A robust and distributed design for coordinated downlink beamforming for secure MISO interference channels

ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐t...

Full description

Saved in:
Bibliographic Details
Published inTransactions on emerging telecommunications technologies Vol. 25; no. 10; pp. 1020 - 1027
Main Authors Fei, Zesong, Ni, Jiqing, Wang, Niwei, Xing, Chengwen, Kuang, Jingming
Format Journal Article
LanguageEnglish
Published Blackwell Publishing Ltd 01.10.2014
Online AccessGet full text
ISSN2161-3915
2161-3915
DOI10.1002/ett.2816

Cover

Abstract ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd. This paper studies the optimisation problems if downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratios and equivocation rates. Thus, the centralised and distributed algorithms are presented and discussed for both perfect and imperfect channel state information cases.
AbstractList In this paper, we address the optimization problems of downlink coordinated beamforming over the K ‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd.
ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd. This paper studies the optimisation problems if downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratios and equivocation rates. Thus, the centralised and distributed algorithms are presented and discussed for both perfect and imperfect channel state information cases.
Author Kuang, Jingming
Xing, Chengwen
Fei, Zesong
Wang, Niwei
Ni, Jiqing
Author_xml – sequence: 1
  givenname: Zesong
  surname: Fei
  fullname: Fei, Zesong
  email: Correspondence: Zesong Fei, School of Information and Electronics, Beijing Institute of Technology, Beijing, 100081, China., feizesong@bit.edu.cn
  organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China
– sequence: 2
  givenname: Jiqing
  surname: Ni
  fullname: Ni, Jiqing
  organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China
– sequence: 3
  givenname: Niwei
  surname: Wang
  fullname: Wang, Niwei
  organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China
– sequence: 4
  givenname: Chengwen
  surname: Xing
  fullname: Xing, Chengwen
  organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China
– sequence: 5
  givenname: Jingming
  surname: Kuang
  fullname: Kuang, Jingming
  organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China
BookMark eNp1kM1OAjEUhRuDiYgkPkKXbgan7XQGloQgkIAkitFd0-ncwcLQmrYEeXsHMEaN3s39-85ZnEvUMNYAQtck7pA4prcQQod2SXqGmpSkJGI9whvf5gvU9n4V15VxypNuE6362Nl86wOWpsCF9sHpfBugnsHrpcGldVhZ6wpt5PFsd6bSZo1zkJv6udFmeYQ8qK0DPJs8zrE2AVwJDowCrF6lMVD5K3ReyspD-7O30NPdcDEYR9P5aDLoTyPFYpZGlHcJy5N6SZNCZawoKKeF4kymjOZ5KUnBVEkpyzLG8jIhXQBFkjzOZI8qYKyFbk6-ylnvHZTizemNdHtBYnGISdQxiUNMNdr5hSodZNDWBCd19ZcgOgl2uoL9v8ZiuFj85Otg4f2Ll24t0oxlXDzfj0SP85fxjI7EA_sAiYCLXw
CitedBy_id crossref_primary_10_1002_ett_3276
crossref_primary_10_1002_dac_4821
crossref_primary_10_1002_ett_2924
crossref_primary_10_1109_TWC_2015_2412531
crossref_primary_10_1109_TWC_2014_2326415
Cites_doi 10.1109/TIT.2008.921879
10.1109/TWC.2010.05.090936
10.1109/TIT.1978.1055892
10.1002/ett.1532
10.1109/TIT.2008.928272
10.1109/TSP.2010.2092774
10.1109/LCOMM.2010.081910.101121
10.1109/TIFS.2011.2156788
10.1109/TSP.2009.2031280
10.1002/ett.2634
10.1109/TIT.2011.2119650
10.1109/TSP.2009.2027462
10.1109/TSP.2006.872537
10.1561/2200000016
10.1109/ISIT.2008.4595012
10.1017/CBO9780511804441
10.1002/ett.2667
ContentType Journal Article
Copyright Copyright © 2014 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2014 John Wiley & Sons, Ltd.
DBID BSCLL
AAYXX
CITATION
DOI 10.1002/ett.2816
DatabaseName Istex
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2161-3915
EndPage 1027
ExternalDocumentID 10_1002_ett_2816
ETT2816
ark_67375_WNG_955XHM2G_R
Genre article
GroupedDBID .GA
.Y3
05W
1OC
31~
50Z
8-0
8-1
8-3
8-4
8-5
930
A03
AAEVG
AAHHS
AANLZ
AAXRX
AAZKR
ABCUV
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACPOU
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
AEEZP
AEGXH
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ATUGU
AUFTA
AZFZN
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BRXPI
BSCLL
D-E
D-F
DCZOG
DPXWK
DRFUL
DRSTM
EBS
EJD
F00
F01
F04
F21
G-S
GODZA
HGLYW
IN-
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
RX1
SUPJJ
V2E
WIH
WIK
WXSBR
AAHQN
AAMNL
AANHP
AAYCA
ACRPL
ACYXJ
ADNMO
AFWVQ
ALVPJ
AAYXX
ADMLS
AGHNM
AGQPQ
AGYGG
CITATION
ID FETCH-LOGICAL-c3036-25813b4c3064dc73dd252dc53a632bbfa1d3cf2237733bf418eec14b07a92ce33
ISSN 2161-3915
IngestDate Tue Jul 01 04:52:34 EDT 2025
Thu Apr 24 23:03:43 EDT 2025
Wed Jan 22 16:48:29 EST 2025
Wed Oct 30 09:46:12 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c3036-25813b4c3064dc73dd252dc53a632bbfa1d3cf2237733bf418eec14b07a92ce33
Notes ark:/67375/WNG-955XHM2G-R
ArticleID:ETT2816
istex:ACC0C04FD53FE257E663B35AD64F14A1F0BB844C
PageCount 8
ParticipantIDs crossref_primary_10_1002_ett_2816
crossref_citationtrail_10_1002_ett_2816
wiley_primary_10_1002_ett_2816_ETT2816
istex_primary_ark_67375_WNG_955XHM2G_R
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-10
October 2014
2014-10-00
PublicationDateYYYYMMDD 2014-10-01
PublicationDate_xml – month: 10
  year: 2014
  text: 2014-10
PublicationDecade 2010
PublicationTitle Transactions on emerging telecommunications technologies
PublicationTitleAlternate Trans Emerging Tel Tech
PublicationYear 2014
Publisher Blackwell Publishing Ltd
Publisher_xml – name: Blackwell Publishing Ltd
References Lai L, El-Gamal H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory 2008; 54(9): 4005C4019.
Negi R, Goel S. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications 2008; 7(6): 2180C2189.
Zheng G, Wong KK, Ottersten B. Robust cognitive beamforming with bounded channel uncertainties. IEEE Transactions on Signal Processing 2009; 57(12): 4871-4881.
Dahrouj H, Yu W. Coordinated beamforming for the multicell multi-antenna wireless system. IEEE Transactions on Wireless Communications 2010; 9(5): 1748-1759.
Tajer A, Prasad N, Wang X. Beamforming and rate allocation in MISO cognitive radio networks. IEEE Transactions on Signal Processing 2010; 58(1): 362-377.
Abdel-Samad A, Davidson TN, Gershman AB. Robust transmit eigen beamforming based on imperfect channel state information. IEEE Transactions on Signal Processing 2006; 54(5): 1596-1609.
Csiszar I, Korner J. Broadcast channels with confidential mes-sages. IEEE Transactions on Information Theory 1978; 24(3): 339C348.
Boyd S, Vandenberghe L. Convex Optimization. Cambridge University Press: Cambridge, 2004.
Wu WC. Robust pre-filtering based space division multiple access over multipath channels. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2634.
Qing L, Zhi T, Yue L. Distributed decision-making in wireless sensor networks for online structural health monitoring. Journal of Communications and Networks 2009; 11(4): 350,358.
Zheng G, Choo LC, Wong KK. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing 2011; 59(3): 1317C1322.
Labraoui N, Gueroui M, Aliouat M. Secure DV-hop loc- alization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies 2012; 23(4): 303-316.
Fakoorian SAA, AL Swindlehurst. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security 2011; 6(3): 640-649.
