130 research outputs found
Confidential broadcasting via coordinated beamforming in two-cell networks
We design a linear precoder based on the principles
of the generalized regularized channel inversion (RCI)
precoder that achieves confidential broadcasting in a two-cell
network. In each cell of the network, an N-antenna base station
(BS) communicates with K single-antenna users. We consider
coordinated beamforming where the BSs in the two cells do
not share messages but the users in the two cells feed back
their channel state information to both BSs. In the precoder
design, we determine the optimal regularization parameter that
maximizes the secrecy sum rate. To this end, we derive new
channel-independent expressions for the secrecy sum rate in the
large-system regime, where K and N approach infinity with a
fixed ratio µ = K/N. Moreover, we propose a power-reduction
strategy that significantly improves the secrecy sum rate at high
transmit signal-to-noise ratios when µ is higher than 0.5
Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks
We design linear precoders that perform confidential
broadcasting in multi-cell networks for two different forms
of base station (BS) cooperation, namely, multi-cell processing
(MCP) and coordinated beamforming (CBf). We consider a twocell
network where each cell consists of an N-antenna BS and
K single-antenna users. For such a network, we design a linear
precoder based on the regularized channel inversion (RCI) for
the MCP and a linear precoder based on the generalized RCI
for the CBf. For each form of BS cooperation, we derive new
channel-independent expressions to approximate the secrecy sum
rate achieved by the precoder in the large system regime where
K, N → ∞ with a fixed ratio β = K/N. Using these results, we
determine the optimal regularization parameters of the RCI and
the generalized RCI precoders that maximize the secrecy sum
rate for the MCP and the CBf, respectively. We further propose
power-reduction strategies that significantly increase the secrecy
sum rate at high transmit signal-to-noise ratios when the network
load is high. Our numerical results substantiate the derived
expressions, verify the optimality of the determined optimal
regularization parameters, and demonstrate the performance
improvement offered by the proposed power-reduction strategies.ARC Discovery Projects Grant DP15010390
Optimal Beamforming for Physical Layer Security in MISO Wireless Networks
A wireless network of multiple transmitter-user pairs overheard by an
eavesdropper, where the transmitters are equipped with multiple antennas while
the users and eavesdropper are equipped with a single antenna, is considered.
At different levels of wireless channel knowledge, the problem of interest is
beamforming to optimize the users' quality-of-service (QoS) in terms of their
secrecy throughputs or maximize the network's energy efficiency under users'
QoS. All these problems are seen as very difficult optimization problems with
many nonconvex constraints and nonlinear equality constraints in beamforming
vectors. The paper develops path-following computational procedures of
low-complexity and rapid convergence for the optimal beamforming solution.
Their practicability is demonstrated through numerical examples
Secrecy Energy Efficiency in Wireless Powered Heterogeneous Networks: A Distributed ADMM Approach
OAPA This paper investigates the physical layer security in heterogeneous networks (HetNets) supported by simultaneous wireless information and power transfer (SWIPT). We first consider a two-tier HetNet composed of a macrocell and several femtocells, where the macrocell base station (BS) serves multiple users in the presence of a malicious eavesdropper, while each femtocell BS serves a couple of Internet-of-things (IoT) users. With regard to the energy constraint of IoT users, SWIPT is performed at the femtocell BSs, and IoT users accomplish the reception of information and energy in a time-switching (TS) manner, where information secrecy is to be protected. To enhance the secrecy performance, we inject artificial noise (AN) into the transmit beam at both macrocell and femtocell BSs, and for the sake of achieving green communications, we formulate the problem of maximizing secrecy energy efficiency while considering the fairness in a cross-tier multi-cell coordinated beamforming (MCBF) design. To handle this resulting nonconvex max-min fractional program problem, we propose an iterative algorithm by applying successive convex approximation method. Then, we further develop a decentralized solution based on alternative direction multiplier method (ADMM), which reduces the overhead of information exchange among coordinated BSs and achieves good approximation performance. Finally, simulation results demonstrate the performance of the proposed AN-aided cross-tier MCBF design and verify the validity of distributed ADMM-based approach
Wireless Physical Layer Security: Towards Practical Assumptions and Requirements
The current research on physical layer security is far from
implementations in practical networks, arguably due to
impractical assumptions in the literature and the limited
applicability of physical layer security. Aiming to reduce the
gap between theory and practice, this thesis focuses on wireless
physical layer security towards practical assumptions and
requirements.
In the first half of the thesis, we reduce the dependence of
physical layer security on impractical assumptions. The secrecy
enhancements and analysis based on impractical assumptions cannot
lead to any true guarantee of secrecy in practical networks. The
current study of physical layer security was often based on the
idealized assumption of perfect channel knowledge on both
legitimate users and eavesdroppers. We study the impact of
channel estimation errors on secure transmission designs. We
investigate the practical scenarios where both the transmitter
and the receiver have imperfect channel state information (CSI).
Our results show how the optimal transmission design and the
achievable throughput vary with the amount of knowledge on the
eavesdropper's channel. Apart from the assumption of perfect CSI,
the analysis of physical layer security often ideally assumed the
number of eavesdropper antennas to be known. We develop an
innovative approach to study secure communication systems without
knowing the number of eavesdropper antennas by introducing the
concept of spatial constraint into physical layer security. That
is, the eavesdropper is assumed to have a limited spatial region
to place (possibly an infinite number of) antennas. We show that
a non-zero secrecy rate is achievable with the help of a friendly
jammer, even if the eavesdropper places an infinite number of
antennas in its spatial region.
In the second half of the thesis, we improve the applicability of
physical layer security. The current physical layer security
techniques to achieve confidential broadcasting were limited to
application in single-cell systems. The primary challenge to
achieve confidential broadcasting in the multi-cell network is to
deal with not only the inter-cell but also the intra-cell
information leakage and interference. To tackle this challenge,
we design linear precoders performing confidential broadcasting
in multi-cell networks. We optimize the precoder designs to
maximize the secrecy sum rate with based on the large-system
analysis. Finally, we improve the applicability of physical layer
security from a fundamental aspect. The analysis of physical
layer security based on the existing secrecy metric was often not
applicable in practical networks. We propose new metrics for
evaluating the secrecy of transmissions over fading channels to
address the practical limitations of using existing secrecy
metrics for such evaluations. The first metric establishes a link
between the concept of secrecy outage and the eavesdropper's
ability to decode confidential messages. The second metric
provides an error-probability-based secrecy metric which is often
used for the practical implementation of secure wireless systems.
The third metric characterizes how much or how fast the
confidential information is leaked to the eavesdropper. We show
that the proposed secrecy metrics enable one to appropriately
design secure communication systems with different views on how
secrecy is measured
- …