109 research outputs found
Wireless transmission protocols using relays for broadcast and information exchange channels
Relays have been used to overcome existing network performance bottlenecks in meeting the growing
demand for large bandwidth and high quality of service (QoS) in wireless networks. This thesis
proposes several wireless transmission protocols using relays in practical multi-user broadcast and
information exchange channels. The main theme is to demonstrate that efficient use of relays provides
an additional dimension to improve reliability, throughput, power efficiency and secrecy. First,
a spectrally efficient cooperative transmission protocol is proposed for the multiple-input and singleoutput
(MISO) broadcast channel to improve the reliability of wireless transmission. The proposed
protocol mitigates co-channel interference and provides another dimension to improve the diversity
gain. Analytical and simulation results show that outage probability and the diversity and multiplexing
tradeoff of the proposed cooperative protocol outperforms the non-cooperative scheme. Second,
a two-way relaying protocol is proposed for the multi-pair, two-way relaying channel to improve the
throughput and reliability. The proposed protocol enables both the users and the relay to participate
in interference cancellation. Several beamforming schemes are proposed for the multi-antenna
relay. Analytical and simulation results reveal that the proposed protocol delivers significant improvements
in ergodic capacity, outage probability and the diversity and multiplexing tradeoff if compared
to existing schemes. Third, a joint beamforming and power management scheme is proposed for
multiple-input and multiple-output (MIMO) two-way relaying channel to improve the sum-rate. Network
power allocation and power control optimisation problems are formulated and solved using
convex optimisation techniques. Simulation results verify that the proposed scheme delivers better
sum-rate or consumes lower power when compared to existing schemes. Fourth, two-way secrecy
schemes which combine one-time pad and wiretap coding are proposed for the scalar broadcast channel
to improve secrecy rate. The proposed schemes utilise the channel reciprocity and employ relays
to forward secret messages. Analytical and simulation results reveal that the proposed schemes are
able to achieve positive secrecy rates even when the number of users is large. All of these new wireless
transmission protocols help to realise better throughput, reliability, power efficiency and secrecy
for wireless broadcast and information exchange channels through the efficient use of relays
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.This work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905)
- …