Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks
The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-mat...
Ausführliche Beschreibung
Autor*in: |
Gao, Hui [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: IEEE signal processing letters - Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5, New York, NY, 19XX, 23(2016), 11, Seite 1509-1513 |
---|---|
Übergeordnetes Werk: |
volume:23 ; year:2016 ; number:11 ; pages:1509-1513 |
Links: |
---|
DOI / URN: |
10.1109/LSP.2016.2600105 |
---|
Katalog-ID: |
OLC1986062848 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1986062848 | ||
003 | DE-627 | ||
005 | 20220216211351.0 | ||
007 | tu | ||
008 | 161202s2016 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1109/LSP.2016.2600105 |2 doi | |
028 | 5 | 2 | |a PQ20170301 |
035 | |a (DE-627)OLC1986062848 | ||
035 | |a (DE-599)GBVOLC1986062848 | ||
035 | |a (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 | ||
035 | |a (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
084 | |a 53.00 |2 bkl | ||
100 | 1 | |a Gao, Hui |e verfasserin |4 aut | |
245 | 1 | 0 | |a Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. | ||
650 | 4 | |a relay | |
650 | 4 | |a Array signal processing | |
650 | 4 | |a Relays | |
650 | 4 | |a multicast | |
650 | 4 | |a security | |
650 | 4 | |a energy harvesting | |
650 | 4 | |a physical-layer | |
650 | 4 | |a Signal to noise ratio | |
650 | 4 | |a Iterative methods | |
650 | 4 | |a Wireless communication | |
650 | 4 | |a Communication system security | |
650 | 4 | |a Beamforming | |
650 | 4 | |a Optimization | |
700 | 1 | |a Lv, Tiejun |4 oth | |
700 | 1 | |a Wang, Weichen |4 oth | |
700 | 1 | |a Beaulieu, Norman C |4 oth | |
773 | 0 | 8 | |i Enthalten in |a Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 |t IEEE signal processing letters |d New York, NY, 19XX |g 23(2016), 11, Seite 1509-1513 |w (DE-627)182273075 |w (DE-600)916964-7 |x 1070-9908 |7 nnns |
773 | 1 | 8 | |g volume:23 |g year:2016 |g number:11 |g pages:1509-1513 |
856 | 4 | 1 | |u http://dx.doi.org/10.1109/LSP.2016.2600105 |3 Volltext |
856 | 4 | 2 | |u http://ieeexplore.ieee.org/document/7542595 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
936 | b | k | |a 53.00 |q AVZ |
951 | |a AR | ||
952 | |d 23 |j 2016 |e 11 |h 1509-1513 |
author_variant |
h g hg |
---|---|
matchkey_str |
article:10709908:2016----::nryfiinadeueemomnfrefutialrlyi |
hierarchy_sort_str |
2016 |
bklnumber |
53.00 |
publishDate |
2016 |
allfields |
10.1109/LSP.2016.2600105 doi PQ20170301 (DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina DE-627 ger DE-627 rakwb eng 53.00 bkl Gao, Hui verfasserin aut Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization Lv, Tiejun oth Wang, Weichen oth Beaulieu, Norman C oth Enthalten in Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 IEEE signal processing letters New York, NY, 19XX 23(2016), 11, Seite 1509-1513 (DE-627)182273075 (DE-600)916964-7 1070-9908 nnns volume:23 year:2016 number:11 pages:1509-1513 http://dx.doi.org/10.1109/LSP.2016.2600105 Volltext http://ieeexplore.ieee.org/document/7542595 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT 53.00 AVZ AR 23 2016 11 1509-1513 |
spelling |
10.1109/LSP.2016.2600105 doi PQ20170301 (DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina DE-627 ger DE-627 rakwb eng 53.00 bkl Gao, Hui verfasserin aut Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization Lv, Tiejun oth Wang, Weichen oth Beaulieu, Norman C oth Enthalten in Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 IEEE signal processing letters New York, NY, 19XX 23(2016), 11, Seite 1509-1513 (DE-627)182273075 (DE-600)916964-7 1070-9908 nnns volume:23 year:2016 number:11 pages:1509-1513 http://dx.doi.org/10.1109/LSP.2016.2600105 Volltext http://ieeexplore.ieee.org/document/7542595 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT 53.00 AVZ AR 23 2016 11 1509-1513 |
allfields_unstemmed |
10.1109/LSP.2016.2600105 doi PQ20170301 (DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina DE-627 ger DE-627 rakwb eng 53.00 bkl Gao, Hui verfasserin aut Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization Lv, Tiejun oth Wang, Weichen oth Beaulieu, Norman C oth Enthalten in Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 IEEE signal processing letters New York, NY, 19XX 23(2016), 11, Seite 1509-1513 (DE-627)182273075 (DE-600)916964-7 1070-9908 nnns volume:23 year:2016 number:11 pages:1509-1513 http://dx.doi.org/10.1109/LSP.2016.2600105 Volltext http://ieeexplore.ieee.org/document/7542595 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT 53.00 AVZ AR 23 2016 11 1509-1513 |
allfieldsGer |
10.1109/LSP.2016.2600105 doi PQ20170301 (DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina DE-627 ger DE-627 rakwb eng 53.00 bkl Gao, Hui verfasserin aut Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization Lv, Tiejun oth Wang, Weichen oth Beaulieu, Norman C oth Enthalten in Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 IEEE signal processing letters New York, NY, 19XX 23(2016), 11, Seite 1509-1513 (DE-627)182273075 (DE-600)916964-7 1070-9908 nnns volume:23 year:2016 number:11 pages:1509-1513 http://dx.doi.org/10.1109/LSP.2016.2600105 Volltext http://ieeexplore.ieee.org/document/7542595 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT 53.00 AVZ AR 23 2016 11 1509-1513 |
