2,650 research outputs found
Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks
In this paper, we propose a novel wireless caching scheme to enhance the
physical layer security of video streaming in cellular networks with limited
backhaul capacity. By proactively sharing video data across a subset of base
stations (BSs) through both caching and backhaul loading, secure cooperative
joint transmission of several BSs can be dynamically enabled in accordance with
the cache status, the channel conditions, and the backhaul capacity. Assuming
imperfect channel state information (CSI) at the transmitters, we formulate a
two-stage non-convex mixed-integer robust optimization problem for minimizing
the total transmit power while providing quality of service (QoS) and
guaranteeing communication secrecy during video delivery, where the caching and
the cooperative transmission policy are optimized in an offline video caching
stage and an online video delivery stage, respectively. Although the formulated
optimization problem turns out to be NP-hard, low-complexity polynomial-time
algorithms, whose solutions are globally optimal under certain conditions, are
proposed for cache training and video delivery control. Caching is shown to be
beneficial as it reduces the data sharing overhead imposed on the
capacity-constrained backhaul links, introduces additional secure degrees of
freedom, and enables a power-efficient communication system design. Simulation
results confirm that the proposed caching scheme achieves simultaneously a low
secrecy outage probability and a high power efficiency. Furthermore, due to the
proposed robust optimization, the performance loss caused by imperfect CSI
knowledge can be significantly reduced when the cache capacity becomes large.Comment: Accepted for publication in IEEE Trans. Wireless Commun.; 17 pages, 5
figure
Non-Orthogonal Unicast and Broadcast Transmission via Joint Beamforming and LDM in Cellular Networks
Limited bandwidth resources and higher energy efficiency requirements
motivate incorporating multicast and broadcast transmission into the
next-generation cellular network architectures, particularly for multimedia
streaming applications. Layered division multiplexing (LDM), a form of NOMA,
can potentially improve unicast throughput and broadcast coverage with respect
to traditional orthogonal frequency division multiplexing (FDM) or time
division multiplexing (TDM), by simultaneously using the same frequency and
time resources for multiple unicast or broadcast transmissions. In this paper,
the performance of LDM-based unicast and broadcast transmission in a cellular
network is studied by assuming a single frequency network (SFN) operation for
the broadcast layer, while allowing arbitrarily clustered cooperation among the
base stations (BSs) for the transmission of unicast data streams. Beamforming
and power allocation between unicast and broadcast layers, the so-called
injection level in the LDM literature, are optimized with the aim of minimizing
the sum-power under constraints on the user-specific unicast rates and on the
common broadcast rate. The effects of imperfect channel coding and imperfect
CSI are also studied to gain insights into robust implementation in practical
systems. The non-convex optimization problem is tackled by means of successive
convex approximation (SCA) techniques. Performance upper bounds are also
presented by means of the -procedure followed by semidefinite
relaxation (SDR). Finally, a dual decomposition-based solution is proposed to
facilitate an efficient distributed implementation of LDM where the optimal
unicast beamforming vectors can be obtained locally by the cooperating BSs.
Numerical results are presented, which show the tightness of the proposed
bounds and hence the near-optimality of the proposed solutions.Comment: This work has been submitted to IEEE for possible publicatio
Cooperative Beamforming for Cognitive Radio-Based Broadcasting Systems with Asynchronous Interferences
In order to address the asynchronous interference issue for a generalized
scenario with multiple primary and multiple secondary receivers, in this paper,
we propose an innovative cooperative beamforming technique. In particular, the
cooperative beamforming design is formulated as an optimization problem that
maximizes the weighted sum achievable transmission rate of secondary
destinations while it maintains the asynchronous interferences at the primary
receivers below their target thresholds. In light of the intractability of the
problem, we propose a two-phase suboptimal cooperative beamforming technique.
