A hybrid approach to spatial multiplexing in multiuser MIMO downlinks
EURASIP Journal on Wireless Communications and Networking - Special issue on multiuser MIMO networks
Fixed SINR solutions for the MIMO wiretap channel
ICASSP '09 Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
Secure transmission with multiple antennas: part II: the MIMOME wiretap channel
IEEE Transactions on Information Theory
On downlink beamforming with greedy user selection: performance analysis and a simple new algorithm
IEEE Transactions on Signal Processing - Part I
Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels
IEEE Transactions on Signal Processing
Low complexity user selection algorithms for multiuser MIMO systems with block diagonalization
IEEE Transactions on Signal Processing
Guaranteeing Secrecy using Artificial Noise
IEEE Transactions on Wireless Communications
On the User Selection for MIMO Broadcast Channels
IEEE Transactions on Information Theory
Secure Broadcasting Over Fading Channels
IEEE Transactions on Information Theory
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Hi-index | 0.00 |
This paper investigates simple user selection strategies in a multiuser downlink system with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and we examine the MIMO downlink channel with either single or multiple data streams per receiver. The transmitter uses linear beamforming techniques based on generalized zero-forcing with a corresponding minimum SINR or rate requirement per receiver. In both cases the information signal is transmitted with just enough power to guarantee the desired Quality-of-Service (QoS) at the desired receivers, while the remainder of the power is used to broadcast artificial noise that selectively degrades the passive eavesdropper's signal. Numerical simulations displaying the power consumption and the number of selected users provided by each selection scheme demonstrate the effectiveness of the proposed schedulers in ensuring physical-layer security.