There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.endPage | 6195 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 6181 | - |
dc.citation.title | IEEE TRANSACTIONS ON COMMUNICATIONS | - |
dc.citation.volume | 70 | - |
dc.contributor.author | Lee, Kanguk | - |
dc.contributor.author | Choi, Jinseok | - |
dc.contributor.author | Kim, Dong Ku | - |
dc.contributor.author | Park, Jeonghun | - |
dc.date.accessioned | 2023-12-21T13:40:52Z | - |
dc.date.available | 2023-12-21T13:40:52Z | - |
dc.date.created | 2022-10-05 | - |
dc.date.issued | 2022-09 | - |
dc.description.abstract | Physical layer security is a useful tool to prevent illegal wiretapping to confidential information. In this paper, we consider a generalized model of conventional physical layer security, referred as hierarchical information accessibility (HIA). A main feature of the HIA model is that a network has a hierarchy in information access, wherein decoding feasibility is determined by each user's priority. Under this HIA model, we formulate a sum secrecy rate maximization problem with regard to precoding vectors. This problem is challenging since multiple non-smooth functions are involved into the secrecy rate to fulfill the HIA conditions and also the problem is non-convex. To address the challenges, we approximate the minimum function by using the LogSumExp technique, thereafter obtain the first-order optimality condition. One key observation is that the derived condition is cast as a functional eigenvalue problem, where the eigenvalue is equivalent to the approximated objective function of the formulated problem. Accordingly, we show that finding a principal eigenvector is equivalent to finding a local optimal solution. To this end, we develop a novel method called generalized power iteration for HIA (GPI-HIA). Simulations demonstrate that the GPI-HIA significantly outperforms other baseline methods in terms of the secrecy rate. | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195 | - |
dc.identifier.doi | 10.1109/TCOMM.2022.3189386 | - |
dc.identifier.issn | 0090-6778 | - |
dc.identifier.scopusid | 2-s2.0-85134204350 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/59710 | - |
dc.identifier.wosid | 000854601700038 | - |
dc.language | 영어 | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO | - |
dc.type | Article | - |
dc.description.isOpenAccess | FALSE | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic; Telecommunications | - |
dc.relation.journalResearchArea | Engineering; Telecommunications | - |
dc.type.docType | Article | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Precoding | - |
dc.subject.keywordAuthor | NOMA | - |
dc.subject.keywordAuthor | hierarchical security | - |
dc.subject.keywordAuthor | MU-MIMO | - |
dc.subject.keywordAuthor | multigroup multicast | - |
dc.subject.keywordAuthor | beamforming optimization | - |
dc.subject.keywordAuthor | Downlink | - |
dc.subject.keywordAuthor | Optimization | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | Quality of service | - |
dc.subject.keywordPlus | PHYSICAL LAYER SECURITY | - |
dc.subject.keywordPlus | BEAMFORMING DESIGN | - |
dc.subject.keywordPlus | RATE OPTIMIZATION | - |
dc.subject.keywordPlus | POWER ALLOCATION | - |
dc.subject.keywordPlus | UNICAST | - |
dc.subject.keywordPlus | ROBUST | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.