171 research outputs found
Secure Short-Packet Communications for Mission-Critical IoT Applications
In pervasive Internet of Things (IoT) applications, the use of short packets
is expected to meet the stringent latency requirement in ultra-reliable
low-latency communications; however, the incurred security issues and the
impact of finite blocklength coding on the physical-layer security have not
been well understood. This paper comprehensively investigates the performance
of secure short-packet communications in a mission-critical IoT system with an
external multi-antenna eavesdropper. An analytical framework is proposed to
approximate the average achievable secrecy throughput of the system with finite
blocklength coding. To gain more insight, a simple case with a single-antenna
access point (AP) is considered first, in which the secrecy throughput is
approximated in a closed form. Based on that result, the optimal blocklengths
to maximize the secrecy throughput with and without the reliability and latency
constraints, respectively, are derived. For the case with a multi-antenna AP,
following the proposed analytical framework, closed-form approximations for the
secrecy throughput are obtained under both beamforming and
artificial-noise-aided transmission schemes. Numerical results verify the
accuracy of the proposed approximations and illustrate the impact of the system
parameters on the tradeoff between transmission latency and reliability under
the secrecy constraint.Comment: 14 pages, 8 figures, accepted for publication in the IEEE
Transactions on Wireless Communication
Short-Packet Downlink Transmission with Non-Orthogonal Multiple Access
This work introduces downlink non-orthogonal multiple access (NOMA) into
short-packet communications. NOMA has great potential to improve fairness and
spectral efficiency with respect to orthogonal multiple access (OMA) for
low-latency downlink transmission, thus making it attractive for the emerging
Internet of Things. We consider a two-user downlink NOMA system with finite
blocklength constraints, in which the transmission rates and power allocation
are optimized. To this end, we investigate the trade-off among the transmission
rate, decoding error probability, and the transmission latency measured in
blocklength. Then, a one-dimensional search algorithm is proposed to resolve
the challenges mainly due to the achievable rate affected by the finite
blocklength and the unguaranteed successive interference cancellation. We also
analyze the performance of OMA as a benchmark to fully demonstrate the benefit
of NOMA. Our simulation results show that NOMA significantly outperforms OMA in
terms of achieving a higher effective throughput subject to the same finite
blocklength constraint, or incurring a lower latency to achieve the same
effective throughput target. Interestingly, we further find that with the
finite blocklength, the advantage of NOMA relative to OMA is more prominent
when the effective throughput targets at the two users become more comparable.Comment: 15 pages, 9 figures. This is a longer version of a paper to appear in
IEEE Transactions on Wireless Communications. Citation Information: X. Sun,
S. Yan, N. Yang, Z. Ding, C. Shen, and Z. Zhong, "Short-Packet Downlink
Transmission with Non-Orthogonal Multiple Access," IEEE Trans. Wireless
Commun., accepted to appear [Online]
https://ieeexplore.ieee.org/document/8345745
Joint Optimization for Secure and Reliable Communications in Finite Blocklength Regime
To realize ultra-reliable low latency communications with high spectral
efficiency and security, we investigate a joint optimization problem for
downlink communications with multiple users and eavesdroppers in the finite
blocklength (FBL) regime. We formulate a multi-objective optimization problem
to maximize a sum secrecy rate by developing a secure precoder and to minimize
a maximum error probability and information leakage rate. The main challenges
arise from the complicated multi-objective problem, non-tractable back-off
factors from the FBL assumption, non-convexity and non-smoothness of the
secrecy rate, and the intertwined optimization variables. To address these
challenges, we adopt an alternating optimization approach by decomposing the
problem into two phases: secure precoding design, and maximum error probability
and information leakage rate minimization. In the first phase, we obtain a
lower bound of the secrecy rate and derive a first-order Karush-Kuhn-Tucker
(KKT) condition to identify local optimal solutions with respect to the
precoders. Interpreting the condition as a generalized eigenvalue problem, we
solve the problem by using a power iteration-based method. In the second phase,
we adopt a weighted-sum approach and derive KKT conditions in terms of the
error probabilities and leakage rates for given precoders. Simulations validate
the proposed algorithm.Comment: 30 pages, 8 figure
Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design
Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are
anticipated to play crucial roles in the development of 5G-and-beyond wireless
networks and the Internet of Things (IoT). In this paper, we propose a secure
SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay,
periodically receiving and relaying small data packets from a remote IoT device
to its receiver in two hops with strict latency requirements, in the presence
of an eavesdropper. This system requires careful optimization of important
design parameters, such as the coding blocklengths of both hops, transmit
powers, and UAV's trajectory. While the overall optimization problem is
nonconvex, we tackle it by applying a block successive convex approximation
(BSCA) approach to divide the original problem into three subproblems and solve
them separately. Then, an overall iterative algorithm is proposed to obtain the
final design with guaranteed convergence. Our proposed low-complexity algorithm
incorporates 3D trajectory design and resource management to optimize the
effective average secrecy throughput of the communication system over the
course of UAV-relay's mission. Simulation results demonstrate significant
performance improvements compared to various benchmark schemes and provide
useful design insights on the coding blocklengths and transmit powers along the
trajectory of the UAV
- …