8 research outputs found
Recommended from our members
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective
Based on the concept of constructive interference (CI), multiuser
interference (MUI) has recently been shown to be beneficial for communication
secrecy. A few CI-based secure precoding algorithms have been proposed that use
both the channel state information (CSI) and knowledge of the instantaneous
transmit symbols. In this paper, we examine the CI-based secure precoding
problem with a focus on smart eavesdroppers that exploit statistical
information gleaned from the precoded data for symbol detection. Moreover, the
impact of correlation between the main and eavesdropper channels is taken into
account. We first modify an existing CI-based preocding scheme to better
utilize the destructive impact of the interference. Then, we point out the
drawback of both the existing and the new modified CI-based precoders when
faced with a smart eavesdropper. To address this deficiency, we provide a
general principle for precoder design and then give two specific design
examples. Finally, the scenario where the eavesdropper's CSI is unavailable is
studied. Numerical results show that although our modified CI-based precoder
can achieve a better energy-secrecy trade-off than the existing approach, both
have a limited secrecy benefit. On the contrary, the precoders developed using
the new CI-design principle can achieve a much improved trade-off and
significantly degrade the eavesdropper's performance
Rank-Two Beamforming and Power Allocation in Multicasting Relay Networks
In this paper, we propose a novel single-group multicasting relay beamforming
scheme. We assume a source that transmits common messages via multiple
amplify-and-forward relays to multiple destinations. To increase the number of
degrees of freedom in the beamforming design, the relays process two received
signals jointly and transmit the Alamouti space-time block code over two
different beams. Furthermore, in contrast to the existing relay multicasting
scheme of the literature, we take into account the direct links from the source
to the destinations. We aim to maximize the lowest received quality-of-service
by choosing the proper relay weights and the ideal distribution of the power
resources in the network. To solve the corresponding optimization problem, we
propose an iterative algorithm which solves sequences of convex approximations
of the original non-convex optimization problem. Simulation results demonstrate
significant performance improvements of the proposed methods as compared with
the existing relay multicasting scheme of the literature and an algorithm based
on the popular semidefinite relaxation technique
Robust Transceiver Design for MISO Interference Channel with Energy Harvesting
In this paper, we consider multiuser multiple-input single-output (MISO)
interference channel where the received signal is divided into two parts for
information decoding and energy harvesting (EH), respectively. The transmit
beamforming vectors and receive power splitting (PS) ratios are jointly
designed in order to minimize the total transmission power subject to both
signal-to-interference-plus-noise ratio (SINR) and EH constraints. Most joint
beamforming and power splitting (JBPS) designs assume that perfect channel
state information (CSI) is available; however CSI errors are inevitable in
practice. To overcome this limitation, we study the robust JBPS design problem
assuming a norm-bounded error (NBE) model for the CSI. Three different solution
approaches are proposed for the robust JBPS problem, each one leading to a
different computational algorithm. Firstly, an efficient semidefinite
relaxation (SDR)-based approach is presented to solve the highly non-convex
JBPS problem, where the latter can be formulated as a semidefinite programming
(SDP) problem. A rank-one recovery method is provided to recover a robust
feasible solution to the original problem. Secondly, based on second order cone
programming (SOCP) relaxation, we propose a low complexity approach with the
aid of a closed-form robust solution recovery method. Thirdly, a new iterative
method is also provided which can achieve near-optimal performance when the
SDR-based algorithm results in a higher-rank solution. We prove that this
iterative algorithm monotonically converges to a Karush-Kuhn-Tucker (KKT)
solution of the robust JBPS problem. Finally, simulation results are presented
to validate the robustness and efficiency of the proposed algorithms.Comment: 13 pages, 8 figures. arXiv admin note: text overlap with
arXiv:1407.0474 by other author
Multi-Pair Two-Way Relay Network with Harvest-Then-Transmit Users: Resolving Pairwise Uplink-Downlink Coupling
While two-way relaying is a promising way to enhance the spectral efficiency
of wireless networks, the imbalance of relay-user distances may lead to
excessive wireless power at the nearby-users. To exploit the excessive power,
the recently proposed harvest-then-transmit technique can be applied. However,
it is well-known that harvest-then-transmit introduces uplink-downlink coupling
for a user. Together with the co-dependent relationship between paired users
and interference among multiple user pairs, wirelessly powered two-way relay
network suffers from the unique pairwise uplink-downlink coupling, and the
joint uplink-downlink network design is nontrivial. To this end, for the one
pair users case, we show that a global optimal solution can be obtained. For
the general case of multi-pair users, based on the rank-constrained difference
of convex program, a convergence guaranteed iterative algorithm with an
efficient initialization is proposed. Furthermore, a lower bound to the
performance of the optimal solution is derived by introducing virtual receivers
at relay. Numerical results on total transmit power show that the proposed
algorithm achieves a transmit power value close to the lower bound
Joint Transceiver Design Algorithms for Multiuser MISO Relay Systems with Energy Harvesting
In this paper, we investigate a multiuser relay system with simultaneous
wireless information and power transfer. Assuming that both base station (BS)
and relay station (RS) are equipped with multiple antennas, this work studies
the joint transceiver design problem for the BS beamforming vectors, the RS
amplify-and-forward transformation matrix and the power splitting (PS) ratios
at the single-antenna receivers. Firstly, an iterative algorithm based on
alternating optimization (AO) and with guaranteed convergence is proposed to
successively optimize the transceiver coefficients. Secondly, a novel design
scheme based on switched relaying (SR) is proposed that can significantly
reduce the computational complexity and overhead of the AO based designs while
maintaining a similar performance. In the proposed SR scheme, the RS is
equipped with a codebook of permutation matrices. For each permutation matrix,
a latent transceiver is designed which consists of BS beamforming vectors,
optimally scaled RS permutation matrix and receiver PS ratios. For the given
CSI, the optimal transceiver with the lowest total power consumption is
selected for transmission. We propose a concave-convex procedure based and
subgradient-type iterative algorithms for the non-robust and robust latent
transceiver designs. Simulation results are presented to validate the
effectiveness of all the proposed algorithms
Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers
The problem motivates this paper is that securing the critical data of 5G based wireless IoT network is of significant importance. Wireless 5G IoT systems consist of a large number of devices (low-cost legitimate users), which are of low complexity and under strict energy constraints. Physical layer security (PLS) schemes, along with energy harvesting, have emerged as a potential candidate that provides an effective solution to address this issue. During the data collection process of IoT, PHY security techniques can exploit the characteristics of the wireless channel to ensure secure communication. This paper focuses on optimizing the secrecy rate for simultaneous wireless information and power transfer (SWIPT) IoT system, considering that the malicious eavesdroppers can intercept the data. In particular, the main aim is to optimize the secrecy rate of the system under signal to interference noise ratio (SINR), energy harvesting (EH), and total transmits power constraints. We model our design as an optimization problem that advocates the use of additional noise to ensure secure communication and guarantees efficient wireless energy transfer. The primary problem is non-convex due to complex objective functions in terms of transmit beamforming matrix and power splitting ratios. We have considered both the perfect channel state information (CSI) and the imperfect CSI scenarios. To circumvent the non-convexity of the primary problem in perfect CSI case, we proposed a solution based on the concave-convex procedure (CCCP) iterative algorithm, which results in a maximum local solution for the secrecy rate. In the imperfect CSI scenario, we facilitate the use of S-procedure and present a solution based on the iterative successive convex approximation (SCA) approach. Simulation results present the validations of the proposed algorithms. The results provide an insightful view that the proposed iterative method based on the CCCP algorithm achieves higher secrecy rates and lower computational complexity in comparison to the other algorithms