15 research outputs found
Secrecy Outage and Diversity Analysis of Cognitive Radio Systems
In this paper, we investigate the physical-layer security of a multi-user
multi-eavesdropper cognitive radio system, which is composed of multiple
cognitive users (CUs) transmitting to a common cognitive base station (CBS),
while multiple eavesdroppers may collaborate with each other or perform
independently in intercepting the CUs-CBS transmissions, which are called the
coordinated and uncoordinated eavesdroppers, respectively. Considering multiple
CUs available, we propose the round-robin scheduling as well as the optimal and
suboptimal user scheduling schemes for improving the security of CUs-CBS
transmissions against eavesdropping attacks. Specifically, the optimal user
scheduling is designed by assuming that the channel state information (CSI) of
all links from CUs to CBS, to primary user (PU) and to eavesdroppers are
available. By contrast, the suboptimal user scheduling only requires the CSI of
CUs-CBS links without the PU's and eavesdroppers' CSI. We derive closed-form
expressions of the secrecy outage probability of these three scheduling schemes
in the presence of the coordinated and uncoordinated eavesdroppers. We also
carry out the secrecy diversity analysis and show that the round-robin
scheduling achieves the diversity order of only one, whereas the optimal and
suboptimal scheduling schemes obtain the full secrecy diversity, no matter
whether the eavesdroppers collaborate or not. In addition, numerical secrecy
outage results demonstrate that for both the coordinated and uncoordinated
eavesdroppers, the optimal user scheduling achieves the best security
performance and the round-robin scheduling performs the worst. Finally, upon
increasing the number of CUs, the secrecy outage probabilities of the optimal
and suboptimal user scheduling schemes both improve significantly.Comment: 16 pages, 5 figures, accepted to appear, IEEE Journal on Selected
Areas in Communications, 201
On the Interference Alignment Designs for Secure Multiuser MIMO Systems
In this paper, we propose two secure multiuser multiple-input multiple-output
transmission approaches based on interference alignment (IA) in the presence of
an eavesdropper. To deal with the information leakage to the eavesdropper as
well as the interference signals from undesired transmitters (Txs) at desired
receivers (Rxs), our approaches aim to design the transmit precoding and
receive subspace matrices to minimize both the total inter-main-link
interference and the wiretapped signals (WSs). The first proposed IA scheme
focuses on aligning the WSs into proper subspaces while the second one imposes
a new structure on the precoding matrices to force the WSs to zero. When the
channel state information is perfectly known at all Txs, in each proposed IA
scheme, the precoding matrices at Txs and the receive subspaces at Rxs or the
eavesdropper are alternatively selected to minimize the cost function of an
convex optimization problem for every iteration. We provide the feasible
conditions and the proofs of convergence for both IA approaches. The simulation
results indicate that our two IA approaches outperform the conventional IA
algorithm in terms of average secrecy sum rate.Comment: Updated version, updated author list, accepted to be appear in IEICE
Transaction
Privacy preservation via beamforming for NOMA
Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for 5G mobile systems because of its superior spectrum efļ¬ciency. However, the privacy between the NOMA users may be compromised due to the transmission of a superposition of all usersā signals to successive interference cancellation (SIC) receivers. In this paper, we propose two schemes based on beamforming optimization for NOMA that can enhance the security of a speciļ¬c private user while guaranteeing the other usersā quality of service (QoS). Speciļ¬cally, in the ļ¬rst scheme, when the transmit antennas are inadequate, we intend to maximize the secrecy rate of the private user, under the constraint that the other usersā QoS is satisļ¬ed. In the second scheme, the private userās signal is zero-forced at the other users when redundant antennas are available. In this case, the transmission rate of the private user is also maximized while satisfying the QoS of the other users. Due to the nonconvexity of optimization in these two schemes, we ļ¬rst convert them into convex forms and then, an iterative algorithm based on the ConCave-Convex Procedure is proposed to obtain their solutions. Extensive simulation results are presented to evaluate the effectiveness of the proposed scheme
Energy-Efficient Hybrid Beamforming for Multi-Layer RIS-Assisted Secure Integrated Terrestrial-Aerial Networks
The integration of aerial platforms to provide ubiquitous coverage and connectivity for densely deployed terrestrial networks is expected to be a reality in the emerging sixth-generation networks. Energy-effificient and secure transmission designs are two important components for integrated terrestrial-aerial networks (ITAN). Inlight of the potential of reconfigurable intelligent surface (RIS) for significantly reducing the system power consumption and boosting information security, this paper proposes a multi-layer RIS-assisted secure ITAN architecture to defend against simultaneous jamming and eavesdropping attacks, and investigates energy-efficient hybrid beamforming for it. Specifically, with the availability of imperfect angular channel state information (CSI), we propose a block coordinate descent (BCD) framework for the joint optimization of the user’s received decoder, the terrestrial and aerial digital precoder, and the multi-layer RIS analog precoder to maximize the system energy efficiency (EE) performance. For the design of the received decoder, a heuristic beamforming scheme is proposed to convert the worst-case design problem into a min-max one and facilitate the developing a closed-form solution. For the design of the digital precoder, we propose an iterative sequential convex approximation approach via capitalizing the auxiliary variables and first-order Taylor series expansion. Finally, a monotonic vertex-update algorithm with a penalty convex-concave procedure (P-CCP) is proposed to obtain the analog precoder with satisfactory performance. Numerical results show the superiority and effectiveness of the proposed optimization framework and architecture over various benchmark schemes
1 Energy-Efficient Hybrid Beamforming for Multi-Layer RIS-Assisted Secure Integrated Terrestrial-Aerial Network
The integration of aerial platforms to provide ubiq-
uitous coverage and connectivity for densely deployed terrestrial
networks is expected to be a reality in emerging sixth-generation
networks. Energy-effificient design and secure transmission are
two crucial issues for integrated terrestrial-aerial networks.
