876 research outputs found

    Secrecy Energy Efficiency of MIMOME Wiretap Channels with Full-Duplex Jamming

    Full text link
    Full-duplex (FD) jamming transceivers are recently shown to enhance the information security of wireless communication systems by simultaneously transmitting artificial noise (AN) while receiving information. In this work, we investigate if FD jamming can also improve the systems secrecy energy efficiency (SEE) in terms of securely communicated bits-per- Joule, when considering the additional power used for jamming and self-interference (SI) cancellation. Moreover, the degrading effect of the residual SI is also taken into account. In this regard, we formulate a set of SEE maximization problems for a FD multiple-input-multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel, considering both cases where exact or statistical channel state information (CSI) is available. Due to the intractable problem structure, we propose iterative solutions in each case with a proven convergence to a stationary point. Numerical simulations indicate only a marginal SEE gain, through the utilization of FD jamming, for a wide range of system conditions. However, when SI can efficiently be mitigated, the observed gain is considerable for scenarios with a small distance between the FD node and the eavesdropper, a high Signal-to-noise ratio (SNR), or for a bidirectional FD communication setup.Comment: IEEE Transactions on Communication

    An Algorithm for Global Maximization of Secrecy Rates in Gaussian MIMO Wiretap Channels

    Full text link
    Optimal signaling for secrecy rate maximization in Gaussian MIMO wiretap channels is considered. While this channel has attracted a significant attention recently and a number of results have been obtained, including the proof of the optimality of Gaussian signalling, an optimal transmit covariance matrix is known for some special cases only and the general case remains an open problem. An iterative custom-made algorithm to find a globally-optimal transmit covariance matrix in the general case is developed in this paper, with guaranteed convergence to a \textit{global} optimum. While the original optimization problem is not convex and hence difficult to solve, its minimax reformulation can be solved via the convex optimization tools, which is exploited here. The proposed algorithm is based on the barrier method extended to deal with a minimax problem at hand. Its convergence to a global optimum is proved for the general case (degraded or not) and a bound for the optimality gap is given for each step of the barrier method. The performance of the algorithm is demonstrated via numerical examples. In particular, 20 to 40 Newton steps are already sufficient to solve the sufficient optimality conditions with very high precision (up to the machine precision level), even for large systems. Even fewer steps are required if the secrecy capacity is the only quantity of interest. The algorithm can be significantly simplified for the degraded channel case and can also be adopted to include the per-antenna power constraints (instead or in addition to the total power constraint). It also solves the dual problem of minimizing the total power subject to the secrecy rate constraint.Comment: accepted by IEEE Transactions on Communication

    Transmitter Optimization Techniques for Physical Layer Security

    Get PDF
    Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications. This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm

    Optimization techniques for reliable data communication in multi-antenna wireless systems

    Get PDF
    This thesis looks at new methods of achieving reliable data communication in wireless communication systems using different antenna transmission optimization methods. In particular, the problems of exploitation of MIMO communication channel diversity, secure downlink beamforming techniques, adaptive beamforming techniques, resource allocation methods, simultaneous power and information transfer and energy harvesting within the context of multi-antenna wireless systems are addressed
    • …
    corecore