First, it finds the beamforming directions corresponding to different secondary
destinations. Second, it allocates the power among different beamforming
directions. Due to the multiple interference constraints corresponding to
multiple primary receivers, the power allocation scheme in the second phase is
still complex. Therefore, we also propose a low complex power allocation
algorithm. The proposed beamforming technique is extended for the cases, when
cooperating CR nodes (CCRNs) have statistical or erroneous channel knowledge of
the primary receivers. We also investigate the performance of joint CCRN
selection and beamforming technique. The presented numerical results show that
the proposed beamforming technique can significantly reduce the asynchronous
interference signals at the primary receivers and increase the sum transmission
rate of secondary destinations compared to the well known zero-forcing
beamforming (ZFBF) technique.Comment: Submitted to the IEEE Transactions on Wireless Communication
Multi-Antenna Relay Aided Wireless Physical Layer Security
With growing popularity of mobile Internet, providing secure wireless
services has become a critical issue. Physical layer security (PHY-security)
has been recognized as an effective means to enhance wireless security by
exploiting wireless medium characteristics, e.g., fading, noise, and
interference. A particularly interesting PHY-security technology is cooperative
relay due to the fact that it helps to provide distributed diversity and
shorten access distance. This article offers a tutorial on various
multi-antenna relaying technologies to improve security at physical layer. The
state of the art research results on multi-antenna relay aided PHY-security as
well as some secrecy performance optimization schemes are presented. In
particular, we focus on large-scale MIMO (LS-MIMO) relaying technology, which
is effective to tackle various challenging issues for implementing wireless
PHY-security, such as short-distance interception without eavesdropper channel
state information (CSI) and with imperfect legitimate CSI. Moreover, the future
directions are identified for further enhancement of secrecy performance.Comment: 17 pages, 4 figures, IEEE Communications Magazine, 201
Adaptive Mode Selection in Multiuser MISO Cognitive Networks with Limited Cooperation and Feedback
In this paper, we consider a multiuser MISO downlink cognitive network
coexisting with a primary network. With the purpose of exploiting the spatial
degree of freedom to counteract the inter-network interference and
intra-network (inter-user) interference simultaneously, we propose to perform
zero-forcing beamforming (ZFBF) at the multi-antenna cognitive base station
(BS) based on the instantaneous channel state information (CSI). The challenge
of designing ZFBF in cognitive networks lies in how to obtain the interference
CSI. To solve it, we introduce a limited inter-network cooperation protocol,
namely the quantized CSI conveyance from the primary receiver to the cognitive
BS via purchase. Clearly, the more the feedback amount, the better the
performance, but the higher the feedback cost. In order to achieve a balance
between the performance and feedback cost, we take the maximization of feedback
utility function, defined as the difference of average sum rate and feedback
cost while satisfying the interference constraint, as the optimization
objective, and derive the transmission mode and feedback amount joint
optimization scheme. Moreover, we quantitatively investigate the impact of CSI
feedback delay and obtain the corresponding optimization scheme. Furthermore,
through asymptotic analysis, we present some simple schemes. Finally, numerical
results confirm the effectiveness of our theoretical claims.Comment: 11 pages,6 figures, 4 tables IEEE Transactions on Vehicular
Technology, 201
Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity
This paper studies the resource allocation algorithm design for secure
information and renewable green energy transfer to mobile receivers in
distributed antenna communication systems. In particular, distributed remote
radio heads (RRHs/antennas) are connected to a central processor (CP) via
capacity-limited backhaul links to facilitate joint transmission. The RRHs and
the CP are equipped with renewable energy harvesters and share their energies
via a lossy micropower grid for improving the efficiency in conveying
information and green energy to mobile receivers via radio frequency (RF)
signals. The considered resource allocation algorithm design is formulated as a
mixed non-convex and combinatorial optimization problem taking into account the
limited backhaul capacity and the quality of service requirements for
simultaneous wireless information and power transfer (SWIPT). We aim at
minimizing the total network transmit power when only imperfect channel state
information of the wireless energy harvesting receivers, which have to be
powered by the wireless network, is available at the CP. In light of the
intractability of the problem, we reformulate it as an optimization problem
with binary selection, which facilitates the design of an iterative resource
allocation algorithm to solve the problem optimally using the generalized
Bender's decomposition (GBD). Furthermore, a suboptimal algorithm is proposed
to strike a balance between computational complexity and system performance.
Simulation results illustrate that the proposed GBD based algorithm obtains the
global optimal solution and the suboptimal algorithm achieves a
close-to-optimal performance. Besides, the distributed antenna network for
SWIPT with renewable energy sharing is shown to require a lower transmit power
compared to a traditional system with multiple co-located antennas.Comment: accepted for publication, IEEE Transactions on Wireless
Communications, May 10, 201
A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends
Multiple antennas have been exploited for spatial multiplexing and diversity
transmission in a wide range of communication applications. However, most of
the advances in the design of high speed wireless multiple-input multiple
output (MIMO) systems are based on information-theoretic principles that
demonstrate how to efficiently transmit signals conforming to Gaussian
distribution. Although the Gaussian signal is capacity-achieving, signals
conforming to discrete constellations are transmitted in practical
communication systems. As a result, this paper is motivated to provide a
comprehensive overview on MIMO transmission design with discrete input signals.
