4 research outputs found

    Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints

    Full text link
    In this paper, we study multibeam satellite secure communication through physical (PHY) layer security techniques, i.e., joint power control and beamforming. By first assuming that the Channel State Information (CSI) is available and the beamforming weights are fixed, a novel secure satellite system design is investigated to minimize the transmit power with individual secrecy rate constraints. An iterative algorithm is proposed to obtain an optimized power allocation strategy. Moreover, sub-optimal beamforming weights are obtained by completely eliminating the co-channel interference and nulling the eavesdroppers' signal simultaneously. In order to obtain jointly optimized power allocation and beamforming strategy in some practical cases, e.g., with certain estimation errors of the CSI, we further evaluate the impact of the eavesdropper's CSI on the secure multibeam satellite system design. The convergence of the iterative algorithm is proven under justifiable assumptions. The performance is evaluated by taking into account the impact of the number of antenna elements, number of beams, individual secrecy rate requirement, and CSI. The proposed novel secure multibeam satellite system design can achieve optimized power allocation to ensure the minimum individual secrecy rate requirement. The results show that the joint beamforming scheme is more favorable than fixed beamforming scheme, especially in the cases of a larger number of satellite antenna elements and higher secrecy rate requirement. Finally, we compare the results under the current satellite air-interface in DVB-S2 and the results under Gaussian inputs.Comment: 34 pages, 10 figures, 1 table, submitted to "Transactions on Information Forensics and Security

    On the secrecy performance of land mobile satellite communication systems

    Get PDF
    In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas and utilize maximal ratio combining (MRC) to receive the confidential message. Specifically, in terms of the availability of the eavesdropper’s CSI at the satellite, we consider both passive (Scenario I) and active (Scenario II) eavesdropping. For Scenario I where the eavesdropper’s channel state information (CSI) is unknown to the satellite, closed-form expressions for the probability of non-zero secrecy capacity and secrecy outage probability are derived. Furthermore, expressions for the asymptotic secrecy outage probability are also presented to reveal the secrecy diversity order and array gain of the considered system. For Scenario II where the eavesdropper’s CSI is available at the satellite, novel expressions for the exact and asymptotic average secrecy capacity are obtained. Based on a simple asymptotic formula, we can characterize the high signalto- noise ratio (SNR) slope and high SNR power offset of the LMS systems. Finally, simulations are provided to validate our theoretical analysis and show the effect of different parameters on the system performance

    Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers

    Get PDF
    The problem motivates this paper is that securing the critical data of 5G based wireless IoT network is of significant importance. Wireless 5G IoT systems consist of a large number of devices (low-cost legitimate users), which are of low complexity and under strict energy constraints. Physical layer security (PLS) schemes, along with energy harvesting, have emerged as a potential candidate that provides an effective solution to address this issue. During the data collection process of IoT, PHY security techniques can exploit the characteristics of the wireless channel to ensure secure communication. This paper focuses on optimizing the secrecy rate for simultaneous wireless information and power transfer (SWIPT) IoT system, considering that the malicious eavesdroppers can intercept the data. In particular, the main aim is to optimize the secrecy rate of the system under signal to interference noise ratio (SINR), energy harvesting (EH), and total transmits power constraints. We model our design as an optimization problem that advocates the use of additional noise to ensure secure communication and guarantees efficient wireless energy transfer. The primary problem is non-convex due to complex objective functions in terms of transmit beamforming matrix and power splitting ratios. We have considered both the perfect channel state information (CSI) and the imperfect CSI scenarios. To circumvent the non-convexity of the primary problem in perfect CSI case, we proposed a solution based on the concave-convex procedure (CCCP) iterative algorithm, which results in a maximum local solution for the secrecy rate. In the imperfect CSI scenario, we facilitate the use of S-procedure and present a solution based on the iterative successive convex approximation (SCA) approach. Simulation results present the validations of the proposed algorithms. The results provide an insightful view that the proposed iterative method based on the CCCP algorithm achieves higher secrecy rates and lower computational complexity in comparison to the other algorithms
    corecore