170 research outputs found
Power Efficient MISO Beamforming for Secure Layered Transmission
This paper studies secure layered video transmission in a multiuser
multiple-input single-output (MISO) beamforming downlink communication system.
The power allocation algorithm design is formulated as a non-convex
optimization problem for minimizing the total transmit power while guaranteeing
a minimum received signal-to-interference-plus-noise ratio (SINR) at the
desired receiver. In particular, the proposed problem formulation takes into
account the self-protecting architecture of layered transmission and artificial
noise generation to prevent potential information eavesdropping. A
semi-definite programming (SDP) relaxation based power allocation algorithm is
proposed to obtain an upper bound solution. A sufficient condition for the
global optimal solution is examined to reveal the tightness of the upper bound
solution. Subsequently, two suboptimal power allocation schemes with low
computational complexity are proposed for enabling secure layered video
transmission. Simulation results demonstrate significant transmit power savings
achieved by the proposed algorithms and layered transmission compared to the
baseline schemes.Comment: Accepted for presentation at the IEEE Wireless Communications and
Networking Conference (WCNC), Istanbul, Turkey, 201
Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer
This paper considers a basic MIMO information-energy (I-E) broadcast system,
where a multi-antenna transmitter transmits information and energy
simultaneously to a multi-antenna information receiver and a dual-functional
multi-antenna energy receiver which is also capable of decoding information.
Due to the open nature of wireless medium and the dual purpose of information
and energy transmission, secure information transmission while ensuring
efficient energy harvesting is a critical issue for such a broadcast system.
Assuming that physical layer security techniques are applied to the system to
ensure secure transmission from the transmitter to the information receiver, we
study beamforming design to maximize the achievable secrecy rate subject to a
total power constraint and an energy harvesting constraint. First, based on
semidefinite relaxation, we propose global optimal solutions to the secrecy
rate maximization (SRM) problem in the single-stream case and a specific
full-stream case where the difference of Gram matrices of the channel matrices
is positive semidefinite. Then, we propose a simple iterative algorithm named
inexact block coordinate descent (IBCD) algorithm to tackle the SRM problem of
general case with arbitrary number of streams. We proves that the IBCD
algorithm can monotonically converge to a Karush-Kuhn-Tucker (KKT) solution to
the SRM problem. Furthermore, we extend the IBCD algorithm to the joint
beamforming and artificial noise design problem. Finally, simulations are
performed to validate the performance of the proposed beamforming algorithms.Comment: Submitted to journal for possible publication. First submission to
arXiv Mar. 14 201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Secure Layered Transmission in Multicast Systems with Wireless Information and Power Transfer
This paper considers downlink multicast transmit beamforming for secure
layered transmission systems with wireless simultaneous information and power
transfer. We study the power allocation algorithm design for minimizing the
total transmit power in the presence of passive eavesdroppers and energy
harvesting receivers. The algorithm design is formulated as a non-convex
optimization problem. Our problem formulation promotes the dual use of energy
signals in providing secure communication and facilitating efficient energy
transfer. Besides, we take into account a minimum required power for energy
harvesting at the idle receivers and heterogeneous quality of service (QoS)
requirements for the multicast video receivers. In light of the intractability
of the problem, we reformulate the considered problem by replacing a non-convex
probabilistic constraint with a convex deterministic constraint. Then, a
semidefinite programming relaxation (SDR) approach is adopted to obtain an
upper solution for the reformulated problem. Subsequently, sufficient
conditions for the global optimal solution of the reformulated problem are
revealed. Furthermore, we propose two suboptimal power allocation schemes based
on the upper bound solution. Simulation results demonstrate the excellent
performance and significant transmit power savings achieved by the proposed
schemes compared to isotropic energy signal generation.Comment: 7 pages, 3 figures, accepted for presentation at the IEEE
International Conference on Communications (ICC), Sydney, Australia, 201
Physical Layer Security for Mimo Wireless Systems
A steadily growing portion of modern communication systems in use today is based on wireless technologies that make use of smaller and more portable electronic devices. As a result, the need to provide a light-weight security strategy for these systems is becoming a more important problem. This thesis focuses on two techniques that belong to an active research area known as Physical Layer Security (PLS). While the underlying techniques of PLS have been known for some time, the potential secrecy benefits of them need further investigation. These potential benefits have generated a rising interest with the development of Multiple Input Multiple Output (MIMO) multi-antenna systems. The first PLS technique considered in this thesis is that of beamforming which is made possible using MIMO. Here a sender can focus the information signal in the direction of the intended receiver while reducing the quality of the signal observed by a potential eavesdropper. In addition to beamforming, the technique of artificial noise (AN) is also investigated. AN requires the sender to generate a random noise signal in addition to the information signal to further degrade an eavesdropper’s ability to detect and decode the information signal being directed to the intended receiver. MATLAB simulations based on these PLS techniques are performed and the results presented
- …