1,890 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective
This article provides an overview of the state-of-art results on
communication resource allocation over space, time, and frequency for emerging
cognitive radio (CR) wireless networks. Focusing on the
interference-power/interference-temperature (IT) constraint approach for CRs to
protect primary radio transmissions, many new and challenging problems
regarding the design of CR systems are formulated, and some of the
corresponding solutions are shown to be obtainable by restructuring some
classic results known for traditional (non-CR) wireless networks. It is
demonstrated that convex optimization plays an essential role in solving these
problems, in a both rigorous and efficient way. Promising research directions
on interference management for CR and other related multiuser communication
systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex
optimization for signal processin
Worst-Case Robust Distributed Power Allocation in Shared Unlicensed Spectrum
This paper considers non-cooperative and fully-distributed power-allocation
for selfish transmitter-receiver pairs in shared unlicensed spectrum when
normalized-interference to each receiver is uncertain. We model each uncertain
parameter by the sum of its nominal (estimated) value and a bounded additive
error in a convex set, and show that the allocated power always converges to
its equilibrium, called robust Nash equilibrium (RNE). In the case of a bounded
and symmetric uncertainty region, we show that the power allocation problem for
each user is simplified, and can be solved in a distributed manner. We derive
the conditions for RNE's uniqueness and for convergence of the distributed
algorithm; and show that the total throughput (social utility) is less than
that at NE when RNE is unique. We also show that for multiple RNEs, the social
utility may be higher at a RNE as compared to that at the corresponding NE, and
demonstrate that this is caused by users' orthogonal utilization of bandwidth
at RNE. Simulations confirm our analysis
Generic Multiuser Coordinated Beamforming for Underlay Spectrum Sharing
The beamforming techniques have been recently studied as possible enablers
for underlay spectrum sharing. The existing beamforming techniques have several
common limitations: they are usually system model specific, cannot operate with
arbitrary number of transmit/receive antennas, and cannot serve arbitrary
number of users. Moreover, the beamforming techniques for underlay spectrum
sharing do not consider the interference originating from the incumbent primary
system. This work extends the common underlay sharing model by incorporating
the interference originating from the incumbent system into generic combined
beamforming design that can be applied on interference, broadcast or multiple
access channels. The paper proposes two novel multiuser beamforming algorithms
for user fairness and sum rate maximization, utilizing newly derived convex
optimization problems for transmit and receive beamformers calculation in a
recursive optimization. Both beamforming algorithms provide efficient operation
for the interference, broadcast and multiple access channels, as well as for
arbitrary number of antennas and secondary users in the system. Furthermore,
the paper proposes a successive transmit/receive optimization approach that
reduces the computational complexity of the proposed recursive algorithms. The
results show that the proposed complexity reduction significantly improves the
convergence rates and can facilitate their operation in scenarios which require
agile beamformers computation.Comment: 30 pages, 5 figure
Adaptive Power Allocation and Control in Time-Varying Multi-Carrier MIMO Networks
In this paper, we examine the fundamental trade-off between radiated power
and achieved throughput in wireless multi-carrier, multiple-input and
multiple-output (MIMO) systems that vary with time in an unpredictable fashion
(e.g. due to changes in the wireless medium or the users' QoS requirements).
Contrary to the static/stationary channel regime, there is no optimal power
allocation profile to target (either static or in the mean), so the system's
users must adapt to changes in the environment "on the fly", without being able
to predict the system's evolution ahead of time. In this dynamic context, we
formulate the users' power/throughput trade-off as an online optimization
problem and we provide a matrix exponential learning algorithm that leads to no
regret - i.e. the proposed transmit policy is asymptotically optimal in
hindsight, irrespective of how the system evolves over time. Furthermore, we
also examine the robustness of the proposed algorithm under imperfect channel
state information (CSI) and we show that it retains its regret minimization
properties under very mild conditions on the measurement noise statistics. As a
result, users are able to track the evolution of their individually optimum
transmit profiles remarkably well, even under rapidly changing network
conditions and high uncertainty. Our theoretical analysis is validated by
extensive numerical simulations corresponding to a realistic network deployment
and providing further insights in the practical implementation aspects of the
proposed algorithm.Comment: 25 pages, 4 figure
- …