Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

Z Chu, HX Nguyen, G Caire - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
This paper investigates a secure wireless-powered multiantenna multicasting system, where
multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable …

Proportional fair secrecy beamforming for MISO heterogeneous cellular networks with wireless information and power transfer

H Ma, J Cheng, X Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Simultaneous wireless information and power transfer (SWIPT) is a promising technique to
address the energy scarcity problem in heterogeneous cellular networks (HCNs). Since …

Robust hybrid precoding design for securing millimeter-wave IoT networks under secrecy outage constraint

C Wang, Z Li, TX Zheng, H Chen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Hybrid precoding architecture, as a cost-effective approach for millimeter-wave (mmWave)
communications, can achieve an excellent tradeoff between spectrum efficiency and …

Outage constrained robust energy harvesting maximization for secure MIMO SWIPT systems

H Niu, D Guo, Y Huang, B Zhang… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
In this letter, we investigate the outage constrained robust secure design in multiple-input
multiple-output simultaneous wireless information and power transfer systems, where the …

Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMO Systems in Vehicular Networks

X Li, Z Li, Z Zhu, D Zhang, L Liu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Vehicle-to-Everything (V2X) is an important application scenario in 6G, where secure
transmission is crucial in vehicular networks. Thus, this paper explores the application of an …

Relay cooperative beamforming algorithm based on probabilistic constraint in SWIPT secrecy networks

Z Hu, D Xie, M Jin, L Zhou, J Li - IEEE Access, 2020 - ieeexplore.ieee.org
We explore physical layer security of simultaneous wireless information and power transfer
(SWIPT) relay network in this paper. Modeling channel error between relay and …

Secure-reliable transmission designs for full-duplex receiver with finite-alphabet inputs

G Xia, X Zhou, L Gu, F Shu, Y Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper studies a convincingly secure transmission framework under an allowable
outage probability for practical finite-alphabet inputs, where a full-duplex receiver (Bob) is …

Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system

Y Jin, Z Hu, D Xie, G Wu, L Zhou - EURASIP Journal on Wireless …, 2021 - Springer
Aiming at high energy consumption and information security problem in the simultaneous
wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a …

Both worst-case and chance-constrained robust secure SWIPT in MISO interference channels

DH Chen, YC He, X Lin, R Zhao - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper addresses robust designs of secure simultaneous wireless information and
power transfer for multiple-input single-output (MISO) multiuser systems. By using a …

Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels

B Li, Z Fei - Science China Information Sciences, 2018 - Springer
In this paper, we consider a system supporting simultaneous wireless information and power
transfer (SWIPT), where the transmitter delivers private message to a destination receiver …