1,929 research outputs found
Opportunistic Secrecy with a Strict Delay Constraint
We investigate the delay limited secrecy capacity of the flat fading channel
under two different assumptions on the available transmitter channel state
information (CSI). The first scenario assumes perfect prior knowledge of both
the main and eavesdropper channel gains. Here, upper and lower bounds on the
delay limited secrecy capacity are derived, and shown to be tight in the high
signal-to-noise ratio (SNR) regime. In the second scenario, only the main
channel CSI is assumed to be available at the transmitter where, remarkably, we
establish the achievability of a non-zero delay-limited secure rate, for a wide
class of channel distributions, with a high probability. In the two cases, our
achievability arguments are based on a novel two-stage key-sharing approach
that overcomes the secrecy outage phenomenon observed in earlier works.Comment: Submitted to IEEE Transactions on Information Theor
Secrecy Wireless Information and Power Transfer with MISO Beamforming
The dual use of radio signals for simultaneous wireless information and power
transfer (SWIPT) has recently drawn significant attention. To meet the
practical requirement that energy receivers (ERs) operate with significantly
higher received power as compared to information receivers (IRs), ERs need to
be deployed in more proximity to the transmitter than IRs. However, due to the
broadcast nature of wireless channels, one critical issue arises that the
messages sent to IRs can be eavesdropped by ERs, which possess better channels
from the transmitter. In this paper, we address this new secrecy communication
problem in a multiuser multiple-input single-output (MISO) SWIPT system where
one multi-antenna transmitter sends information and energy simultaneously to an
IR and multiple ERs, each with one single antenna. To optimally design transmit
beamforming vectors and their power allocation, two problems are investigated
with different aims: the first problem maximizes the secrecy rate for IR
subject to individual harvested energy constraints of ERs, while the second
problem maximizes the weighted sum-energy transferred to ERs subject to a
secrecy rate constraint for IR. We solve these two non-convex problems
optimally by reformulating each of them into a two-stage problem. First, by
fixing the signal-to-interference-plus-noise ratio (SINR) target for ERs (for
the first problem) or IR (for the second problem), we obtain the optimal
beamforming and power allocation solution by applying the technique of
semidefinite relaxation (SDR). Then, the original problems are solved by a
one-dimension search over the optimal SINR target for ERs or IR. Furthermore,
for each of the two studied problems, suboptimal solutions of lower complexity
are also proposed in which the information and energy beamforming vectors are
separately designed with their power allocation.Comment: accepted by IEEE Transactions on Signal Processing. Longer version of
arXiv:1306.096
Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design
Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are
anticipated to play crucial roles in the development of 5G-and-beyond wireless
networks and the Internet of Things (IoT). In this paper, we propose a secure
SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay,
periodically receiving and relaying small data packets from a remote IoT device
to its receiver in two hops with strict latency requirements, in the presence
of an eavesdropper. This system requires careful optimization of important
design parameters, such as the coding blocklengths of both hops, transmit
powers, and UAV's trajectory. While the overall optimization problem is
nonconvex, we tackle it by applying a block successive convex approximation
(BSCA) approach to divide the original problem into three subproblems and solve
them separately. Then, an overall iterative algorithm is proposed to obtain the
final design with guaranteed convergence. Our proposed low-complexity algorithm
incorporates 3D trajectory design and resource management to optimize the
effective average secrecy throughput of the communication system over the
course of UAV-relay's mission. Simulation results demonstrate significant
performance improvements compared to various benchmark schemes and provide
useful design insights on the coding blocklengths and transmit powers along the
trajectory of the UAV
State-of-the-art in Power Line Communications: from the Applications to the Medium
In recent decades, power line communication has attracted considerable
attention from the research community and industry, as well as from regulatory
and standardization bodies. In this article we provide an overview of both
narrowband and broadband systems, covering potential applications, regulatory
and standardization efforts and recent research advancements in channel
characterization, physical layer performance, medium access and higher layer
specifications and evaluations. We also identify areas of current and further
study that will enable the continued success of power line communication
technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on
Selected Areas in Communications. Special Issue on Power Line Communications
and its Integration with the Networking Ecosystem. 201
On Resource Allocation for Communication Systems with Delay and Secrecy Constraints
This dissertation studies fundamental limits of modern digital communication
systems in presence/absence of delay and secrecy constraints.
In the first part of this dissertation, we consider a typical time-division wireless
communication system wherein the channel strengths of the wireless users vary with
time with a power constraint at the base station and which is not subject to any
delay constraint. The objective is to allocate resources to the wireless users in an
equitable manner so as to achieve a specific throughput. This problem has been
looked at in different ways by previous researchers. We address this problem by
developing a systematic way of designing scheduling schemes that can achieve any
point on the boundary of the rate region. This allows us to map a desired throughput
to a specific scheduling scheme which can then be used to service the wireless users.
We then propose a simple scheme by which users can cooperate and then show that a
cooperative scheduling scheme enlarges the achievable rate region. A simple iterative
algorithm is proposed to find the resource allocation parameters and the scheduling
scheme for the cooperative system.
In the second part of the dissertation, a downlink time-division wireless sys-
tem that is subject to a delay constraint is studied, and the rate region and optimal
scheduling schemes are derived. The result of this study concludes that the achievable throughput of users decrease as the delay constraint is increased. Next, we consider
a problem motivated by cognitive radio applications which has been proposed as a
means to implement efficient reuse of the licensed spectrum. Previous research on this
topic has focussed largely on obtaining fundamental limits on achievable throughput
from a physical layer perspective. In this dissertation, we study the impact of im-
posing Quality of Service constraints (QoS) on the achievable throughput of users.
The result of this study gives insights on how the cognitive radio system needs to be
operated in the low and high QoS constraint regime.
Finally, the third part of this dissertation is motivated by the need for commu-
nicating information not only reliably, but also in a secure manner. To this end, we
study a source coding problem, wherein multiple sources needs to be communicated
to a receiver with the stipulation that there is no direct channel from the transmitter
to the receiver. However, there are many \agents" that can help carry the information
from the transmitter to the receiver. Depending on the reliability that the transmit-
ter has on each of the agents, information is securely encoded by the transmitter and
given to the agents, which will be subsequently given to the receiver. We study the
overhead that the transmitter has to incur for transmitting the information to the
receiver with the desired level of secrecy. The rate region for this problem is found
and simple achievable schemes are proposed. The main result is that, separate secure
coding of sources is optimal for achieving the sum-rate point for the general case of
the problem and the rate region for simple case of this problem
- …