2,472 research outputs found
MIMO Beamforming for Secure and Energy-Efficient Wireless Communication
Considering a multiple-user multiple-input multiple-output (MIMO) channel
with an eavesdropper, this letter develops a beamformer design to optimize the
energy efficiency in terms of secrecy bits per Joule under secrecy
quality-of-service constraints. This is a very difficult design problem with no
available exact solution techniques. A path-following procedure, which
iteratively improves its feasible points by using a simple quadratic program of
moderate dimension, is proposed. Under any fixed computational tolerance the
procedure terminates after finitely many iterations, yielding at least a
locally optimal solution. Simulation results show the superior performance of
the obtained algorithm over other existing methods.Comment: 12 pages, 2 figure
Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer
This paper considers a basic MIMO information-energy (I-E) broadcast system,
where a multi-antenna transmitter transmits information and energy
simultaneously to a multi-antenna information receiver and a dual-functional
multi-antenna energy receiver which is also capable of decoding information.
Due to the open nature of wireless medium and the dual purpose of information
and energy transmission, secure information transmission while ensuring
efficient energy harvesting is a critical issue for such a broadcast system.
Assuming that physical layer security techniques are applied to the system to
ensure secure transmission from the transmitter to the information receiver, we
study beamforming design to maximize the achievable secrecy rate subject to a
total power constraint and an energy harvesting constraint. First, based on
semidefinite relaxation, we propose global optimal solutions to the secrecy
rate maximization (SRM) problem in the single-stream case and a specific
full-stream case where the difference of Gram matrices of the channel matrices
is positive semidefinite. Then, we propose a simple iterative algorithm named
inexact block coordinate descent (IBCD) algorithm to tackle the SRM problem of
general case with arbitrary number of streams. We proves that the IBCD
algorithm can monotonically converge to a Karush-Kuhn-Tucker (KKT) solution to
the SRM problem. Furthermore, we extend the IBCD algorithm to the joint
beamforming and artificial noise design problem. Finally, simulations are
performed to validate the performance of the proposed beamforming algorithms.Comment: Submitted to journal for possible publication. First submission to
arXiv Mar. 14 201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Power Efficient and Secure Full-Duplex Wireless Communication Systems
In this paper, we study resource allocation for a full-duplex (FD) radio base
station serving multiple half-duplex (HD) downlink and uplink users
simultaneously. The considered resource allocation algorithm design is
formulated as a non-convex optimization problem taking into account minimum
required receive signal-to-interference-plus-noise ratios (SINRs) for downlink
and uplink communication and maximum tolerable SINRs at potential
eavesdroppers. The proposed optimization framework enables secure downlink and
uplink communication via artificial noise generation in the downlink for
interfering the potential eavesdroppers. We minimize the weighted sum of the
total downlink and uplink transmit power by jointly optimizing the downlink
beamformer, the artificial noise covariance matrix, and the uplink transmit
power. We adopt a semidefinite programming (SDP) relaxation approach to obtain
a tractable solution for the considered problem. The tightness of the SDP
relaxation is revealed by examining a sufficient condition for the global
optimality of the solution. Simulation results demonstrate the excellent
performance achieved by the proposed scheme and the significant transmit power
savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network
Security (CNS) 2015 in Florence, Italy, on September 30, 201
- …