A robust and distributed design for coordinated downlink beamforming for secure MISO interference channels
ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐t...
Saved in:
Published in | Transactions on emerging telecommunications technologies Vol. 25; no. 10; pp. 1020 - 1027 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Blackwell Publishing Ltd
01.10.2014
|
Online Access | Get full text |
ISSN | 2161-3915 2161-3915 |
DOI | 10.1002/ett.2816 |
Cover
Abstract | ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd.
This paper studies the optimisation problems if downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratios and equivocation rates. Thus, the centralised and distributed algorithms are presented and discussed for both perfect and imperfect channel state information cases. |
---|---|
AbstractList | In this paper, we address the optimization problems of downlink coordinated beamforming over the K ‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd. ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratio and equivocation rates. For the case with perfect channel state information (CSI), by deriving the equivalent forms for the signal‐to‐interference plus noise ratio and the secrecy constraints, the optimization problem is reformulated as a second‐order cone programme problem. Then, an optimal distributed algorithm using the partial Lagrangian duality is discussed. In addition we extend the analysis to the imperfect CSI scenario with bounded ellipsoidal errors, the centralised algorithm has been proposed by solving a semi‐definite programme with the help of rank relaxation, whereas the distributed robust algorithm is devised by using ADMM. Finally, the simulation results have shown that with perfect CSI, the centralised and distributed algorithms have nearly the same performance, but in the case of imperfect CSI, the centralised algorithm shows a slightly better performance. Copyright © 2014 John Wiley & Sons, Ltd. This paper studies the optimisation problems if downlink coordinated beamforming over the K‐user multiple‐input single‐output interference channel with confidential messages. Our design objective is to minimise the total transmit power subject to the constraints of individual signal‐to‐interference plus noise ratios and equivocation rates. Thus, the centralised and distributed algorithms are presented and discussed for both perfect and imperfect channel state information cases. |
Author | Kuang, Jingming Xing, Chengwen Fei, Zesong Wang, Niwei Ni, Jiqing |
Author_xml | – sequence: 1 givenname: Zesong surname: Fei fullname: Fei, Zesong email: Correspondence: Zesong Fei, School of Information and Electronics, Beijing Institute of Technology, Beijing, 100081, China., feizesong@bit.edu.cn organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China – sequence: 2 givenname: Jiqing surname: Ni fullname: Ni, Jiqing organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China – sequence: 3 givenname: Niwei surname: Wang fullname: Wang, Niwei organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China – sequence: 4 givenname: Chengwen surname: Xing fullname: Xing, Chengwen organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China – sequence: 5 givenname: Jingming surname: Kuang fullname: Kuang, Jingming organization: School of Information and Electronics, Beijing Institute of Technology, 100081, Beijing, China |
BookMark | eNp1kM1OAjEUhRuDiYgkPkKXbgan7XQGloQgkIAkitFd0-ncwcLQmrYEeXsHMEaN3s39-85ZnEvUMNYAQtck7pA4prcQQod2SXqGmpSkJGI9whvf5gvU9n4V15VxypNuE6362Nl86wOWpsCF9sHpfBugnsHrpcGldVhZ6wpt5PFsd6bSZo1zkJv6udFmeYQ8qK0DPJs8zrE2AVwJDowCrF6lMVD5K3ReyspD-7O30NPdcDEYR9P5aDLoTyPFYpZGlHcJy5N6SZNCZawoKKeF4kymjOZ5KUnBVEkpyzLG8jIhXQBFkjzOZI8qYKyFbk6-ylnvHZTizemNdHtBYnGISdQxiUNMNdr5hSodZNDWBCd19ZcgOgl2uoL9v8ZiuFj85Otg4f2Ll24t0oxlXDzfj0SP85fxjI7EA_sAiYCLXw |
CitedBy_id | crossref_primary_10_1002_ett_3276 crossref_primary_10_1002_dac_4821 crossref_primary_10_1002_ett_2924 crossref_primary_10_1109_TWC_2015_2412531 crossref_primary_10_1109_TWC_2014_2326415 |
Cites_doi | 10.1109/TIT.2008.921879 10.1109/TWC.2010.05.090936 10.1109/TIT.1978.1055892 10.1002/ett.1532 10.1109/TIT.2008.928272 10.1109/TSP.2010.2092774 10.1109/LCOMM.2010.081910.101121 10.1109/TIFS.2011.2156788 10.1109/TSP.2009.2031280 10.1002/ett.2634 10.1109/TIT.2011.2119650 10.1109/TSP.2009.2027462 10.1109/TSP.2006.872537 10.1561/2200000016 10.1109/ISIT.2008.4595012 10.1017/CBO9780511804441 10.1002/ett.2667 |
ContentType | Journal Article |
Copyright | Copyright © 2014 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: Copyright © 2014 John Wiley & Sons, Ltd. |
DBID | BSCLL AAYXX CITATION |
DOI | 10.1002/ett.2816 |
DatabaseName | Istex CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2161-3915 |
EndPage | 1027 |
ExternalDocumentID | 10_1002_ett_2816 ETT2816 ark_67375_WNG_955XHM2G_R |
Genre | article |
GroupedDBID | .GA .Y3 05W 1OC 31~ 50Z 8-0 8-1 8-3 8-4 8-5 930 A03 AAEVG AAHHS AANLZ AAXRX AAZKR ABCUV ACAHQ ACBWZ ACCFJ ACCZN ACPOU ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN AEEZP AEGXH AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ATUGU AUFTA AZFZN BDRZF BFHJK BHBCM BMNLL BMXJE BRXPI BSCLL D-E D-F DCZOG DPXWK DRFUL DRSTM EBS EJD F00 F01 F04 F21 G-S GODZA HGLYW IN- LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM RX1 SUPJJ V2E WIH WIK WXSBR AAHQN AAMNL AANHP AAYCA ACRPL ACYXJ ADNMO AFWVQ ALVPJ AAYXX ADMLS AGHNM AGQPQ AGYGG CITATION |
ID | FETCH-LOGICAL-c3036-25813b4c3064dc73dd252dc53a632bbfa1d3cf2237733bf418eec14b07a92ce33 |
ISSN | 2161-3915 |
IngestDate | Tue Jul 01 04:52:34 EDT 2025 Thu Apr 24 23:03:43 EDT 2025 Wed Jan 22 16:48:29 EST 2025 Wed Oct 30 09:46:12 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Language | English |
License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c3036-25813b4c3064dc73dd252dc53a632bbfa1d3cf2237733bf418eec14b07a92ce33 |
Notes | ark:/67375/WNG-955XHM2G-R ArticleID:ETT2816 istex:ACC0C04FD53FE257E663B35AD64F14A1F0BB844C |
PageCount | 8 |
ParticipantIDs | crossref_primary_10_1002_ett_2816 crossref_citationtrail_10_1002_ett_2816 wiley_primary_10_1002_ett_2816_ETT2816 istex_primary_ark_67375_WNG_955XHM2G_R |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-10 October 2014 2014-10-00 |
PublicationDateYYYYMMDD | 2014-10-01 |
PublicationDate_xml | – month: 10 year: 2014 text: 2014-10 |
PublicationDecade | 2010 |
PublicationTitle | Transactions on emerging telecommunications technologies |
PublicationTitleAlternate | Trans Emerging Tel Tech |
PublicationYear | 2014 |
Publisher | Blackwell Publishing Ltd |
Publisher_xml | – name: Blackwell Publishing Ltd |
References | Lai L, El-Gamal H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory 2008; 54(9): 4005C4019. Negi R, Goel S. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications 2008; 7(6): 2180C2189. Zheng G, Wong KK, Ottersten B. Robust cognitive beamforming with bounded channel uncertainties. IEEE Transactions on Signal Processing 2009; 57(12): 4871-4881. Dahrouj H, Yu W. Coordinated beamforming for the multicell multi-antenna wireless system. IEEE Transactions on Wireless Communications 2010; 9(5): 1748-1759. Tajer A, Prasad N, Wang X. Beamforming and rate allocation in MISO cognitive radio networks. IEEE Transactions on Signal Processing 2010; 58(1): 362-377. Abdel-Samad A, Davidson TN, Gershman AB. Robust transmit eigen beamforming based on imperfect channel state information. IEEE Transactions on Signal Processing 2006; 54(5): 1596-1609. Csiszar I, Korner J. Broadcast channels with confidential mes-sages. IEEE Transactions on Information Theory 1978; 24(3): 339C348. Boyd S, Vandenberghe L. Convex Optimization. Cambridge University Press: Cambridge, 2004. Wu WC. Robust pre-filtering based space division multiple access over multipath channels. