SCIENCE CHINA Information Sciences, Volume 59 , Issue 6 : 062304(2016) https://doi.org/10.1007/s11432-015-5401-z

Cooperative beamforming design for physical-layer security of multi-hop MIMO communications

More info
  • ReceivedMay 26, 2015
  • AcceptedJun 30, 2015
  • PublishedSep 7, 2015



National Natural Science Foundation of China(61371075)

National Natural Science Foundation of China(61421001)

111 Project of China(B14010)



This work was supported by National Natural Science Foundation of China (Grant Nos. 61371075, 61421001) and 111 Project of China (Grant No. B14010).


[1] Xing C W, Ma S D, Wu Y C. IEEE Trans Signal Process, 2010, 582273-2283 Google Scholar

[2] Rong Y, Hua Y. IEEE Trans Wirel Commun, 2009, 86068-6077 Google Scholar

[3] Xing C W, Xia M, Gao F, et al. IEEE J Sele Area Commun, 2012, 301370-1382 Google Scholar

[4] Telatar I E. Eur Trans Telecommun, 1999, 10585-595 Google Scholar

[5] Zhu F, Gao F, Yao M, et al. IEEE Trans Signal Process, 2014, 626391-6401 Google Scholar

[6] Li Z, Trappe W, Yates R. Secret communication via multi-antenna transmission. In: Proceedings of 41st Conf Inf Sci Syst, Baltimore, 2007. 905--910. Google Scholar

[7] Ni J Q, Fei Z S, Xing C W, et al. Int J Antenn Propag, 2013, 2013546260-6401 Google Scholar

[8] Lindblom J, Karipidis E. Closed-form parameterization of the pareto boundary for the two-user MISO interference channel. In: Proceedings of IEEE Int Conf Acoustics, Speech, and Signal Processing, Prague, 2011. 3372--3375. Google Scholar

[9] Chen L, Wong K K, Chen H. IEEE Commun Lett, 2011, 15314-316 Google Scholar

[10] Wang C, Liu J, Dong Z. Multi-hop collaborative relay beamforming. In: Proceedings of IEEE Vehicular Technology Conference, Las Vegas, 2013. 1--5. Google Scholar

[11] Shannon C E. Bell Syst Tech J, 1949, 28656-715 Google Scholar

[12] Wyner A D. Bell Sys Tech J, 1975, 541355-1387 Google Scholar

[13] Dai B, Ma Z. Achievable rate-equivocation regions for relay broadcast channels with confidential messages. In: Proceedings of ISITA, Melbourne, 2014. 393--397. Google Scholar

[14] Leung-Yan-Cheong S, Hellman M E. IEEE Trans Inf Theory, 1978, 24451-456 Google Scholar

[15] Jorswieck A E, Mochaourab R. Secrecy rate region of MISO interference channel: pareto boundary and non-cooperative games. In: Proceedings of international ITG workshop on smart Antennas, Berlin, 2009. 1--8. Google Scholar

[16] Fei Z S, Ni J Q, Zhao D, et al. Sci China Inf Sci, 2014, 57102302-456 Google Scholar

[17] Mu P C, Wang H M, Yin Q Y. Improving the secrecy rate of wireless SIMO systems via two-step transmission. In: Proceedings of Globecom Workshops, Atlanta, 2013. 1280--1285. Google Scholar

[18] Wang Y W, Yu F R, Tang H, et al. IEEE Trans Wirel Commun, 2014, 131616-1627 Google Scholar

[19] Luan T, Gao F, Zhang X. IEEE Trans Wirel Commun, 2012, 113090-3100 Google Scholar

[20] Wang H M, Yin Q Y. Improving the physical-layer security of wireless two-way relaying via analog network coding. In: Proceedings of Global Telecommunications Conference, Houston, 2011. 5--9. Google Scholar

[21] Wang H M, Luo M, Yin Q Y. IEEE Trans Inf Foren Secur, 2013, 82007-2020 Google Scholar

[22] Khisti A, Wornell G. IEEE Trans Inf Theory, 2010, 565515-5532 Google Scholar

[23] Tekin E, Yener A. IEEE Trans Inf Theory, 2008, 542735-2751 Google Scholar

[24] Zhang Z, Long K, Wang J, et al. IEEE Commun Surv Tut, 2014, 16513-537 Google Scholar

[25] Zhang Z, Long K, Wang J. IEEE Wirel Commun, 2013, 2036-42 Google Scholar

[26] Vaikundam G, Sudha G F. Distributed beamforming for randomly distributed sensors using bisection method and dynamic programming technique. In: Proceedings of IEEE Int Conf CONECCT, Bangalore, 2013. 1--6. Google Scholar

[27] Michael G, Stephen B. CVX Users' Guide for CVX version 1.21, 1996. Google Scholar

[28] Ekrem E, Ulukus S. J Commun Netw, 2010, 12411-432 Google Scholar


Contact and support