Citation: | Xie Xian-zhong, Zhang Xiu-juan, Lei Wei-jia. Optimization of Secrecy Rate for Energy Harvesting Gaussian Wiretap Channel[J]. Journal of Electronics & Information Technology, 2015, 37(11): 2678-2684. doi: 10.11999/JEIT150227 |
Shiu Y S, Chang S Y, Wu H C, et al.. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
|
Wyner A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
Xie Jian-wei and Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers[C]. Proceedings of the Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, 2012: 193-200.
|
Xie Jian-wei and Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: blind cooperative jamming[C]. Proceedings of the Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, 2013: 1-5.
|
Bassily R and Ulukus S. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks[J]. IEEE Transactions on Signal Processing, 2013, 61(6): 1544-1554.
|
Oggier F and Hassibi B. The secrecy capacity of the MIMO wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(8): 4961-4972.
|
Ekrem E and Ulukus S. The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(4): 2083-2114.
|
Bustin R, Liu Ruo-heng, and Poor H V. An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel[C]. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, 2009: 2602-2606.
|
Fakoorian S A A and Swindlehurst A L. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel[C]. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, 2012: 2321-2325.
|
Khisti A and Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.
|
Sudevalayam S and Kulkarni P. Energy harvesting sensor nodes: Survey and implications[J]. IEEE Communications Surveys Tutorials, 2011, 13(3): 443-461.
|
Visser H J and Vullers R J M. RF energy harvesting and transport for wireless sensor network applications: principles and requirements[J]. Proceedings of the IEEE, 2013, 101(6): 1410-1423.
|
Luo Shi-xin, Zhang Rui, and Lim T J. Optimal save-then-transmit protocol for energy harvesting wireless transmitters[J]. IEEE Transactions on Wireless Communications, 2013, 12(3): 1196-1207.
|