2,584 research outputs found
Transmit optimization techniques for physical layer security
PhD ThesisOver the last several decades, reliable communication has received considerable
attention in the area of dynamic network con gurations and
distributed processing techniques. Traditional secure communications
mainly considered transmission cryptography, which has been developed
in the network layer. However, the nature of wireless transmission introduces
various challenges of key distribution and management in establishing
secure communication links. Physical layer security has been
recently recognized as a promising new design paradigm to provide security
in wireless networks in addition to existing conventional cryptographic
methods, where the physical layer dynamics of fading channels
are exploited to establish secure wireless links. On the other hand, with
the ever-increasing demand of wireless access users, multi-antenna transmission
has been considered as one of e ective approaches to improve
the capacity of wireless networks. Multi-antenna transmission applied
in physical layer security has extracted more and more attentions by
exploiting additional degrees of freedom and diversity gains.
In this thesis, di erent multi-antenna transmit optimization techniques
are developed for physical layer secure transmission. The secrecy rate
optimization problems (i.e., power minimization and secrecy rate maximization)
are formulated to guarantee the optimal power allocation.
First, transmit optimization for multiple-input single-output (MISO) secrecy
channels are developed to design secure transmit beamformer that
minimize the transmit power to achieve a target secrecy rate. Besides,
the associated robust scheme with the secrecy rate outage probability
constraint are presented with statistical channel uncertainty, where the
outage probability constraint requires that the achieved secrecy rate
exceeds certain thresholds with a speci c probability. Second, multiantenna
cooperative jammer (CJ) is presented to provide jamming services
that introduces extra interference to assist a multiple-input multipleoutput
(MIMO) secure transmission. Transmit optimization for this CJaided
MIMO secrecy channel is designed to achieve an optimal power
allocation. Moreover, secure transmission is achieved when the CJ introduces
charges for its jamming service based on the amount of the
interference caused to the eavesdropper, where the Stackelberg game
is proposed to handle, and the Stackelberg equilibrium is analytically
derived. Finally, transmit optimization for MISO secure simultaneous
wireless information and power transfer (SWIPT) is investigated, where
secure transmit beamformer is designed with/without the help of arti -
cial noise (AN) to maximize the achieved secrecy rate such that satisfy
the transmit power budget and the energy harvesting (EH) constraint.
The performance of all proposed schemes are validated by MATLAB
simulation results
Power Efficient and Secure Multiuser Communication Systems with Wireless Information and Power Transfer
In this paper, we study resource allocation algorithm design for power
efficient secure communication with simultaneous wireless information and power
transfer (WIPT) in multiuser communication systems. In particular, we focus on
power splitting receivers which are able to harvest energy and decode
information from the received signals. The considered problem is modeled as an
optimization problem which takes into account a minimum required
signal-to-interference-plus-noise ratio (SINR) at multiple desired receivers, a
maximum tolerable data rate at multiple multi-antenna potential eavesdroppers,
and a minimum required power delivered to the receivers. The proposed problem
formulation facilitates the dual use of artificial noise in providing efficient
energy transfer and guaranteeing secure communication. We aim at minimizing the
total transmit power by jointly optimizing transmit beamforming vectors, power
splitting ratios at the desired receivers, and the covariance of the artificial
noise. The resulting non-convex optimization problem is transformed into a
semidefinite programming (SDP) and solved by SDP relaxation. We show that the
adopted SDP relaxation is tight and achieves the global optimum of the original
problem. Simulation results illustrate the significant power saving obtained by
the proposed optimal algorithm compared to suboptimal baseline schemes.Comment: Accepted for presentation at the IEEE International Conference on
Communications (ICC), Sydney, Australia, 201
Max-min Fair Wireless Energy Transfer for Secure Multiuser Communication Systems
This paper considers max-min fairness for wireless energy transfer in a
downlink multiuser communication system. Our resource allocation design
maximizes the minimum harvested energy among multiple multiple-antenna energy
harvesting receivers (potential eavesdroppers) while providing quality of
service (QoS) for secure communication to multiple single-antenna information
receivers. In particular, the algorithm design is formulated as a non-convex
optimization problem which takes into account a minimum required
signal-to-interference-plus-noise ratio (SINR) constraint at the information
receivers and a constraint on the maximum tolerable channel capacity achieved
by the energy harvesting receivers for a given transmit power budget. The
proposed problem formulation exploits the dual use of artificial noise
generation for facilitating efficient wireless energy transfer and secure
communication. A semidefinite programming (SDP) relaxation approach is
exploited to obtain a global optimal solution of the considered problem.
Simulation results demonstrate the significant performance gain in harvested
energy that is achieved by the proposed optimal scheme compared to two simple
baseline schemes.Comment: 5 pages, invited paper, IEEE Information Theory Workshop 2014,
Hobart, Tasmania, Australia, Nov. 201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …