261 research outputs found
Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs
Optimal power allocation for orthogonal frequency division multiplexing
(OFDM) wiretap channels with Gaussian channel inputs has already been studied
in some previous works from an information theoretical viewpoint. However,
these results are not sufficient for practical system design. One reason is
that discrete channel inputs, such as quadrature amplitude modulation (QAM)
signals, instead of Gaussian channel inputs, are deployed in current practical
wireless systems to maintain moderate peak transmission power and receiver
complexity. In this paper, we investigate the power allocation and artificial
noise design for OFDM wiretap channels with discrete channel inputs. We first
prove that the secrecy rate function for discrete channel inputs is nonconcave
with respect to the transmission power. To resolve the corresponding nonconvex
secrecy rate maximization problem, we develop a low-complexity power allocation
algorithm, which yields a duality gap diminishing in the order of
O(1/\sqrt{N}), where N is the number of subcarriers of OFDM. We then show that
independent frequency-domain artificial noise cannot improve the secrecy rate
of single-antenna wiretap channels. Towards this end, we propose a novel
time-domain artificial noise design which exploits temporal degrees of freedom
provided by the cyclic prefix of OFDM systems {to jam the eavesdropper and
boost the secrecy rate even with a single antenna at the transmitter}.
Numerical results are provided to illustrate the performance of the proposed
design schemes.Comment: 12 pages, 7 figures, accepted by IEEE Transactions on Wireless
Communications, Jan. 201
Low-power Secret-key Agreement over OFDM
Information-theoretic secret-key agreement is perhaps the most practically
feasible mechanism that provides unconditional security at the physical layer
to date. In this paper, we consider the problem of secret-key agreement by
sharing randomness at low power over an orthogonal frequency division
multiplexing (OFDM) link, in the presence of an eavesdropper. The low power
assumption greatly simplifies the design of the randomness sharing scheme, even
in a fading channel scenario. We assess the performance of the proposed system
in terms of secrecy key rate and show that a practical approach to key sharing
is obtained by using low-density parity check (LDPC) codes for information
reconciliation. Numerical results confirm the merits of the proposed approach
as a feasible and practical solution. Moreover, the outage formulation allows
to implement secret-key agreement even when only statistical knowledge of the
eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper
with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot
Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19
April 201
Secure Communication with a Wireless-Powered Friendly Jammer
In this paper, we propose to use a wireless-powered friendly jammer to enable
secure communication between a source node and destination node, in the
presence of an eavesdropper. We consider a two-phase communication protocol
with fixed-rate transmission. In the first phase, wireless power transfer is
conducted from the source to the jammer. In the second phase, the source
transmits the information-bearing signal under the protection of a jamming
signal sent by the jammer using the harvested energy in the first phase. We
analytically characterize the long-time behavior of the proposed protocol and
derive a closed-form expression for the throughput. We further optimize the
rate parameters for maximizing the throughput subject to a secrecy outage
probability constraint. Our analytical results show that the throughput
performance differs significantly between the single-antenna jammer case and
the multi-antenna jammer case. For instance, as the source transmit power
increases, the throughput quickly reaches an upper bound with single-antenna
jammer, while the throughput grows unbounded with multi-antenna jammer. Our
numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless
Communication
- …