File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

최진석

Choi, Jinseok
Intelligent Wireless Communications Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 6195 -
dc.citation.number 9 -
dc.citation.startPage 6181 -
dc.citation.title IEEE TRANSACTIONS ON COMMUNICATIONS -
dc.citation.volume 70 -
dc.contributor.author Lee, Kanguk -
dc.contributor.author Choi, Jinseok -
dc.contributor.author Kim, Dong Ku -
dc.contributor.author Park, Jeonghun -
dc.date.accessioned 2023-12-21T13:40:52Z -
dc.date.available 2023-12-21T13:40:52Z -
dc.date.created 2022-10-05 -
dc.date.issued 2022-09 -
dc.description.abstract Physical layer security is a useful tool to prevent illegal wiretapping to confidential information. In this paper, we consider a generalized model of conventional physical layer security, referred as hierarchical information accessibility (HIA). A main feature of the HIA model is that a network has a hierarchy in information access, wherein decoding feasibility is determined by each user's priority. Under this HIA model, we formulate a sum secrecy rate maximization problem with regard to precoding vectors. This problem is challenging since multiple non-smooth functions are involved into the secrecy rate to fulfill the HIA conditions and also the problem is non-convex. To address the challenges, we approximate the minimum function by using the LogSumExp technique, thereafter obtain the first-order optimality condition. One key observation is that the derived condition is cast as a functional eigenvalue problem, where the eigenvalue is equivalent to the approximated objective function of the formulated problem. Accordingly, we show that finding a principal eigenvector is equivalent to finding a local optimal solution. To this end, we develop a novel method called generalized power iteration for HIA (GPI-HIA). Simulations demonstrate that the GPI-HIA significantly outperforms other baseline methods in terms of the secrecy rate. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195 -
dc.identifier.doi 10.1109/TCOMM.2022.3189386 -
dc.identifier.issn 0090-6778 -
dc.identifier.scopusid 2-s2.0-85134204350 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/59710 -
dc.identifier.wosid 000854601700038 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Engineering; Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Security -
dc.subject.keywordAuthor Precoding -
dc.subject.keywordAuthor NOMA -
dc.subject.keywordAuthor hierarchical security -
dc.subject.keywordAuthor MU-MIMO -
dc.subject.keywordAuthor multigroup multicast -
dc.subject.keywordAuthor beamforming optimization -
dc.subject.keywordAuthor Downlink -
dc.subject.keywordAuthor Optimization -
dc.subject.keywordAuthor Physical layer security -
dc.subject.keywordAuthor Quality of service -
dc.subject.keywordPlus PHYSICAL LAYER SECURITY -
dc.subject.keywordPlus BEAMFORMING DESIGN -
dc.subject.keywordPlus RATE OPTIMIZATION -
dc.subject.keywordPlus POWER ALLOCATION -
dc.subject.keywordPlus UNICAST -
dc.subject.keywordPlus ROBUST -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.