298 research outputs found
Power Allocation Strategy of Maximizing Secrecy Rate for Secure Directional Modulation Networks
In this paper, given the beamforming vector of confidential messages and artificial noise (AN) projection matrix and total power constraint, a power allocation (PA) strategy of maximizing secrecy rate (Max-SR) is proposed for secure directional modulation (DM) networks. By the method of Lagrange multiplier, the analytic expression of the proposed PA strategy is derived. To confirm the benefit from the Max-SRbased PA strategy, we take the null-space projection (NSP) beamforming scheme as an example and derive its closed-form expression of optimal PA strategy. From simulation results, we find the following facts: in the medium and high signal-to-noiseratio (SNR) regions, compared with three typical PA parameters such ? = 0:1, 0:5, and 0:9, the optimal PA shows a substantial SR performance gain with maximum gain percent up to more than 60%. Additionally, as the PA factor increases from 0 to 1, the achievable SR increases accordingly in the low SNR region whereas it first increases and then decreases in the medium and high SNR regions, where the SR can be approximately viewed as a convex function of the PA factor. Finally, as the number of antennas increases, the optimal PA factor becomes large and tends to one in the medium and high SNR region. In other words, the contribution of AN to SR can be trivial in such a situation
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
Joint Power Allocation and Beamforming for Active IRS-aided Directional Modulation Network
To boost the secrecy rate (SR) of the conventional directional modulation
(DM) network and overcome the double fading effect of the cascaded channels of
passive intelligent reflecting surface (IRS), a novel active IRS-assisted DM
system with a power adjusting strategy between transmitter and active IRS is
proposed in this paper. Then, a joint optimization of maximizing the SR is cast
by alternately optimizing the power allocation (PA) factors, transmit
beamforming at the BS, and reflect beamforming at the active IRS, subject to
the power constraint at IRS. To tackle the formulated non-convex optimization
problem, a high-performance scheme of maximizing SR based on fractional
programming (FP) and successive convex approximation (SCA) (Max-SR-FS) is
proposed, where the FP and SCA methods are employed to optimize the PA factor
of confidential message and the PA factor of power allocated to the BS, and the
SCA algorithm is also utilized to design the transmit beamforming and phase
shift matrix of the IRS. To reduce the high complexity, a low-complexity
scheme, named maximizing SR based on derivative operation (DO) and general
power iterative (GPI) (Max-SR-DG), is developed, where the DO and methods of
the equal amplitude reflecting (EAR) and GPI are adopted to derive the PA
factors and IRS phase shift matrix, respectively. Simulation results show that
with the same power constraint, both the proposed schemes harvest about 12
percent and 70 percent rate gains over the equal PA and passive IRS schemes,
respectively
- …