DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Jinho | ko |
dc.contributor.author | Ha, Jeongseok | ko |
dc.date.accessioned | 2016-05-11T04:34:30Z | - |
dc.date.available | 2016-05-11T04:34:30Z | - |
dc.date.created | 2016-02-16 | - |
dc.date.created | 2016-02-16 | - |
dc.date.issued | 2015-10-28 | - |
dc.identifier.citation | IEEE ICTC 2015, pp.329 - 334 | - |
dc.identifier.uri | http://hdl.handle.net/10203/207153 | - |
dc.description.abstract | In order to avoid eavesdropping, beamforming can be used not only to induce artificial noise or jamming signal to an eavesdropper, but also transmit desired signals to a legitimate user (or sensor) from an access point (AP) equipped with an antenna array. In this paper, with proper power allocation, we show that beamforming under a rich scattering environment can guarantee a certain secrecy rate with an overwhelming probability. This approach becomes attractive for slow fading channels where the ergodic secrecy rate cannot be used to decide a target secrecy rate. | - |
dc.language | English | - |
dc.publisher | IEEE | - |
dc.title | Power allocation of random masked beamforming for guaranteed secure communications | - |
dc.type | Conference | - |
dc.identifier.wosid | 000380476400078 | - |
dc.identifier.scopusid | 2-s2.0-84964800387 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 329 | - |
dc.citation.endingpage | 334 | - |
dc.citation.publicationname | IEEE ICTC 2015 | - |
dc.identifier.conferencecountry | KO | - |
dc.identifier.conferencelocation | Lotte City Hotel Jeju | - |
dc.contributor.localauthor | Ha, Jeongseok | - |
dc.contributor.nonIdAuthor | Choi, Jinho | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.