索算法[17]来求解各种优化问题。

2)对提出的问题进行分析并提出假设,制订学习计划和安排,成立学习小组,通过分工合作,搜集与问题相关的新信息,接着对信息进行分析、评价和整合,总结出解决方案;

Note that problem(28)is still non-convex due to the non-convex rank-one constraints and the coupled optimization variables A k andρk.Applying SDR technique,after dropping the rank-one constraint,problem(28)can be reformulated into the following problem:

加强对河道的清淤疏浚施工工作,让河道充分发挥其重要功能。重要作用。因此要加强对清淤疏浚技术的研究,对有关问题进行有效控制,保证各项生产活动顺利完成。在具体的工作中,应做好准备工作,掌握现场的实际情况,落实施工准备工作。还应做好安全生产工作,建立健全安全生产责任制,采取有效的安全防范措施,严格执行各项安全管理制度。有关部门负责人按照相关规定,组织人员进行河道清淤疏浚工作,保证河道顺通无阻,发挥河道在生产生活活动中的积极作用,促进经济建设事业不断发展壮大,提高人们的生活水平。

Clearly,from(29),both and 1/(1ρk)are convex functions overρk,so that problem(29)is convex and can be solved using a disciplined convex programming toolbox such as CVX[29].Now,let,∀k denotes the optimal solution to problem(29).If each is rank-one,it follows that the optimal solution of problem(24)can be obtained through eigenvalue decomposition of.Interestingly,as shown in Proposition 1,problem(24)always yields rank-one optimal solutions for.

Proposition 1:There always exists an optimal solutionfor problem(29)such that rank

To summarise,Proposition 1 implies that the relaxation is tight,and thus the globally optimal solution of problem(24)can be obtained.SWIPT in MISO FD system versus the harvested power threshold for given values of the uplink and downlink SINR.As can be observed,as the harvested power threshold increases,the secrecy sum rate increases.Technically,an increase in the harvested power allows more power to be directed to the ER of each MS,thus less power for SI,which invariably increases the secrecy sum-rate.

In Fig.4,the achievable secrecy sum-rate for secure

4 Numerical Exam p les

In this section,numerical examples are provided.In particular,the performance of the proposed joint beamforming design(Joint Opt in Fig.2)for secure SWIPT in MISO FD systems is evaluated through simulations.We simulate a flat Rayleigh fading environment in which the channel fading coefficients are characterized as complex Gaussian numbers with zero mean and are independent and identically distributed,and we assume there are K=2 MSs and all MSs have the same set of parameters,i.e., and yE=15 dB.We also assume that 70%of the SI power has been cancelled using existing SI cancellation techniques[14].All simulations are averaged over 1000 independent channel realizations.

In Fig.2,we investigate the achievable secrecy sum-rate for secure SWIPT in MISO FD system versus the uplink SINR target for all MSs for fixed values of the downlink SINR(γDL=5 dB),the harvested power threshold,and the eavesdropper’s SINR(yE=15 dB).Fig.2 shows the performance comparison between the joint optimization and the fixedρoptimization.As can be observed,an increase in the uplink SINR corresponds to a decrease in the secrecy sum-rate due to increase in transmission power which invariably increases the generated SI.However,the joint optimization scheme outperforms the fixed ρ optimization.Also,as the harvested power threshold increases,the secrecy sum-rate decreases,but the joint optimization scheme outperforms the fixed ρoptimization scheme.

▲Figure2.Secrecy sum-rate versus SINR γUL.

▲Figure3.Secrecy sum-rate versus harvested power.

▲Figure4.Secrecy sum-rateversus RSI.

In Fig.3,we further investigate the achievable secrecy sum-rate for secure SWIPT in MISO FD system versus the residual SI is investigated.In particular,we investigate the performance comparison of the proposed system for both joint optimization,and optimization with a fixedρ.Clearly,an increase in the RSI results in a corresponding decrease in the achievable secrecy rate.However,the joint optimization scheme outperforms the optimization scheme with fixed ρ.Thus,a need for joint optimization is justified.

1.2.1 引物设计与限制性内切酶选择 引物设计见表1。根据NCBI中gene数据库提供的人LncRNA-GHET1(NR-130107.1)的序列,应用 oligo6软件查找基因中存在的酶切位点,结合pcDNA3.1(-)上的酶切位点,选择限制性内切酶XHoⅠ与BamHⅠ。

5 Conclusions

In this paper,we investigated the secure beamforming design for SWIPT in MISO FD system.To reduce SI and achieve secure FD transmission,the end-to-end sum transmit power has been minimized subject to the given SINR and harvested power constraints for each MS.In particular,to achieve optimal system performance,using SDR technique,we jointly optimized the transmit beamforming vector at the BS,and the received PS ratio and the transmit power at the MSs,and the AN covariance matrix.We show the need for joint optimization of system parameters through the numerical results.

空气、物体表面、医护人员手、消毒剂依据《医院消毒卫生标准GB15982-2012》,压力蒸汽灭菌器依据《医疗机构消毒技术规范W367-2012》,污水依据《医疗机构水污染物排放标准GB18466-2005》,一次性医疗用品依据《一次性使用医疗用品卫生标准GB15980-1995》。

References

[1]A.A.Okandeji,M.R.A.Khandaker,and K K.Wong,“Wireless information and power transfer in full-duplex communication systems,”in Proc.IEEE International Conference on Communications,Kuala Lumpur,Malaysia,2016.doi:10.1109/ICC.2016.7511169.

[2]A.A.Okandeji,M.R.A.Khandaker,and KK.Wong,“Two way relay beamforming optimization for full-duplex SWIPT systems,”in Proc.24th European Signal Processing Conference,Budapest,Hungary,2016.doi:10.1109/EUSIPCO.2016.7760674.

[3]J.Liao,M.R.A.Khandaker,and K.K.Wong,“Robust power splitting SWIPT beam forming for broadcast channels,”IEEE Communications Letters,vol.20,no.1,pp.181184,2016.doi:10.1109/LCOMM.2015.2498928.

[4]M.R.A.Khandaker and K.K.Wong,“SWIPT in MISOmulticasting systems,”IEEE Wireless Communications Letters,vol.3,no.3,pp.277280,2014.doi:10.1109/WCL.2014.030514.140057.

[5]M.R.A.Khandaker and K.K.Wong,“QoS based multicast beamforming for SWIPT,”in Proc.IEEE SECON Workshop Energy Harvesting Communications,Singapore,Singapore,2014,pp.6267.doi:10.1109/SECONW.2014.6979707.

[6]Q.Shi,L.Liu,W.Xu,and R.Zhang,“Joint transmit beam forming and receive power splitting for MISO SWIPT systems”IEEE Transactions on wireless Communications,vol.13,no.6,pp.32693280,Jun.2014.doi:10.1109/TWC.2014.041714.131688.

[7]A.A.Okandeji,M.R.A.Khandaker,KK.Wong,and Z.Zheng,“Joint transmit power and relay two way beam forming optimization for energy harvesting full-duplex communications,”in Proc.IEEE Globecom International Workshop on Full Duplex Wireless Communications,Washington DC,USA,2016.doi:10.1109/GLOCOMW.2016.7848948.

[8]R.Zhang and C.K.Ho,“MIMO broadcasting for simultaneous wireless information and power transfer,”IEEE Transactions on wireless Communications,vol.12,no.5,pp.19892001,May 2013.doi:10.1109/TWC.2013.031813.120224.

[9]L.Varshney,“Transporting information and energy simultaneously,”in Proc.IEEE International Symposium on Information Theory,2008,pp.16121616.doi:10.1109/ISIT.2008.4595260.

[10]X.Zhou,R.Zhang,and C.K.Ho,“Wireless information and power transfer:architecture design and rate energy trade off,”IEEE Transactions on Communications,vol.61,no.11,pp.47544767,Nov.2013.doi:10.1109/TCOMM.2013.13.120855.

[11]M.Duarte,C.Dick,and A.Sabharwal,“ Experiment driven characterization of full-duplex wireless systems,”IEEE Transactions on Wireless Communications,vol.11,no.12,pp.42964307,Dec.2012.doi:10.1109/TWC.2012.102612.111278.

[12]Y.Hua,P.Liang,Y.Ma,A.C.Cirik,and Q.Gao,“A method for broad band full-duplex MIMO radio,”IEEE Signal Processing Letters,vol.19,no.12,pp.793796,Dec.2012.doi:10.1109/LSP.2012.2221710.

[13]E.Ahmed and A.M.Eltawil,“Alldigital self-interference cancellation technique for full-duplex systems,”IEEE Transactions on Wireless Communications,vol.14,no.7,pp.35193532,Jul.2015.doi:10.1109/TWC.2015.2407876.

[14]M.Duarte and A.Sabharwal,“Fullduplex wireless communication using off the shelf radios:feasibility and first result,”in IEEE ASILOMAR,Pacific Grove,USA,2010.doi:10.1109/ACSSC.2010.5757799.

[15]L.Liu,R.Zhang,and K.C.Chua,“Secrecy wireless information and power transfer with MISO beamforming,”IEEE Transactions on Signal Processing,vol.62,no.7,pp.18501863,Apr.2014.doi:10.1109/TSP.2014.2303422.

[16]W.C.Liao,T.H.Chang,W.K.Ma,and C.Y.Chi,“ QoS based transmit beam forming in the presence of eavesdroppers:an optimized artificial noiseaided approach,”IEEE Transactions on Signal Processing,vol.59,no.3,pp.13171322,Mar.2011.doi:10.1109/TSP.2010.2094610.

[17]J.Zhu,R.Schober,and V.K.Bhargava,“Secure transmission in multicell massive MIMO systems,”IEEE Transactions on Wireless Communications,vol.13,no.9,pp.47664781,Jul.2014.doi:10.1109/TWC.2014.2337308.

[18]Q.Liand D.Han,“Sum secrecy rate maximization for full-duplex two way relay networks,”in Proc.IEEE International Conference on Acoustics,Speech and Signal Processing,Shanghai,China,pp.36413645,Mar.2016.doi:10.1109/ICASSP.2016.7472356.

[19]D.W.K.Ng,E.S.Lo,and R.Schober,“Robust beam forming for secure communication in systems with wireless information and power transfer,”IEEE Transactions on Wireless Communications,vol.13,no.8,pp.45994615,Aug.2014.doi:10.1109/TWC.2014.2314654.

[20]Q.Shi,W.Xu,J.Song,and E.Song,“Secure beamforming for MIMO broadcasting with wireless information and power transfer,”IEEE Transactions on Wireless Communications,vol.14,no.5,pp.28412853,May 2015.doi:10.1109/TWC.2015.2395414.

[21]W.Wu and B.Wang,“Efficient transmission solutions for MIMO wiretap channels with SWIPT,”IEEE Communications Letters,vol.19,no.9,pp.15481551,Jun.2015.doi:10.1109/LCOMM.2015.2451179.

[22]H.Zhang,Y.Huang,C.Li,and L.Yang,“Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers,”IEEE Transactions on Wireless Communications,vol.15,no.11,pp.78077819,Nov.2016.doi:10.1109/TWC.2016.2607705.

[23]A.Sethi,V.Tapio,and M.Junti,“Self interference channel for full duplex Transceiver”in Proc.IEEE Wireless Communications and Networking Conference,Istanbul,Turkey,2014.doi:10.1109/WCNC.2014.6952167.

[24]A.A.Okandeji,M.R.A.Khandaker,KK.Wong,et al.,“SWIPT in MISO full-duplex systems,”Journal of Communications and Networks,to be published.

[25]J.Lie,Z.Han,M.A.V.Castro,and A.Hjorungnes,“Secure satellite communication systems design with individual secrecy rate constraints,”IEEE Transactions on Information Forensics and Security,vol.6,no.3,pp.661671,Sept.2011.doi:10.1109/TIFS.2011.2148716.

[26]A.S.Mansour,R.F.Schaefer,and H.Boche,“The individual secrecy capacity of degraded multi-receiver wiretap broadcast channels,”in Proc.IEEE International Conference on Communications,London,UK,2015,pp.41814186.doi:10.1109/ICC.2015.7248979.

[27]S.Boyd and L.Vandenberghe,Convex Optimization.Cambridge,UK:Cambridge University Press,2004.

[28]D.H.N.Nguyen,L.B.Lem,and Z.Han,“Optimal uplink and downlink channel assignment in a full-duplex multi-user system,”in Proc.IEEE International Conference on Communications,Kuala Lumpur,Malaysia,May 2016.doi:10.1109/ICC.2016.7510742.

[29]M.Grant and S.Boyd.(2010,Apr.).CVX:Matlab software for disciplined convex programming[Online].Available:http://cvxr.com/cvx

AlexanderA.Okandeji,MuhammadR.A.Khandaker,WONGKaiKit,ZHANGYangyang,andZHENGZhongbin
《ZTE Communications》 2018年第1期
《ZTE Communications》2018年第1期文献

服务严谨可靠 7×14小时在线支持 支持宝特邀商家 不满意退款

本站非杂志社官网,上千家国家级期刊、省级期刊、北大核心、南大核心、专业的职称论文发表网站。
职称论文发表、杂志论文发表、期刊征稿、期刊投稿,论文发表指导正规机构。是您首选最可靠,最快速的期刊论文发表网站。
免责声明:本网站部分资源、信息来源于网络,完全免费共享,仅供学习和研究使用,版权和著作权归原作者所有
如有不愿意被转载的情况,请通知我们删除已转载的信息 粤ICP备2023046998号