Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication

Authors
Zhou Yongkai, Chen Xiao, Yin Xinxing, Zhu Yan, Li Fangbiao, Pang Liang, Xue Zhi
Corresponding Author
Zhou Yongkai
Available Online November 2013.
DOI
10.2991/ccis-13.2013.81How to use a DOI?
Keywords
Artificial Noise, Masked Beamforming, Secrecy Capacity, Power Allocation Ratio.
Abstract

In this paper, we considered the joint maskedbeamforming in secure wireless transmission in which artificial noise is sent by the transmitter (Alice) and the receiver (Bob) jointly. A new and efficient optimization scheme is proposed to separately allocate the power ratio for Alice and assign the transmit antenna for Bob. It is proved that when Bob’s artificial noise is high enough, Alice should allocate less proportion of her power to the artificial noise. The proposed model combined with proper parameter design can achieve optimal secrecy performance.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
10.2991/ccis-13.2013.81
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.81How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Zhou Yongkai
AU  - Chen Xiao
AU  - Yin Xinxing
AU  - Zhu Yan
AU  - Li Fangbiao
AU  - Pang Liang
AU  - Xue Zhi
PY  - 2013/11
DA  - 2013/11
TI  - Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 351
EP  - 354
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.81
DO  - 10.2991/ccis-13.2013.81
ID  - Yongkai2013/11
ER  -