Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay

@article{Mo2014SecureBF,
  title={Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay},
  author={Jianhua Mo and Meixia Tao and Yuan Liu and Rui Wang},
  journal={IEEE Transactions on Signal Processing},
  year={2014},
  volume={62},
  pages={2185-2199}
}
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper. Both two-phase and three-phase two-way relay strategies are considered. Our goal is to jointly optimize the source and relay beamformers for maximizing the secrecy sum rate of the two-way communications. We first derive the optimal relay… CONTINUE READING
Highly Cited
This paper has 128 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 4 times. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-10 of 71 extracted citations

Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security

IEEE Transactions on Information Forensics and Security • 2019
View 5 Excerpts
Highly Influenced

Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks

2018 IEEE International Conference on Communications (ICC) • 2018
View 2 Excerpts

128 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 128 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 40 references

Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel

IEEE Transactions on Information Theory • 2010
View 4 Excerpts
Highly Influenced

Secure beamforming for MIMO two-way transmission with an untrusted relay

2013 IEEE Wireless Communications and Networking Conference (WCNC) • 2013
View 2 Excerpts

Improving Wireless Security for Bidirectional Communication Scenarios

IEEE Transactions on Vehicular Technology • 2012
View 1 Excerpt

Numerical methods for computing angles between linear subspaces

G. H. Golub
Math . Comput . • 2012

Similar Papers

Loading similar papers…