With this focus, due to the potential of RIS in substantially
saving power consumption and boosting the security of private
information by enabling a smart radio environment, this paper
investigates the energy-efficient hybrid beamforming for multi-
layer reconfigurable intelligent surface (RIS)-assisted secure in-
tegrated terrestrial-aerial network for defending against simul-
taneous jamming and eavesdropping attacks. Specifically, with
the available of angular information based imperfect channel
state information (CSI), we propose a framework for the joint
optimization of userās received precoder, terrestrial BSās and
HAPās digital precoder, and multi-layer RIS analog precoder
to maximize the system energy efficiency (EE) performance. For
the design of received precoder, a heuristic beamforming scheme
is proposed to convert the worst-case problem into a min-max
one such that a closed-form solution is derived. For the design
of digital precoder, we propose an iterative sequential convex
approximation approach via capitalizing the auxiliary variables
and first-order Taylor series expansion. Finally, a monotonic
vertex-update algorithm with penalty convex concave procedure
is proposed to obtain analog precoder with low computational
complexity. Numerical results show the superiority and effective-
ness of proposed optimization framework and architectur
Design and performance analysis of optical attocell networks
The exponentially increasing demand for high-speed wireless communications will no longer
be satisfied by the traditional radio frequency (RF) in the near future due to its limited spectrum
and overutilization. To resolve this imminent issue, industrial and research communities have
been looking into alternative technologies for communication. Among them, visible light communication
(VLC) has attracted much attention because it utilizes the unlicensed, free and safe
spectrum, whose bandwidth is thousand times larger than the entire RF spectrum. Moreover,
VLC can be integrated into existing lighting systems to offer a dual-purpose, cost-effective and
energy-efficient solution for next-generation small-cell networks (SCNs), giving birth to the
concept of optical attocell networks.
Most relevant works in the literature rely on system simulations to quantify the performance
of attocell networks, which suffer from high computational complexity and provide limited
insights about the network. Mathematical tools, on the other hand, are more tractable and
scalable and are shown to closely approximate practical systems. The presented work utilizes
stochastic geometry for downlink evaluation of optical attocell networks, where the co-channel
interference (CCI) surpasses noise and becomes the limiting factor of the link throughput. By
studying the moment generating function (MGF) of the aggregate interference, a theoretical
framework for modeling the distribution of signal-to-interference-plus-noise ratio (SINR) is
presented, which allows important performance metrics such as the coverage probability and
link throughput to be derived. Depending on the source of interference, CCI can be classified
into two categories: inter-cell interference (ICI) and intra-cell interference. In this work,
both types of interference are characterized, based on which effective interference mitigation
techniques such as the coordinated multipoint (CoMP), power-domain multiplexing and successive
interference cancellation (SIC) are devised. The proposed mathematical framework is
applicable to attocell networks with and without such interference mitigation techniques.
Compared to RF networks, optical attocell networks are inherently more secure in the physical
layer because visible light does not penetrate through opaque walls. This work analytically
quantifies the physical-layer security of attocell networks from an information-theoretic point of
view. Secrecy enhancement techniques such as AP cooperation and eavesdropper-free protected
zones are also discussed. It is shown that compared to AP cooperation, implementing secrecy
protected zones is more effective and it can contribute significantly to the network security
Symbol-level and Multicast Precoding for Multiuser Multiantenna Downlink: A State-of-the-art, Classification and Challenges
Precoding has been conventionally considered as an effective means of mitigating or exploiting the interference in the multiantenna downlink channel, where multiple users are simultaneously served with independent information over the same channel resources. The early works in this area were focused on transmitting an individual information stream to each user by constructing weighted linear combinations of symbol blocks (codewords). However, more recent works have moved beyond this traditional view by: i) transmitting distinct data streams to groups of users and ii) applying precoding on a symbol-per-symbol basis. In this context, the current survey presents a unified view and classification of precoding techniques with respect to two main axes: i) the switching rate of the precoding weights, leading to the classes of block-level and symbol-level precoding, ii) the number of users that each stream is addressed to, hence unicast, multicast, and broadcast precoding. Furthermore, the classified techniques are compared through representative numerical results to demonstrate their relative performance and uncover fundamental insights. Finally, a list of open theoretical problems and practical challenges are presented to inspire further research in this area