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2634. Qing L, Zhi T, Yue L. Distributed decision-making in wireless sensor networks for online structural health monitoring. Journal of Communications and Networks 2009; 11(4): 350,358. Zheng G, Choo LC, Wong KK. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing 2011; 59(3): 1317C1322. Labraoui N, Gueroui M, Aliouat M. Secure DV-hop loc- alization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies 2012; 23(4): 303-316. Fakoorian SAA, AL Swindlehurst. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security 2011; 6(3): 640-649. Sahu RA, Padhye S. Identity-based multi-proxy multi-signature scheme provably secure in random oracle model. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2667. Zhu J, Mo J, Tao M. Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters 2010; 14(10): 885-887. Liu PSR, Maric I, Yates R. Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory 2008; 54(6): 2493-2507. He X, Yener A. The Gaussian many-to-one interference channel with confidential messages. IEEE Transactions on Information Theory 2011; 57(5): 2730C2745. Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributedop-timization and statistical learning via the alternating direction method of multipliers. Foundations and Trends® in Machine Learning 2008; 3(1): 1-122. 2009; 11 2009; 57 2010; 14 2010; 58 2006; 54 2008 2008; 7 2008; 54 2011; 57 2004 2011; 59 2008; 3 2013 1978; 24 2012; 23 2011; 6 2010; 9 e_1_2_8_17_1 e_1_2_8_18_1 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_14_1 e_1_2_8_15_1 Qing L (e_1_2_8_20_1) 2009; 11 e_1_2_8_16_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_4_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_10_1 e_1_2_8_11_1 e_1_2_8_12_1 Negi R (e_1_2_8_5_1) 2008; 7 |
References_xml | – reference: Negi R, Goel S. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications 2008; 7(6): 2180C2189. – reference: Fakoorian SAA, AL Swindlehurst. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security 2011; 6(3): 640-649. – reference: Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributedop-timization and statistical learning via the alternating direction method of multipliers. Foundations and Trends® in Machine Learning 2008; 3(1): 1-122. – reference: Lai L, El-Gamal H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory 2008; 54(9): 4005C4019. – reference: Sahu RA, Padhye S. Identity-based multi-proxy multi-signature scheme provably secure in random oracle model. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2667. – reference: Csiszar I, Korner J. Broadcast channels with confidential mes-sages. IEEE Transactions on Information Theory 1978; 24(3): 339C348. – reference: Dahrouj H, Yu W. Coordinated beamforming for the multicell multi-antenna wireless system. IEEE Transactions on Wireless Communications 2010; 9(5): 1748-1759. – reference: Liu PSR, Maric I, Yates R. Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory 2008; 54(6): 2493-2507. – reference: Boyd S, Vandenberghe L. Convex Optimization. Cambridge University Press: Cambridge, 2004. – reference: Wu WC. Robust pre-filtering based space division multiple access over multipath channels. Transactions on Emerging Telecommunications Technologies 2013. DOI: 10.1002/ett.2634. – reference: Abdel-Samad A, Davidson TN, Gershman AB. Robust transmit eigen beamforming based on imperfect channel state information. IEEE Transactions on Signal Processing 2006; 54(5): 1596-1609. – reference: Zheng G, Choo LC, Wong KK. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing 2011; 59(3): 1317C1322. – reference: Zhu J, Mo J, Tao M. Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters 2010; 14(10): 885-887. – reference: Tajer A, Prasad N, Wang X. Beamforming and rate allocation in MISO cognitive radio networks. IEEE Transactions on Signal Processing 2010; 58(1): 362-377. – reference: Labraoui N, Gueroui M, Aliouat M. Secure DV-hop loc- alization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies 2012; 23(4): 303-316. – reference: He X, Yener A. The Gaussian many-to-one interference channel with confidential messages. IEEE Transactions on Information Theory 2011; 57(5): 2730C2745. – reference: Zheng G, Wong KK, Ottersten B. Robust cognitive beamforming with bounded channel uncertainties. IEEE Transactions on Signal Processing 2009; 57(12): 4871-4881. – reference: Qing L, Zhi T, Yue L. Distributed decision-making in wireless sensor networks for online structural health monitoring. Journal of Communications and Networks 2009; 11(4): 350,358. – volume: 7 start-page: 2180C2189 issue: 6 year: 2008 article-title: Guaranteeing secrecy using artificial noise publication-title: IEEE Transactions on Wireless Communications – volume: 54 start-page: 1596 issue: 5 year: 2006 end-page: 1609 article-title: Robust transmit eigen beamforming based on imperfect channel state information publication-title: IEEE Transactions on Signal Processing – year: 2013 article-title: Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model publication-title: Transactions on Emerging Telecommunications Technologies – year: 2013 article-title: Robust pre‐filtering based space division multiple access over multipath channels publication-title: Transactions on Emerging Telecommunications Technologies – volume: 11 start-page: 350,358 issue: 4 year: 2009 article-title: Distributed decision‐making in wireless sensor networks for online structural health monitoring publication-title: Journal of Communications and Networks – volume: 23 start-page: 303 issue: 4 year: 2012 end-page: 316 article-title: Secure DV‐hop loc‐ alization scheme against wormhole attacks in wireless sensor networks publication-title: Transactions on Emerging Telecommunications Technologies – volume: 58 start-page: 362 issue: 1 year: 2010 end-page: 377 article-title: Beamforming and rate allocation in MISO cognitive radio networks publication-title: IEEE Transactions on Signal Processing – volume: 6 start-page: 640 issue: 3 year: 2011 end-page: 649 article-title: MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design publication-title: IEEE Transactions on Information Forensics and Security – volume: 3 start-page: 1 issue: 1 year: 2008 end-page: 122 article-title: Distributedop‐timization and statistical learning via the alternating direction method of multipliers publication-title: Foundations and Trends® in Machine Learning – volume: 59 start-page: 1317C1322 issue: 3 year: 2011 article-title: Optimal cooperative jamming to enhance physical layer security using relays publication-title: IEEE Transactions on Signal Processing – year: 2004 – volume: 9 start-page: 1748 issue: 5 year: 2010 end-page: 1759 article-title: Coordinated beamforming for the multicell multi‐antenna wireless system publication-title: IEEE Transactions on Wireless Communications – volume: 54 start-page: 2493 issue: 6 year: 2008 end-page: 2507 article-title: Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions publication-title: IEEE Transactions on Information Theory – volume: 24 start-page: 339C348 issue: 3 year: 1978 article-title: Broadcast channels with confidential mes‐sages publication-title: IEEE Transactions on Information Theory – start-page: 379C383 year: 2008 – volume: 57 start-page: 2730C2745 issue: 5 year: 2011 article-title: The Gaussian many‐to‐one interference channel with confidential messages publication-title: IEEE Transactions on Information Theory – volume: 57 start-page: 4871 issue: 12 year: 2009 end-page: 4881 article-title: Robust cognitive beamforming with bounded channel uncertainties publication-title: IEEE Transactions on Signal Processing – volume: 54 start-page: 4005C4019 issue: 9 year: 2008 article-title: The relay‐eavesdropper channel: Cooperation for secrecy publication-title: IEEE Transactions on Information Theory – volume: 14 start-page: 885 issue: 10 year: 2010 end-page: 887 article-title: Cooperative secret communication with artificial noise in symmetric interference channel publication-title: IEEE Communications Letters – volume: 7 start-page: 2180C2189 issue: 6 year: 2008 ident: e_1_2_8_5_1 article-title: Guaranteeing secrecy using artificial noise publication-title: IEEE Transactions on Wireless Communications – ident: e_1_2_8_8_1 doi: 10.1109/TIT.2008.921879 – ident: e_1_2_8_16_1 doi: 10.1109/TWC.2010.05.090936 – ident: e_1_2_8_4_1 doi: 10.1109/TIT.1978.1055892 – volume: 11 start-page: 350,358 issue: 4 year: 2009 ident: e_1_2_8_20_1 article-title: Distributed decision‐making in wireless sensor networks for online structural health monitoring publication-title: Journal of Communications and Networks – ident: e_1_2_8_2_1 doi: 10.1002/ett.1532 – ident: e_1_2_8_6_1 doi: 10.1109/TIT.2008.928272 – ident: e_1_2_8_7_1 doi: 10.1109/TSP.2010.2092774 – ident: e_1_2_8_11_1 doi: 10.1109/LCOMM.2010.081910.101121 – ident: e_1_2_8_12_1 doi: 10.1109/TIFS.2011.2156788 – ident: e_1_2_8_18_1 doi: 10.1109/TSP.2009.2031280 – ident: e_1_2_8_14_1 doi: 10.1002/ett.2634 – ident: e_1_2_8_10_1 doi: 10.1109/TIT.2011.2119650 – ident: e_1_2_8_19_1 doi: 10.1109/TSP.2009.2027462 – ident: e_1_2_8_13_1 doi: 10.1109/TSP.2006.872537 – ident: e_1_2_8_15_1 doi: 10.1561/2200000016 – ident: e_1_2_8_9_1 doi: 10.1109/ISIT.2008.4595012 – ident: e_1_2_8_17_1 doi: 10.1017/CBO9780511804441 – ident: e_1_2_8_3_1 doi: 10.1002/ett.2667 |
SSID | ssj0000752548 |
Score | 1.9506078 |
Snippet | ABSTRACTIn this paper, we address the optimization problems of downlink coordinated beamforming over the K‐user multiple‐input single‐output interference... In this paper, we address the optimization problems of downlink coordinated beamforming over the K ‐user multiple‐input single‐output interference channel with... |
SourceID | crossref wiley istex |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 1020 |
Title | A robust and distributed design for coordinated downlink beamforming for secure MISO interference channels |
URI | https://api.istex.fr/ark:/67375/WNG-955XHM2G-R/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.2816 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLbK-gIPiKsYNxkJwUOV0cR2Lo_V2FYQKxLrtIqXyHacETZSaFMN8R_5TxzbcZKhTBq89GJZUevz2Tnn5DvfQeilgt3HZO57ghHh0TBjXpxksPFYIFUY80RYguwsnB7T9wu2GAx-d1hLm0rsyF-9dSX_Y1UYA7vqKtl_sGxzURiAz2BfeAULw-u1bDwZrZZis7Yk8UxL4OruVeBCZoaXYSiEcgnhZVFyM6yV8SH4HAnFv2lv1dEo1zrrDhv83dFHIyCxcuqzui64tIrLjQ87b1uMm2cNusTYtDqqdE-dbsHJelS5zH2Hq7ivDIPgswJX_7R9LmLwVPwo2rGTOpc9Ky5U4QYXdROW3S-qPL2oC9nqtIVPGwJcb3rSpttaIhMcf4GvM2OJLfbcUT1j9fltC6cdTsed0xicp3Hnzg5fo967hlWhVZVW8vV7hLn_umE2NEa-OtO8uIilJ7ODNGFsMT0MDtJPN9AwiCLNGhhO3h5-OGqSfuCfQUBuuiS6f-IEkcfBG_cDLrlIQ73bf14OnYzvM7-DbtdBC55YBN5FA1XeQ7c6Upb30dcJtljEgEXcwSK2WMQAM9zBInZYxB0smkkWi1hjEXexiB0WH6Dj_b357tSr-3h4UjtIXsBinwgqdbCbyYhkWcCCTDLCQxIIkXM_IzIHPzWKCBE59WOlpE_FOOIJnBiEPERb5bJUjxDmEB7EImZ5lDDKKRecqohQRXkSxuPc30av3dKlsha5171WzlMrzx2ksMipXuRt9KKZ-d0Ku_TMeWVWv5lwlcFhojHPlVdK9-Zz_f74uld8gm62u-Yp2qpWG_UM3N9KPK9B9QfnI7dM |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+robust+and+distributed+design+for+coordinated+downlink+beamforming+for+secure+MISO+interference+channels&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Fei%2C+Zesong&rft.au=Ni%2C+Jiqing&rft.au=Wang%2C+Niwei&rft.au=Xing%2C+Chengwen&rft.date=2014-10-01&rft.pub=Blackwell+Publishing+Ltd&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=25&rft.issue=10&rft.spage=1020&rft.epage=1027&rft_id=info:doi/10.1002%2Fett.2816&rft.externalDBID=n%2Fa&rft.externalDocID=ark_67375_WNG_955XHM2G_R |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon |