作者
Mohammed Adil Abbas, Hojin Song, Jun-Pyo Hong
发表日期
2018/9/4
期刊
IEEE Transactions on Information Forensics and Security
卷号
14
期号
4
页码范围
969-980
出版商
IEEE
简介
In this paper, we consider user scheduling and power allocation techniques for downlinks where transmitted message must be kept confidential from all other unintended users and the number of users is larger than that of access point (AP) antennas. In order to maximize network secrecy rate with a limited number of antennas, the AP schedules a user who can achieve the largest secrecy rate and exploits multiple antennas for transmitting artificial noise to the unintended users. We derive the closed-form expressions of the optimal power allocation for the artificial noise and the average network secrecy rate through asymptotic analysis. The analysis results provide the insightful information on the behaviors of the user scheduling and the effect of system parameters on the network secrecy rate performance. It is shown that opportunistic scheduling with artificial noise transmission technique is more effective than the …
引用总数
201920202021202220232024653144
学术搜索中的文章