allfieldsSound |
10.1109/LSP.2016.2600105 doi PQ20170301 (DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina DE-627 ger DE-627 rakwb eng 53.00 bkl Gao, Hui verfasserin aut Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization Lv, Tiejun oth Wang, Weichen oth Beaulieu, Norman C oth Enthalten in Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5 IEEE signal processing letters New York, NY, 19XX 23(2016), 11, Seite 1509-1513 (DE-627)182273075 (DE-600)916964-7 1070-9908 nnns volume:23 year:2016 number:11 pages:1509-1513 http://dx.doi.org/10.1109/LSP.2016.2600105 Volltext http://ieeexplore.ieee.org/document/7542595 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT 53.00 AVZ AR 23 2016 11 1509-1513 |
language |
English |
source |
Enthalten in IEEE signal processing letters 23(2016), 11, Seite 1509-1513 volume:23 year:2016 number:11 pages:1509-1513 |
sourceStr |
Enthalten in IEEE signal processing letters 23(2016), 11, Seite 1509-1513 volume:23 year:2016 number:11 pages:1509-1513 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization |
isfreeaccess_bool |
false |
container_title |
IEEE signal processing letters |
authorswithroles_txt_mv |
Gao, Hui @@aut@@ Lv, Tiejun @@oth@@ Wang, Weichen @@oth@@ Beaulieu, Norman C @@oth@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
182273075 |
id |
OLC1986062848 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1986062848</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216211351.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">161202s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/LSP.2016.2600105</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170301</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1986062848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1986062848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gao, Hui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">relay</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Array signal processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relays</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">multicast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">energy harvesting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">physical-layer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signal to noise ratio</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Iterative methods</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication system security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Beamforming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optimization</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lv, Tiejun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Weichen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Beaulieu, Norman C</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="a">Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5</subfield><subfield code="t">IEEE signal processing letters</subfield><subfield code="d">New York, NY, 19XX</subfield><subfield code="g">23(2016), 11, Seite 1509-1513</subfield><subfield code="w">(DE-627)182273075</subfield><subfield code="w">(DE-600)916964-7</subfield><subfield code="x">1070-9908</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:23</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:11</subfield><subfield code="g">pages:1509-1513</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/LSP.2016.2600105</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7542595</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">23</subfield><subfield code="j">2016</subfield><subfield code="e">11</subfield><subfield code="h">1509-1513</subfield></datafield></record></collection>
|
author |
Gao, Hui |
spellingShingle |
Gao, Hui bkl 53.00 misc relay misc Array signal processing misc Relays misc multicast misc security misc energy harvesting misc physical-layer misc Signal to noise ratio misc Iterative methods misc Wireless communication misc Communication system security misc Beamforming misc Optimization Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
authorStr |
Gao, Hui |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)182273075 |
format |
Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1070-9908 |
topic_title |
53.00 bkl Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks relay Array signal processing Relays multicast security energy harvesting physical-layer Signal to noise ratio Iterative methods Wireless communication Communication system security Beamforming Optimization |
topic |
bkl 53.00 misc relay misc Array signal processing misc Relays misc multicast misc security misc energy harvesting misc physical-layer misc Signal to noise ratio misc Iterative methods misc Wireless communication misc Communication system security misc Beamforming misc Optimization |
topic_unstemmed |
bkl 53.00 misc relay misc Array signal processing misc Relays misc multicast misc security misc energy harvesting misc physical-layer misc Signal to noise ratio misc Iterative methods misc Wireless communication misc Communication system security misc Beamforming misc Optimization |
topic_browse |
bkl 53.00 misc relay misc Array signal processing misc Relays misc multicast misc security misc energy harvesting misc physical-layer misc Signal to noise ratio misc Iterative methods misc Wireless communication misc Communication system security misc Beamforming misc Optimization |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
t l tl w w ww n c b nc ncb |
hierarchy_parent_title |
IEEE signal processing letters |
hierarchy_parent_id |
182273075 |
hierarchy_top_title |
IEEE signal processing letters |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)182273075 (DE-600)916964-7 |
title |
Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
ctrlnum |
(DE-627)OLC1986062848 (DE-599)GBVOLC1986062848 (PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0 (KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina |
title_full |
Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
author_sort |
Gao, Hui |
journal |
IEEE signal processing letters |
journalStr |
IEEE signal processing letters |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
txt |
container_start_page |
1509 |
author_browse |
Gao, Hui |
container_volume |
23 |
class |
53.00 bkl |
format_se |
Aufsätze |
author-letter |
Gao, Hui |
doi_str_mv |
10.1109/LSP.2016.2600105 |
title_sort |
energy-efficient and secure beamforming for self-sustainable relay-aided multicast networks |
title_auth |
Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
abstract |
The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. |
abstractGer |
The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. |
abstract_unstemmed |
The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT |
container_issue |
11 |
title_short |
Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks |
url |
http://dx.doi.org/10.1109/LSP.2016.2600105 http://ieeexplore.ieee.org/document/7542595 |
remote_bool |
false |
author2 |
Lv, Tiejun Wang, Weichen Beaulieu, Norman C |
author2Str |
Lv, Tiejun Wang, Weichen Beaulieu, Norman C |
ppnlink |
182273075 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1109/LSP.2016.2600105 |
up_date |
2024-07-04T04:00:49.875Z |
_version_ |
1803619558889619456 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1986062848</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216211351.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">161202s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/LSP.2016.2600105</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170301</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1986062848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1986062848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c1231-1060b72872fbf532f22dc0447fccf50c4a04c19fa95cc193aef044c5db2a1cfc0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)02390256u20160000023001101509energyefficientandsecurebeamformingforselfsustaina</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gao, Hui</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The relay-aided multicast network is considered, where an <inline-formula><tex-math notation="LaTeX">N_{T} </tex-math></inline-formula>-antenna source multicasts confidential messages to <inline-formula> <tex-math notation="LaTeX">N</tex-math></inline-formula> single-antenna legitimate users via a self-sustainable <inline-formula><tex-math notation="LaTeX">M</tex-math></inline-formula>-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are <inline-formula> <tex-math notation="LaTeX">K</tex-math></inline-formula> unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">relay</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Array signal processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Relays</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">multicast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">energy harvesting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">physical-layer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signal to noise ratio</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Iterative methods</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication system security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Beamforming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optimization</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lv, Tiejun</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Weichen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Beaulieu, Norman C</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="a">Institute of Electrical and Electronics Engineers ; ID: gnd/1692-5</subfield><subfield code="t">IEEE signal processing letters</subfield><subfield code="d">New York, NY, 19XX</subfield><subfield code="g">23(2016), 11, Seite 1509-1513</subfield><subfield code="w">(DE-627)182273075</subfield><subfield code="w">(DE-600)916964-7</subfield><subfield code="x">1070-9908</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:23</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:11</subfield><subfield code="g">pages:1509-1513</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/LSP.2016.2600105</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7542595</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">23</subfield><subfield code="j">2016</subfield><subfield code="e">11</subfield><subfield code="h">1509-1513</subfield></datafield></record></collection>
|
score |
7.401785 |