7,463 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks
We consider a broadcast channel, in which a multi-antenna transmitter (Alice)
sends confidential information signals to legitimate users (Bobs) in
the presence of eavesdroppers (Eves). Alice uses MIMO precoding to generate
the information signals along with her own (Tx-based) friendly jamming.
Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves
a "vulnerability region" around each Bob, which can be exploited by a nearby
Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ)
with Rx-based friendly jamming (RxFJ), generated by each Bob. Specifically,
each Bob uses self-interference suppression (SIS) to transmit a friendly
jamming signal while simultaneously receiving an information signal over the
same channel. We minimize the powers allocated to the information, TxFJ, and
RxFJ signals under given guarantees on the individual secrecy rate for each
Bob. The problem is solved for the cases when the eavesdropper's channel state
information is known/unknown. Simulations show the effectiveness of the
proposed solution. Furthermore, we discuss how to schedule transmissions when
the rate requirements need to be satisfied on average rather than
instantaneously. Under special cases, a scheduling algorithm that serves only
the strongest receivers is shown to outperform the one that schedules all
receivers.Comment: IEEE Transactions on Communication
On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT
We study the problem of secure transmission over a Gaussian multi-input
single-output (MISO) two receiver channel with an external eavesdropper, under
the assumption that the state of the channel which is available to each
receiver is conveyed either perfectly () or with delay () to the
transmitter. Denoting by , , and the channel state information
at the transmitter (CSIT) of user 1, user 2, and eavesdropper, respectively,
the overall CSIT can then alternate between eight possible states, i.e.,
. We denote by the
fraction of time during which the state occurs. Under these
assumptions, we first consider the Gaussian MISO wiretap channel and
characterize the secure degrees of freedom (SDoF). Next, we consider the
general multi-receiver setup and characterize the SDoF region of fixed hybrid
states , , and . We then focus our attention on the symmetric
case in which . For this case, we establish bounds
on SDoF region. The analysis reveals that alternating CSIT allows synergistic
gains in terms of SDoF; and shows that, by opposition to encoding separately
over different states, joint encoding across the states enables strictly better
secure rates. Furthermore, we specialize our results for the two receivers
channel with an external eavesdropper to the two-user broadcast channel. We
show that, the synergistic gains in terms of SDoF by alternating CSIT is not
restricted to multi-receiver wiretap channels; and, can also be harnessed under
broadcast setting.Comment: To Appear in IEEE Transactions on Information Forensics and Securit
Polar Coding for the Cognitive Interference Channel with Confidential Messages
In this paper, we propose a low-complexity, secrecy capacity achieving polar
coding scheme for the cognitive interference channel with confidential messages
(CICC) under the strong secrecy criterion. Existing polar coding schemes for
interference channels rely on the use of polar codes for the multiple access
channel, the code construction problem of which can be complicated. We show
that the whole secrecy capacity region of the CICC can be achieved by simple
point-to-point polar codes due to the cognitivity, and our proposed scheme
requires the minimum rate of randomness at the encoder
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
In this work, we prove that a positive secure degree of freedom is achievable
for a large class of Gaussian channels as long as the channel is not degraded
and the channel is fully connected. This class includes the MAC wire-tap
channel, the 2-user interference channel with confidential messages, the 2-user
interference channel with an external eavesdropper. Best known achievable
schemes to date for these channels use Gaussian signaling. In this work, we
show that structured codes outperform Gaussian random codes at high SNR when
channel gains are real numbers.Comment: 6 pages, Submitted to IEEE Globecom, March 200
- …