130 research outputs found

    Confidential broadcasting via coordinated beamforming in two-cell networks

    Get PDF
    We design a linear precoder based on the principles of the generalized regularized channel inversion (RCI) precoder that achieves confidential broadcasting in a two-cell network. In each cell of the network, an N-antenna base station (BS) communicates with K single-antenna users. We consider coordinated beamforming where the BSs in the two cells do not share messages but the users in the two cells feed back their channel state information to both BSs. In the precoder design, we determine the optimal regularization parameter that maximizes the secrecy sum rate. To this end, we derive new channel-independent expressions for the secrecy sum rate in the large-system regime, where K and N approach infinity with a fixed ratio µ = K/N. Moreover, we propose a power-reduction strategy that significantly improves the secrecy sum rate at high transmit signal-to-noise ratios when µ is higher than 0.5

    Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks

    Get PDF
    We design linear precoders that perform confidential broadcasting in multi-cell networks for two different forms of base station (BS) cooperation, namely, multi-cell processing (MCP) and coordinated beamforming (CBf). We consider a twocell network where each cell consists of an N-antenna BS and K single-antenna users. For such a network, we design a linear precoder based on the regularized channel inversion (RCI) for the MCP and a linear precoder based on the generalized RCI for the CBf. For each form of BS cooperation, we derive new channel-independent expressions to approximate the secrecy sum rate achieved by the precoder in the large system regime where K, N → ∞ with a fixed ratio β = K/N. Using these results, we determine the optimal regularization parameters of the RCI and the generalized RCI precoders that maximize the secrecy sum rate for the MCP and the CBf, respectively. We further propose power-reduction strategies that significantly increase the secrecy sum rate at high transmit signal-to-noise ratios when the network load is high. Our numerical results substantiate the derived expressions, verify the optimality of the determined optimal regularization parameters, and demonstrate the performance improvement offered by the proposed power-reduction strategies.ARC Discovery Projects Grant DP15010390

    Optimal Beamforming for Physical Layer Security in MISO Wireless Networks

    Get PDF
    A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users' quality-of-service (QoS) in terms of their secrecy throughputs or maximize the network's energy efficiency under users' QoS. All these problems are seen as very difficult optimization problems with many nonconvex constraints and nonlinear equality constraints in beamforming vectors. The paper develops path-following computational procedures of low-complexity and rapid convergence for the optimal beamforming solution. Their practicability is demonstrated through numerical examples

    Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach

    Get PDF
    OAPA This paper investigates the physical layer security in heterogeneous networks (HetNets) supported by simultaneous wireless information and power transfer (SWIPT). We first consider a two-tier HetNet composed of a macrocell and several femtocells, where the macrocell base station (BS) serves multiple users in the presence of a malicious eavesdropper, while each femtocell BS serves a couple of Internet-of-things (IoT) users. With regard to the energy constraint of IoT users, SWIPT is performed at the femtocell BSs, and IoT users accomplish the reception of information and energy in a time-switching (TS) manner, where information secrecy is to be protected. To enhance the secrecy performance, we inject artificial noise (AN) into the transmit beam at both macrocell and femtocell BSs, and for the sake of achieving green communications, we formulate the problem of maximizing secrecy energy efficiency while considering the fairness in a cross-tier multi-cell coordinated beamforming (MCBF) design. To handle this resulting nonconvex max-min fractional program problem, we propose an iterative algorithm by applying successive convex approximation method. Then, we further develop a decentralized solution based on alternative direction multiplier method (ADMM), which reduces the overhead of information exchange among coordinated BSs and achieves good approximation performance. Finally, simulation results demonstrate the performance of the proposed AN-aided cross-tier MCBF design and verify the validity of distributed ADMM-based approach

    Wireless Physical Layer Security: Towards Practical Assumptions and Requirements

    No full text
    The current research on physical layer security is far from implementations in practical networks, arguably due to impractical assumptions in the literature and the limited applicability of physical layer security. Aiming to reduce the gap between theory and practice, this thesis focuses on wireless physical layer security towards practical assumptions and requirements. In the first half of the thesis, we reduce the dependence of physical layer security on impractical assumptions. The secrecy enhancements and analysis based on impractical assumptions cannot lead to any true guarantee of secrecy in practical networks. The current study of physical layer security was often based on the idealized assumption of perfect channel knowledge on both legitimate users and eavesdroppers. We study the impact of channel estimation errors on secure transmission designs. We investigate the practical scenarios where both the transmitter and the receiver have imperfect channel state information (CSI). Our results show how the optimal transmission design and the achievable throughput vary with the amount of knowledge on the eavesdropper's channel. Apart from the assumption of perfect CSI, the analysis of physical layer security often ideally assumed the number of eavesdropper antennas to be known. We develop an innovative approach to study secure communication systems without knowing the number of eavesdropper antennas by introducing the concept of spatial constraint into physical layer security. That is, the eavesdropper is assumed to have a limited spatial region to place (possibly an infinite number of) antennas. We show that a non-zero secrecy rate is achievable with the help of a friendly jammer, even if the eavesdropper places an infinite number of antennas in its spatial region. In the second half of the thesis, we improve the applicability of physical layer security. The current physical layer security techniques to achieve confidential broadcasting were limited to application in single-cell systems. The primary challenge to achieve confidential broadcasting in the multi-cell network is to deal with not only the inter-cell but also the intra-cell information leakage and interference. To tackle this challenge, we design linear precoders performing confidential broadcasting in multi-cell networks. We optimize the precoder designs to maximize the secrecy sum rate with based on the large-system analysis. Finally, we improve the applicability of physical layer security from a fundamental aspect. The analysis of physical layer security based on the existing secrecy metric was often not applicable in practical networks. We propose new metrics for evaluating the secrecy of transmissions over fading channels to address the practical limitations of using existing secrecy metrics for such evaluations. The first metric establishes a link between the concept of secrecy outage and the eavesdropper's ability to decode confidential messages. The second metric provides an error-probability-based secrecy metric which is often used for the practical implementation of secure wireless systems. The third metric characterizes how much or how fast the confidential information is leaked to the eavesdropper. We show that the proposed secrecy metrics enable one to appropriately design secure communication systems with different views on how secrecy is measured
    • …
    corecore