2,650 research outputs found

    Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks

    Full text link
    In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status, the channel conditions, and the backhaul capacity. Assuming imperfect channel state information (CSI) at the transmitters, we formulate a two-stage non-convex mixed-integer robust optimization problem for minimizing the total transmit power while providing quality of service (QoS) and guaranteeing communication secrecy during video delivery, where the caching and the cooperative transmission policy are optimized in an offline video caching stage and an online video delivery stage, respectively. Although the formulated optimization problem turns out to be NP-hard, low-complexity polynomial-time algorithms, whose solutions are globally optimal under certain conditions, are proposed for cache training and video delivery control. Caching is shown to be beneficial as it reduces the data sharing overhead imposed on the capacity-constrained backhaul links, introduces additional secure degrees of freedom, and enables a power-efficient communication system design. Simulation results confirm that the proposed caching scheme achieves simultaneously a low secrecy outage probability and a high power efficiency. Furthermore, due to the proposed robust optimization, the performance loss caused by imperfect CSI knowledge can be significantly reduced when the cache capacity becomes large.Comment: Accepted for publication in IEEE Trans. Wireless Commun.; 17 pages, 5 figure

    Non-Orthogonal Unicast and Broadcast Transmission via Joint Beamforming and LDM in Cellular Networks

    Full text link
    Limited bandwidth resources and higher energy efficiency requirements motivate incorporating multicast and broadcast transmission into the next-generation cellular network architectures, particularly for multimedia streaming applications. Layered division multiplexing (LDM), a form of NOMA, can potentially improve unicast throughput and broadcast coverage with respect to traditional orthogonal frequency division multiplexing (FDM) or time division multiplexing (TDM), by simultaneously using the same frequency and time resources for multiple unicast or broadcast transmissions. In this paper, the performance of LDM-based unicast and broadcast transmission in a cellular network is studied by assuming a single frequency network (SFN) operation for the broadcast layer, while allowing arbitrarily clustered cooperation among the base stations (BSs) for the transmission of unicast data streams. Beamforming and power allocation between unicast and broadcast layers, the so-called injection level in the LDM literature, are optimized with the aim of minimizing the sum-power under constraints on the user-specific unicast rates and on the common broadcast rate. The effects of imperfect channel coding and imperfect CSI are also studied to gain insights into robust implementation in practical systems. The non-convex optimization problem is tackled by means of successive convex approximation (SCA) techniques. Performance upper bounds are also presented by means of the S\rm{S}-procedure followed by semidefinite relaxation (SDR). Finally, a dual decomposition-based solution is proposed to facilitate an efficient distributed implementation of LDM where the optimal unicast beamforming vectors can be obtained locally by the cooperating BSs. Numerical results are presented, which show the tightness of the proposed bounds and hence the near-optimality of the proposed solutions.Comment: This work has been submitted to IEEE for possible publicatio

    Cooperative Beamforming for Cognitive Radio-Based Broadcasting Systems with Asynchronous Interferences

    Full text link
    In order to address the asynchronous interference issue for a generalized scenario with multiple primary and multiple secondary receivers, in this paper, we propose an innovative cooperative beamforming technique. In particular, the cooperative beamforming design is formulated as an optimization problem that maximizes the weighted sum achievable transmission rate of secondary destinations while it maintains the asynchronous interferences at the primary receivers below their target thresholds. In light of the intractability of the problem, we propose a two-phase suboptimal cooperative beamforming technique. First, it finds the beamforming directions corresponding to different secondary destinations. Second, it allocates the power among different beamforming directions. Due to the multiple interference constraints corresponding to multiple primary receivers, the power allocation scheme in the second phase is still complex. Therefore, we also propose a low complex power allocation algorithm. The proposed beamforming technique is extended for the cases, when cooperating CR nodes (CCRNs) have statistical or erroneous channel knowledge of the primary receivers. We also investigate the performance of joint CCRN selection and beamforming technique. The presented numerical results show that the proposed beamforming technique can significantly reduce the asynchronous interference signals at the primary receivers and increase the sum transmission rate of secondary destinations compared to the well known zero-forcing beamforming (ZFBF) technique.Comment: Submitted to the IEEE Transactions on Wireless Communication

    Multi-Antenna Relay Aided Wireless Physical Layer Security

    Full text link
    With growing popularity of mobile Internet, providing secure wireless services has become a critical issue. Physical layer security (PHY-security) has been recognized as an effective means to enhance wireless security by exploiting wireless medium characteristics, e.g., fading, noise, and interference. A particularly interesting PHY-security technology is cooperative relay due to the fact that it helps to provide distributed diversity and shorten access distance. This article offers a tutorial on various multi-antenna relaying technologies to improve security at physical layer. The state of the art research results on multi-antenna relay aided PHY-security as well as some secrecy performance optimization schemes are presented. In particular, we focus on large-scale MIMO (LS-MIMO) relaying technology, which is effective to tackle various challenging issues for implementing wireless PHY-security, such as short-distance interception without eavesdropper channel state information (CSI) and with imperfect legitimate CSI. Moreover, the future directions are identified for further enhancement of secrecy performance.Comment: 17 pages, 4 figures, IEEE Communications Magazine, 201

    Adaptive Mode Selection in Multiuser MISO Cognitive Networks with Limited Cooperation and Feedback

    Full text link
    In this paper, we consider a multiuser MISO downlink cognitive network coexisting with a primary network. With the purpose of exploiting the spatial degree of freedom to counteract the inter-network interference and intra-network (inter-user) interference simultaneously, we propose to perform zero-forcing beamforming (ZFBF) at the multi-antenna cognitive base station (BS) based on the instantaneous channel state information (CSI). The challenge of designing ZFBF in cognitive networks lies in how to obtain the interference CSI. To solve it, we introduce a limited inter-network cooperation protocol, namely the quantized CSI conveyance from the primary receiver to the cognitive BS via purchase. Clearly, the more the feedback amount, the better the performance, but the higher the feedback cost. In order to achieve a balance between the performance and feedback cost, we take the maximization of feedback utility function, defined as the difference of average sum rate and feedback cost while satisfying the interference constraint, as the optimization objective, and derive the transmission mode and feedback amount joint optimization scheme. Moreover, we quantitatively investigate the impact of CSI feedback delay and obtain the corresponding optimization scheme. Furthermore, through asymptotic analysis, we present some simple schemes. Finally, numerical results confirm the effectiveness of our theoretical claims.Comment: 11 pages,6 figures, 4 tables IEEE Transactions on Vehicular Technology, 201

    Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity

    Full text link
    This paper studies the resource allocation algorithm design for secure information and renewable green energy transfer to mobile receivers in distributed antenna communication systems. In particular, distributed remote radio heads (RRHs/antennas) are connected to a central processor (CP) via capacity-limited backhaul links to facilitate joint transmission. The RRHs and the CP are equipped with renewable energy harvesters and share their energies via a lossy micropower grid for improving the efficiency in conveying information and green energy to mobile receivers via radio frequency (RF) signals. The considered resource allocation algorithm design is formulated as a mixed non-convex and combinatorial optimization problem taking into account the limited backhaul capacity and the quality of service requirements for simultaneous wireless information and power transfer (SWIPT). We aim at minimizing the total network transmit power when only imperfect channel state information of the wireless energy harvesting receivers, which have to be powered by the wireless network, is available at the CP. In light of the intractability of the problem, we reformulate it as an optimization problem with binary selection, which facilitates the design of an iterative resource allocation algorithm to solve the problem optimally using the generalized Bender's decomposition (GBD). Furthermore, a suboptimal algorithm is proposed to strike a balance between computational complexity and system performance. Simulation results illustrate that the proposed GBD based algorithm obtains the global optimal solution and the suboptimal algorithm achieves a close-to-optimal performance. Besides, the distributed antenna network for SWIPT with renewable energy sharing is shown to require a lower transmit power compared to a traditional system with multiple co-located antennas.Comment: accepted for publication, IEEE Transactions on Wireless Communications, May 10, 201

    A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends

    Full text link
    Multiple antennas have been exploited for spatial multiplexing and diversity transmission in a wide range of communication applications. However, most of the advances in the design of high speed wireless multiple-input multiple output (MIMO) systems are based on information-theoretic principles that demonstrate how to efficiently transmit signals conforming to Gaussian distribution. Although the Gaussian signal is capacity-achieving, signals conforming to discrete constellations are transmitted in practical communication systems. As a result, this paper is motivated to provide a comprehensive overview on MIMO transmission design with discrete input signals. We first summarize the existing fundamental results for MIMO systems with discrete input signals. Then, focusing on the basic point-to-point MIMO systems, we examine transmission schemes based on three most important criteria for communication systems: the mutual information driven designs, the mean square error driven designs, and the diversity driven designs. Particularly, a unified framework which designs low complexity transmission schemes applicable to massive MIMO systems in upcoming 5G wireless networks is provided in the first time. Moreover, adaptive transmission designs which switch among these criteria based on the channel conditions to formulate the best transmission strategy are discussed. Then, we provide a survey of the transmission designs with discrete input signals for multiuser MIMO scenarios, including MIMO uplink transmission, MIMO downlink transmission, MIMO interference channel, and MIMO wiretap channel. Additionally, we discuss the transmission designs with discrete input signals for other systems using MIMO technology. Finally, technical challenges which remain unresolved at the time of writing are summarized and the future trends of transmission designs with discrete input signals are addressed.Comment: 110 pages, 512 references, submit to Proceedings of the IEE

    Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks

    Full text link
    We consider a cognitive wireless powered communication network (CWPCN) sharing the spectrum with a primary network who faces security threats from eavesdroppers (EAVs). We propose a new cooperative protocol for the wireless powered secondary users (SU) to cooperate with the primary user (PU). In the protocol, the SUs first harvest energy from the power signals transmitted by the cognitive hybrid access point during the wireless power transfer (WPT) phase, and then use the harvested energy to interfere with the EAVs and gain transmission opportunities at the same time during the wireless information transfer (WIT) phase. Taking the maximization of the SU ergodic rate as the design objective, resource allocation algorithms based on the dual optimization method and the block coordinate descent method are proposed for the cases of perfect channel state information (CSI) and collusive/non-collusive EAVs under the PU secrecy constraint. More PU favorable greedy algorithms aimed at minimizing the PU secrecy outage probability are also proposed. We furthermore consider the unknown EAVs' CSI case and propose an efficient algorithm to improve the PU security performance. Extensive simulations show that our proposed protocol and corresponding resource allocation algorithms can not only let the SU gain transmission opportunities but also improve the PU security performance even with unknown EAVs' CSI.Comment: Submitted to IEEE Systems Journal for possible publicatio

    Joint User Selection, Power Allocation, and Precoding Design with Imperfect CSIT for Multi-Cell MU-MIMO Downlink Systems

    Full text link
    In this paper, a new optimization framework is presented for the joint design of user selection, power allocation, and precoding in multi-cell multi-user multiple-input multiple-output (MU-MIMO) systems when imperfect channel state information at transmitter (CSIT) is available. By representing the joint optimization variables in a higher-dimensional space, the weighted sum-spectral efficiency maximization is formulated as the maximization of the product of Rayleigh quotients. Although this is still a non-convex problem, a computationally efficient algorithm, referred to as generalized power iteration precoding (GPIP), is proposed. The algorithm converges to a stationary point (local maximum) of the objective function and therefore it guarantees the first-order optimality of the solution. By adjusting the weights in the weighted sum-spectral efficiency, the GPIP yields a joint solution for user selection, power allocation, and downlink precoding. The GPIP is also extended to a multi-cell scenario, where cooperative base stations perform joint user selection and design their precoding vectors by sharing global yet imperfect CSIT within the cooperative BSs. System-level simulations show the gains of the proposed approach with respect to conventional user selection and linear downlink precoding.Comment: 35 pages, 6 figure

    Wireless Physical Layer Security with Imperfect Channel State Information: A Survey

    Full text link
    Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration. This paper provides a survey of recent research and development in physical layer security considering the imperfect channel state information (CSI) at communication nodes. We first present an overview of the main information-theoretic measures of the secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs, such as secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. The recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, the open problems for the on-going and future research are discussed
    • …
    corecore