We first summarize the existing fundamental results for MIMO systems with
discrete input signals. Then, focusing on the basic point-to-point MIMO
systems, we examine transmission schemes based on three most important criteria
for communication systems: the mutual information driven designs, the mean
square error driven designs, and the diversity driven designs. Particularly, a
unified framework which designs low complexity transmission schemes applicable
to massive MIMO systems in upcoming 5G wireless networks is provided in the
first time. Moreover, adaptive transmission designs which switch among these
criteria based on the channel conditions to formulate the best transmission
strategy are discussed. Then, we provide a survey of the transmission designs
with discrete input signals for multiuser MIMO scenarios, including MIMO uplink
transmission, MIMO downlink transmission, MIMO interference channel, and MIMO
wiretap channel. Additionally, we discuss the transmission designs with
discrete input signals for other systems using MIMO technology. Finally,
technical challenges which remain unresolved at the time of writing are
summarized and the future trends of transmission designs with discrete input
signals are addressed.Comment: 110 pages, 512 references, submit to Proceedings of the IEE
Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks
We consider a cognitive wireless powered communication network (CWPCN)
sharing the spectrum with a primary network who faces security threats from
eavesdroppers (EAVs). We propose a new cooperative protocol for the wireless
powered secondary users (SU) to cooperate with the primary user (PU). In the
protocol, the SUs first harvest energy from the power signals transmitted by
the cognitive hybrid access point during the wireless power transfer (WPT)
phase, and then use the harvested energy to interfere with the EAVs and gain
transmission opportunities at the same time during the wireless information
transfer (WIT) phase. Taking the maximization of the SU ergodic rate as the
design objective, resource allocation algorithms based on the dual optimization
method and the block coordinate descent method are proposed for the cases of
perfect channel state information (CSI) and collusive/non-collusive EAVs under
the PU secrecy constraint. More PU favorable greedy algorithms aimed at
minimizing the PU secrecy outage probability are also proposed. We furthermore
consider the unknown EAVs' CSI case and propose an efficient algorithm to
improve the PU security performance. Extensive simulations show that our
proposed protocol and corresponding resource allocation algorithms can not only
let the SU gain transmission opportunities but also improve the PU security
performance even with unknown EAVs' CSI.Comment: Submitted to IEEE Systems Journal for possible publicatio
Joint User Selection, Power Allocation, and Precoding Design with Imperfect CSIT for Multi-Cell MU-MIMO Downlink Systems
In this paper, a new optimization framework is presented for the joint design
of user selection, power allocation, and precoding in multi-cell multi-user
multiple-input multiple-output (MU-MIMO) systems when imperfect channel state
information at transmitter (CSIT) is available. By representing the joint
optimization variables in a higher-dimensional space, the weighted sum-spectral
efficiency maximization is formulated as the maximization of the product of
Rayleigh quotients. Although this is still a non-convex problem, a
computationally efficient algorithm, referred to as generalized power iteration
precoding (GPIP), is proposed. The algorithm converges to a stationary point
(local maximum) of the objective function and therefore it guarantees the
first-order optimality of the solution. By adjusting the weights in the
weighted sum-spectral efficiency, the GPIP yields a joint solution for user
selection, power allocation, and downlink precoding. The GPIP is also extended
to a multi-cell scenario, where cooperative base stations perform joint user
selection and design their precoding vectors by sharing global yet imperfect
CSIT within the cooperative BSs. System-level simulations show the gains of the
proposed approach with respect to conventional user selection and linear
downlink precoding.Comment: 35 pages, 6 figure
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
Physical layer security is an emerging technique to improve the wireless
communication security, which is widely regarded as a complement to
cryptographic technologies. To design physical layer security techniques under
practical scenarios, the uncertainty and imperfections in the channel knowledge
need to be taken into consideration. This paper provides a survey of recent
research and development in physical layer security considering the imperfect
channel state information (CSI) at communication nodes. We first present an
overview of the main information-theoretic measures of the secrecy performance
with imperfect CSI. Then, we describe several signal processing enhancements in
secure transmission designs, such as secure on-off transmission, beamforming
with artificial noise, and secure communication assisted by relay nodes or in
cognitive radio systems. The recent studies of physical layer security in
large-scale decentralized wireless networks are also summarized. Finally, the
open problems for the on-going and future research are discussed
- …