File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

최진석

Choi, Jinseok
Intelligent Wireless Communications Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.endPage 3417 -
dc.citation.startPage 3412 -
dc.citation.title IEEE International Conference on Communications -
dc.contributor.author Oh, Mintaek -
dc.contributor.author Park, Jeonghun -
dc.contributor.author Choi, Jinseok -
dc.date.accessioned 2023-12-19T12:07:02Z -
dc.date.available 2023-12-19T12:07:02Z -
dc.date.created 2022-12-13 -
dc.date.issued 2022-05-16 -
dc.description.abstract In this paper, we consider a downlink internet-of-things (IoT) multiple-input multiple-output (MIMO) network wherein an access point (AP), multiple IoT users, and a single eavesdropper coexist. The eavesdropper attempts to wiretap confidential messages of the IoT users. In the considered system, we solve a sum secrecy rate maximization problem in the finite blocklength (FBL) regime. Due to the FBL, the secrecy rate has a back-off factor with respect to blocklength, decoding error probability, and information leakage, which makes the problem more challenging. The main challenges are: i) the problem is not tractable because of the back-off factor, ii) an objective function is inherently non-convex, and iii) information leakage by the eavesdropper needs to be considered. To address these difficulties, we first obtain a lower bound of the secrecy rate and transform the problem into a product of Rayleigh quotients form. Then, we derive a first-order Karush-Kuhn-Tucker (KKT) condition to find a local optimal solution and interpret the condition as a generalized eigenvalue problem. Consequently, we develop a low-complexity algorithm by adopting a generalized power iteration-based (GPI) method. Via simulations, we validate the secrecy rate performance of the proposed method for the short-packet IoT communication systems. -
dc.identifier.bibliographicCitation IEEE International Conference on Communications, pp.3412 - 3417 -
dc.identifier.doi 10.1109/ICC45855.2022.9838578 -
dc.identifier.issn 1550-3607 -
dc.identifier.scopusid 2-s2.0-85136134259 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/60335 -
dc.identifier.wosid 000864709903110 -
dc.language 영어 -
dc.publisher IEEE -
dc.title Secure Internet-of-Things Communications: Joint Precoding and Power Control -
dc.type Conference Paper -
dc.date.conferenceDate 2022-05-16 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.