Sahu RA, Padhye S. Identity-based multi-proxy multi-signature scheme provably secure in random oracle model. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2667.
Zhu J, Mo J, Tao M. Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters 2010; 14(10): 885-887.
Liu PSR, Maric I, Yates R. Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory 2008; 54(6): 2493-2507.
He X, Yener A. The Gaussian many-to-one interference channel with confidential messages. IEEE Transactions on Information Theory 2011; 57(5): 2730C2745.
Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributedop-timization and statistical learning via the alternating direction method of multipliers. Foundations and Trends® in Machine Learning 2008; 3(1): 1-122.
2009; 11
2009; 57
2010; 14
2010; 58
2006; 54
2008
2008; 7
2008; 54
2011; 57
2004
2011; 59
2008; 3
2013
1978; 24
2012; 23
2011; 6
2010; 9
e_1_2_8_17_1
e_1_2_8_18_1
e_1_2_8_19_1
e_1_2_8_13_1
e_1_2_8_14_1
e_1_2_8_15_1
Qing L (e_1_2_8_20_1) 2009; 11
e_1_2_8_16_1
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_4_1
e_1_2_8_7_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
e_1_2_8_10_1
e_1_2_8_11_1
e_1_2_8_12_1
Negi R (e_1_2_8_5_1) 2008; 7
References_xml – reference: Negi R, Goel S. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications 2008; 7(6): 2180C2189.
– reference: Fakoorian SAA, AL Swindlehurst. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security 2011; 6(3): 640-649.
– reference: Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributedop-timization and statistical learning via the alternating direction method of multipliers. Foundations and Trends® in Machine Learning 2008; 3(1): 1-122.
– reference: Lai L, El-Gamal H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory 2008; 54(9): 4005C4019.
– reference: Sahu RA, Padhye S. Identity-based multi-proxy multi-signature scheme provably secure in random oracle model. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2667.
– reference: Csiszar I, Korner J. Broadcast channels with confidential mes-sages. IEEE Transactions on Information Theory 1978; 24(3): 339C348.
– reference: Dahrouj H, Yu W. Coordinated beamforming for the multicell multi-antenna wireless system. IEEE Transactions on Wireless Communications 2010; 9(5): 1748-1759.
– reference: Liu PSR, Maric I, Yates R. Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory 2008; 54(6): 2493-2507.
– reference: Boyd S, Vandenberghe L. Convex Optimization. Cambridge University Press: Cambridge, 2004.
– reference: Wu WC. Robust pre-filtering based space division multiple access over multipath channels. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2634.
– reference: Abdel-Samad A, Davidson TN, Gershman AB. Robust transmit eigen beamforming based on imperfect channel state information. IEEE Transactions on Signal Processing 2006; 54(5): 1596-1609.
– reference: Zheng G, Choo LC, Wong KK. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing 2011; 59(3): 1317C1322.
– reference: Zhu J, Mo J, Tao M. Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters 2010; 14(10): 885-887.
– reference: Tajer A, Prasad N, Wang X. Beamforming and rate allocation in MISO cognitive radio networks. IEEE Transactions on Signal Processing 2010; 58(1): 362-377.
– reference: Labraoui N, Gueroui M, Aliouat M. Secure DV-hop loc- alization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies 2012; 23(4): 303-316.
– reference: He X, Yener A. The Gaussian many-to-one interference channel with confidential messages. IEEE Transactions on Information Theory 2011; 57(5): 2730C2745.
– reference: Zheng G, Wong KK, Ottersten B. Robust cognitive beamforming with bounded channel uncertainties. IEEE Transactions on Signal Processing 2009; 57(12): 4871-4881.
– reference: Qing L, Zhi T, Yue L. Distributed decision-making in wireless sensor networks for online structural health monitoring. Journal of Communications and Networks 2009; 11(4): 350,358.
