437 research outputs found

    Transmit optimization techniques for physical layer security

    Get PDF
    PhD ThesisOver the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results

    Survey on the state-of-the-art in device-to-device communication: A resource allocation perspective

    Get PDF
    Device to Device (D2D) communication takes advantage of the proximity between the communicating devices in order to achieve efficient resource utilization, improved throughput and energy efficiency, simultaneous serviceability and reduced latency. One of the main characteristics of D2D communication is reuse of the frequency resource in order to improve spectral efficiency of the system. Nevertheless, frequency reuse introduces significantly high interference levels thus necessitating efficient resource allocation algorithms that can enable simultaneous communication sessions through effective channel and/or power allocation. This survey paper presents a comprehensive investigation of the state-of-the-art resource allocation algorithms in D2D communication underlaying cellular networks. The surveyed algorithms are evaluated based on heterogeneous parameters which constitute the elementary features of a resource allocation algorithm in D2D paradigm. Additionally, in order to familiarize the readers with the basic design of the surveyed resource allocation algorithms, brief description of the mode of operation of each algorithm is presented. The surveyed algorithms are divided into four categories based on their technical doctrine i.e., conventional optimization based, Non-Orthogonal-MultipleAccess (NOMA) based, game theory based and machine learning based techniques. Towards the end, several open challenges are remarked as the future research directions in resource allocation for D2D communication

    Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

    Get PDF
    This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure com- munication. We exploit a novel and practical scenario that the PBs and the transmitter may belong to different operators and a hierarchical energy interaction between the PBs and the transmitter is considered. Specifically, the monetary incentives are required for the PBs to assist the transmitter for secure communications. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system, where the transmitter and the PB are modelled as leader and follower, respectively, each maximizing their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived where we study various scenarios of eavesdroppers and legitimate users that can have impact on the optimality of the derived solutions. Finally, numerical results are provided to validate our proposed schemes

    Performance Analysis and Resource Allocation of STAR-RIS Aided Wireless-Powered NOMA System

    Full text link
    This paper proposes a simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) aided wireless-powered non-orthogonal multiple access (NOMA) system, which includes an access point (AP), a STAR-RIS, and two non-orthogonal users located at both sides of the STAR-RIS. In this system, the users first harvest the radio-frequency energy from the AP in the downlink, then adopt the harvested energy to transmit information to the AP in the uplink concurrently. Two policies are considered for the proposed system. The first one assumes that the time-switching protocol is used in the downlink while the energy-splitting protocol is adopted in the uplink, named TEP. The second one assumes that the energy-splitting protocol is utilized in both the downlink and uplink, named EEP. The outage probability, sum throughput, and average age of information (AoI) of the proposed system with TEP and EEP are investigated over Nakagami-m fading channels. In addition, we also analyze the outage probability, sum throughput, and average AoI of the STAR-RIS aided wireless-powered time-division-multiple-access (TDMA) system. Simulation and numerical results show that the proposed system with TEP and EEP outperforms baseline schemes, and significantly improves sum throughput performance but reduces outage probability and average AoI performance compared to the STAR-RIS aided wireless-powered TDMA system. Furthermore, to maximize the sum throughput and ensure a certain average AoI, we design a genetic-algorithm based time allocation and power allocation (GA-TAPA) algorithm. Simulation results demonstrate that the proposed GA-TAPA method can significantly improve the sum throughput by adaptively adjusting system parameters.Comment: 30 pages, 12 figure

    Power Minimization Resource Allocation for Underlay MISO-NOMA SWIPT Systems

    Get PDF
    The combination of cognitive radio and non-orthogonal multiple access (NOMA) has tremendous potential to achieve high spectral efficiency in the IoT era. In this paper, we focus on the energy-efficient resource allocation of a cognitive multiple-input single-output NOMA system with the aid of simultaneous wireless information and power transfer. Specifically, a non-linear energy harvesting (EH) model is adopted to characterize the non-linear energy conversion property. In order to achieve the green design goal, we aim for the minimization of the system power consumption by jointly designing the transmit beamformer and the receive power splitter subject to the information transmission and EH harvesting requirements of second users (SUs), and the maximum tolerable interference constraints at primary users. However, the formulated optimization problem is non-convex and hard to tackle. By exploiting the classic semi-definite relaxation and successive convex approximation, we propose a penalty function-based algorithm to solve the non-convex problem. The convergence of the proposed algorithm is further proved. Finally, simulation results demonstrate that the non-linear EH model is able to strongly reflect the property of practical energy harvester and the performance gain of the proposed algorithm than the baseline scheme

    Game theory-based resource allocation for secure WPCN multiantenna multicasting systems

    Get PDF
    This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure com- munication. We exploit a novel and practical scenario that the PBs and the transmitter may belong to different operators and a hierarchical energy interaction between the PBs and the transmitter is considered. Specifically, the monetary incentives are required for the PBs to assist the transmitter for secure communications. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system, where the transmitter and the PB are modelled as leader and follower, respectively, each maximizing their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived where we study various scenarios of eavesdroppers and legitimate users that can have impact on the optimality of the derived solutions. Finally, numerical results are provided to validate our proposed schemes
    corecore