Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/29472
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDai, J-
dc.contributor.authorLiu, C-
dc.contributor.authorPan, C-
dc.contributor.authorWang, K-
dc.date.accessioned2024-08-01T14:28:03Z-
dc.date.available2024-08-01T14:28:03Z-
dc.date.issued2024-06-18-
dc.identifierORCiD: Jianxin Dai https://orcid.org/0000-0001-5735-4000-
dc.identifierORCiD: Cunzhen Liu https://orcid.org/0009-0007-3411-1824-
dc.identifierORCiD: Cunhua Pan https://orcid.org/0000-0001-5286-7958-
dc.identifierORCiD: Kezhi Wang https://orcid.org/0000-0001-8602-0800-
dc.identifier.citationDai, J. et al. (2024) 'Secure Downlink Transmission for Integrated Sensing, Energy, and Communication Systems', IEEE Communications Letters, 0 (early access), pp. 1 - 5. doi: 10.1109/LCOMM.2024.3416218.en_US
dc.identifier.issn1089-7798-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/29472-
dc.description.abstractThis paper proposes an integrated sensing, energy, and communication (ISEAC) system that considers secure communication. In this system, the base station (BS) is serving as one legitimate single-antenna information receiver (IR) whose position is known and multiple single-antenna energy receivers (ERs) that are considered as eavesdroppers whose locations are unknown and need to be detected. First, we propose a framework for designing transmitter beamforming to maximize the system secrecy rate under the energy-harvesting constraint and the sensing constraints. Next, we study the beamforming design of the system under imperfect channel status information (CSI). For the non-convex equations in these two cases, we use semidefinite relaxation (SDR) and Taylor expansion to transform the problem to the convex form. Finally, the simulation results verify the effective performance of the proposed optimal beamforming design.en_US
dc.description.sponsorship10.13039/501100015013-National Mobile Communications Research Laboratory, Southeast University (Grant Number: 2023D03)en_US
dc.format.extent1 - 5-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelinesand-policies/post-publication-policies/-
dc.subjectintegrated sensing, energy, and communication (ISEAC)en_US
dc.subjectsecrecy rateen_US
dc.subjectimperfect channel status information (CSI)en_US
dc.subjectTaylor series expansionen_US
dc.titleSecure Downlink Transmission for Integrated Sensing, Energy, and Communication Systemsen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1109/LCOMM.2024.3416218-
dc.relation.isPartOfIEEE Communications Letters-
pubs.issueearly access-
pubs.publication-statusPublished-
pubs.volume0-
dc.identifier.eissn1558-2558-
dc.rights.licensehttps://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelinesand-policies/post-publication-policies/-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelinesand-policies/post-publication-policies/2.9 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.