– volume: 7
  start-page: 2180C2189
  issue: 6
  year: 2008
  article-title: Guaranteeing secrecy using artificial noise
  publication-title: IEEE Transactions on Wireless Communications
– volume: 54
  start-page: 1596
  issue: 5
  year: 2006
  end-page: 1609
  article-title: Robust transmit eigen beamforming based on imperfect channel state information
  publication-title: IEEE Transactions on Signal Processing
– year: 2013
  article-title: Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model
  publication-title: Transactions on Emerging Telecommunications Technologies
– year: 2013
  article-title: Robust pre‐filtering based space division multiple access over multipath channels
  publication-title: Transactions on Emerging Telecommunications Technologies
– volume: 11
  start-page: 350,358
  issue: 4
  year: 2009
  article-title: Distributed decision‐making in wireless sensor networks for online structural health monitoring
  publication-title: Journal of Communications and Networks
– volume: 23
  start-page: 303
  issue: 4
  year: 2012
  end-page: 316
  article-title: Secure DV‐hop loc‐ alization scheme against wormhole attacks in wireless sensor networks
  publication-title: Transactions on Emerging Telecommunications Technologies
– volume: 58
  start-page: 362
  issue: 1
  year: 2010
  end-page: 377
  article-title: Beamforming and rate allocation in MISO cognitive radio networks
  publication-title: IEEE Transactions on Signal Processing
– volume: 6
  start-page: 640
  issue: 3
  year: 2011
  end-page: 649
  article-title: MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 3
  start-page: 1
  issue: 1
  year: 2008
  end-page: 122
  article-title: Distributedop‐timization and statistical learning via the alternating direction method of multipliers
  publication-title: Foundations and Trends® in Machine Learning
– volume: 59
  start-page: 1317C1322
  issue: 3
  year: 2011
  article-title: Optimal cooperative jamming to enhance physical layer security using relays
  publication-title: IEEE Transactions on Signal Processing
– year: 2004
– volume: 9
  start-page: 1748
  issue: 5
  year: 2010
  end-page: 1759
  article-title: Coordinated beamforming for the multicell multi‐antenna wireless system
  publication-title: IEEE Transactions on Wireless Communications
– volume: 54
  start-page: 2493
  issue: 6
  year: 2008
  end-page: 2507
  article-title: Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
  publication-title: IEEE Transactions on Information Theory
– volume: 24
  start-page: 339C348
  issue: 3
  year: 1978
  article-title: Broadcast channels with confidential mes‐sages
  publication-title: IEEE Transactions on Information Theory
– start-page: 379C383
  year: 2008
– volume: 57
  start-page: 2730C2745
  issue: 5
  year: 2011
  article-title: The Gaussian many‐to‐one interference channel with confidential messages
  publication-title: IEEE Transactions on Information Theory
– volume: 57
  start-page: 4871
  issue: 12
  year: 2009
  end-page: 4881
  article-title: Robust cognitive beamforming with bounded channel uncertainties
  publication-title: IEEE Transactions on Signal Processing
– volume: 54
  start-page: 4005C4019
  issue: 9
  year: 2008
  article-title: The relay‐eavesdropper channel: Cooperation for secrecy
  publication-title: IEEE Transactions on Information Theory
– volume: 14
  start-page: 885
  issue: 10
  year: 2010
  end-page: 887
  article-title: Cooperative secret communication with artificial noise in symmetric interference channel
  publication-title: IEEE Communications Letters
– volume: 7
  start-page: 2180C2189
  issue: 6
  year: 2008
  ident: e_1_2_8_5_1
  article-title: Guaranteeing secrecy using artificial noise
  publication-title: IEEE Transactions on Wireless Communications
– ident: e_1_2_8_8_1
  doi: 10.1109/TIT.2008.921879
– ident: e_1_2_8_16_1
  doi: 10.1109/TWC.2010.05.090936
– ident: e_1_2_8_4_1
  doi: 10.1109/TIT.1978.1055892
– volume: 11
  start-page: 350,358
  issue: 4
  year: 2009
  ident: e_1_2_8_20_1
  article-title: Distributed decision‐making in wireless sensor networks for online structural health monitoring
  publication-title: Journal of Communications and Networks
– ident: e_1_2_8_2_1
  doi: 10.1002/ett.1532
– ident: e_1_2_8_6_1
  doi: 10.1109/TIT.2008.928272
– ident: e_1_2_8_7_1
  doi: 10.1109/TSP.2010.2092774
– ident: e_1_2_8_11_1
  doi: 10.1109/LCOMM.2010.081910.101121
– ident: e_1_2_8_12_1
  doi: 10.1109/TIFS.2011.2156788
– ident: e_1_2_8_18_1
  doi: 10.1109/TSP.2009.2031280
– ident: e_1_2_8_14_1
  doi: 10.1002/ett.2634
– ident: e_1_2_8_10_1
  doi: 10.1109/TIT.2011.2119650
– ident: e_1_2_8_19_1
  doi: 10.1109/TSP.2009.2027462
– ident: e_1_2_8_13_1
  doi: 10.1109/TSP.2006.872537
– ident: e_1_2_8_15_1
  doi: 10.1561/2200000016
– ident: e_1_2_8_9_1
  doi: 10.1109/ISIT.2008.4595012
– ident: e_1_2_8_17_1
  doi: 10.1017/CBO9780511804441
– ident: e_1_2_8_3_1
  doi: 10.1002/ett.2667
SSID ssj0000752548
Score 1.9506078
Snippet ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference...
