Loading…
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels
In this paper, we consider the robust secure beamformer design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage...
Saved in:
Published in: | IEEE transactions on wireless communications 2014-10, Vol.13 (10), p.5558-5570 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33 |
---|---|
cites | cdi_FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33 |
container_end_page | 5570 |
container_issue | 10 |
container_start_page | 5558 |
container_title | IEEE transactions on wireless communications |
container_volume | 13 |
creator | Ma, Shuai Hong, Mingyi Song, Enbin Wang, Xiangfeng Sun, Dechun |
description | In this paper, we consider the robust secure beamformer design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem using a novel two-step approach. Under a wide range of uncertainty models, our developed algorithms can obtain high-quality solutions, sometimes even exact global solutions, for the robust secure beamformer design problem. Simulation results are presented to verify the effectiveness and robustness of the proposed algorithms. |
doi_str_mv | 10.1109/TWC.2014.2326415 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_6819814</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6819814</ieee_id><sourcerecordid>1671582351</sourcerecordid><originalsourceid>FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhhdRsFbvgpeAFy9bM5uvzVEWrYVKwVZ6DNlsolvabE12D_57U1o8eJoZeN7h5cmyW8ATACwfV-tqUmCgk4IUnAI7y0bAWJkXBS3PDzvhORSCX2ZXMW4wBsEZG2XTxdDrT4uqzsc-6NbbBr139RB7tLRmCBatgvZx18bYdh65LqC32XKB1m2wvd6j6kt7b7fxOrtwehvtzWmOs4-X51X1ms8X01n1NM8N4bzPhZOAHSZCyLomtambdFJwzIGsOZE1xY3mzJZUmoYL6ozRjjDGpRHYaULG2cPx7z5034ONvUrVjN1utbfdEBVwAawsCIOE3v9DN90QfGqXKCxlQbHgicJHyoQuxmCd2od2p8OPAqwOZlUyqw5m1clsitwdI6219g_nJcgSKPkFxXlzeA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1609924076</pqid></control><display><type>article</type><title>Outage Constrained Robust Secure Transmission for MISO Wiretap Channels</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Ma, Shuai ; Hong, Mingyi ; Song, Enbin ; Wang, Xiangfeng ; Sun, Dechun</creator><creatorcontrib>Ma, Shuai ; Hong, Mingyi ; Song, Enbin ; Wang, Xiangfeng ; Sun, Dechun</creatorcontrib><description>In this paper, we consider the robust secure beamformer design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem using a novel two-step approach. Under a wide range of uncertainty models, our developed algorithms can obtain high-quality solutions, sometimes even exact global solutions, for the robust secure beamformer design problem. Simulation results are presented to verify the effectiveness and robustness of the proposed algorithms.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2014.2326415</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Array signal processing ; Channels ; Constraints ; Heuristic ; Mathematical models ; Maximization ; Minimization ; Outages ; Receivers ; Robustness ; Uncertainty ; Vectors ; Wireless communication</subject><ispartof>IEEE transactions on wireless communications, 2014-10, Vol.13 (10), p.5558-5570</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33</citedby><cites>FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6819814$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,54795</link.rule.ids></links><search><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Hong, Mingyi</creatorcontrib><creatorcontrib>Song, Enbin</creatorcontrib><creatorcontrib>Wang, Xiangfeng</creatorcontrib><creatorcontrib>Sun, Dechun</creatorcontrib><title>Outage Constrained Robust Secure Transmission for MISO Wiretap Channels</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>In this paper, we consider the robust secure beamformer design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem using a novel two-step approach. Under a wide range of uncertainty models, our developed algorithms can obtain high-quality solutions, sometimes even exact global solutions, for the robust secure beamformer design problem. Simulation results are presented to verify the effectiveness and robustness of the proposed algorithms.</description><subject>Algorithms</subject><subject>Array signal processing</subject><subject>Channels</subject><subject>Constraints</subject><subject>Heuristic</subject><subject>Mathematical models</subject><subject>Maximization</subject><subject>Minimization</subject><subject>Outages</subject><subject>Receivers</subject><subject>Robustness</subject><subject>Uncertainty</subject><subject>Vectors</subject><subject>Wireless communication</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdkE1LAzEQhhdRsFbvgpeAFy9bM5uvzVEWrYVKwVZ6DNlsolvabE12D_57U1o8eJoZeN7h5cmyW8ATACwfV-tqUmCgk4IUnAI7y0bAWJkXBS3PDzvhORSCX2ZXMW4wBsEZG2XTxdDrT4uqzsc-6NbbBr139RB7tLRmCBatgvZx18bYdh65LqC32XKB1m2wvd6j6kt7b7fxOrtwehvtzWmOs4-X51X1ms8X01n1NM8N4bzPhZOAHSZCyLomtambdFJwzIGsOZE1xY3mzJZUmoYL6ozRjjDGpRHYaULG2cPx7z5034ONvUrVjN1utbfdEBVwAawsCIOE3v9DN90QfGqXKCxlQbHgicJHyoQuxmCd2od2p8OPAqwOZlUyqw5m1clsitwdI6219g_nJcgSKPkFxXlzeA</recordid><startdate>201410</startdate><enddate>201410</enddate><creator>Ma, Shuai</creator><creator>Hong, Mingyi</creator><creator>Song, Enbin</creator><creator>Wang, Xiangfeng</creator><creator>Sun, Dechun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>201410</creationdate><title>Outage Constrained Robust Secure Transmission for MISO Wiretap Channels</title><author>Ma, Shuai ; Hong, Mingyi ; Song, Enbin ; Wang, Xiangfeng ; Sun, Dechun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Array signal processing</topic><topic>Channels</topic><topic>Constraints</topic><topic>Heuristic</topic><topic>Mathematical models</topic><topic>Maximization</topic><topic>Minimization</topic><topic>Outages</topic><topic>Receivers</topic><topic>Robustness</topic><topic>Uncertainty</topic><topic>Vectors</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ma, Shuai</creatorcontrib><creatorcontrib>Hong, Mingyi</creatorcontrib><creatorcontrib>Song, Enbin</creatorcontrib><creatorcontrib>Wang, Xiangfeng</creatorcontrib><creatorcontrib>Sun, Dechun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ma, Shuai</au><au>Hong, Mingyi</au><au>Song, Enbin</au><au>Wang, Xiangfeng</au><au>Sun, Dechun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Outage Constrained Robust Secure Transmission for MISO Wiretap Channels</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2014-10</date><risdate>2014</risdate><volume>13</volume><issue>10</issue><spage>5558</spage><epage>5570</epage><pages>5558-5570</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>In this paper, we consider the robust secure beamformer design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem using a novel two-step approach. Under a wide range of uncertainty models, our developed algorithms can obtain high-quality solutions, sometimes even exact global solutions, for the robust secure beamformer design problem. Simulation results are presented to verify the effectiveness and robustness of the proposed algorithms.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TWC.2014.2326415</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1536-1276 |
ispartof | IEEE transactions on wireless communications, 2014-10, Vol.13 (10), p.5558-5570 |
issn | 1536-1276 1558-2248 |
language | eng |
recordid | cdi_ieee_primary_6819814 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Algorithms Array signal processing Channels Constraints Heuristic Mathematical models Maximization Minimization Outages Receivers Robustness Uncertainty Vectors Wireless communication |
title | Outage Constrained Robust Secure Transmission for MISO Wiretap Channels |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T02%3A38%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Outage%20Constrained%20Robust%20Secure%20Transmission%20for%20MISO%20Wiretap%20Channels&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Ma,%20Shuai&rft.date=2014-10&rft.volume=13&rft.issue=10&rft.spage=5558&rft.epage=5570&rft.pages=5558-5570&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2014.2326415&rft_dat=%3Cproquest_ieee_%3E1671582351%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c366t-7f910f03779bb3bcbd10f41f5f19b639b40da65e849cd674fccaf35569c70fa33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1609924076&rft_id=info:pmid/&rft_ieee_id=6819814&rfr_iscdi=true |