In this paper, we address the optimization problems of downlink coordinated beamforming over the K ‐user multiple‐input single‐output interference channel with...
SourceID crossref
wiley
istex
SourceType Enrichment Source
Index Database
Publisher
StartPage 1020
Title A robust and distributed design for coordinated downlink beamforming for secure MISO interference channels
URI https://api.istex.fr/ark:/67375/WNG-955XHM2G-R/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.2816
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLbK-gIPiKsYNxkJwUOV0cR2Lo_V2FYQKxLrtIqXyHacETZSaFMN8R_5TxzbcZKhTBq89GJZUevz2Tnn5DvfQeilgt3HZO57ghHh0TBjXpxksPFYIFUY80RYguwsnB7T9wu2GAx-d1hLm0rsyF-9dSX_Y1UYA7vqKtl_sGxzURiAz2BfeAULw-u1bDwZrZZis7Yk8UxL4OruVeBCZoaXYSiEcgnhZVFyM6yV8SH4HAnFv2lv1dEo1zrrDhv83dFHIyCxcuqzui64tIrLjQ87b1uMm2cNusTYtDqqdE-dbsHJelS5zH2Hq7ivDIPgswJX_7R9LmLwVPwo2rGTOpc9Ky5U4QYXdROW3S-qPL2oC9nqtIVPGwJcb3rSpttaIhMcf4GvM2OJLfbcUT1j9fltC6cdTsed0xicp3Hnzg5fo967hlWhVZVW8vV7hLn_umE2NEa-OtO8uIilJ7ODNGFsMT0MDtJPN9AwiCLNGhhO3h5-OGqSfuCfQUBuuiS6f-IEkcfBG_cDLrlIQ73bf14OnYzvM7-DbtdBC55YBN5FA1XeQ7c6Upb30dcJtljEgEXcwSK2WMQAM9zBInZYxB0smkkWi1hjEXexiB0WH6Dj_b357tSr-3h4UjtIXsBinwgqdbCbyYhkWcCCTDLCQxIIkXM_IzIHPzWKCBE59WOlpE_FOOIJnBiEPERb5bJUjxDmEB7EImZ5lDDKKRecqohQRXkSxuPc30av3dKlsha5171WzlMrzx2ksMipXuRt9KKZ-d0Ku_TMeWVWv5lwlcFhojHPlVdK9-Zz_f74uld8gm62u-Yp2qpWG_UM3N9KPK9B9QfnI7dM
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+robust+and+distributed+design+for+coordinated+downlink+beamforming+for+secure+MISO+interference+channels&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Fei%2C+Zesong&rft.au=Ni%2C+Jiqing&rft.au=Wang%2C+Niwei&rft.au=Xing%2C+Chengwen&rft.date=2014-10-01&rft.pub=Blackwell+Publishing+Ltd&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=25&rft.issue=10&rft.spage=1020&rft.epage=1027&rft_id=info:doi/10.1002%2Fett.2816&rft.externalDBID=n%2Fa&rft.externalDocID=ark_67375_WNG_955XHM2G_R
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon