2 research outputs found
Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users
In this paper, we consider the problem of resource allocation in the
orthogonal frequency division multiple access system with single source and M
untrusted users in presence of a friendly jammer. The jammer is used to improve
either the weighted sum secure rate or the overall system fairness. The
formulated optimization problem in both the cases is a mixed integer non-linear
programming problem, belonging to the class of NP-hard. In the sum secure rate
maximization scenario, we decouple the problem and first obtain the subcarrier
allocation at source and the decision for jammer power utilization on a
per-subcarrier basis. Then, we do joint source and jammer power allocation
using primal decomposition and alternating optimization framework. Next, we
consider fair resource allocation by introducing a novel concept of subcarrier
snatching with the help of jammer. We propose two schemes for jammer power
utilization, called proactively fair allocation (PFA) and on-demand allocation
(ODA). PFA considers equitable distribution of jammer power among the
subcarriers, while ODA distributes jammer power based on the user demand. In
both cases of jammer usage, we also present suboptimal solutions that solve the
power allocation at a highly reduced complexity. Asymptotically optimal
solutions are derived to benchmark optimality of the proposed schemes. We
compare the performance of our proposed schemes with equal power allocation at
source and jammer. Our simulation results demonstrate that the jammer can
indeed help in improving either the sum secure rate or the overall system
fairness
A Survey of Optimization Approaches for Wireless Physical Layer Security
Due to the malicious attacks in wireless networks, physical layer security
has attracted increasing concerns from both academia and industry. The research
on physical layer security mainly focuses either on the secrecy
capacity/achievable secrecy rate/capacity-equivocation region from the
perspective of information theory, or on the security designs from the
viewpoints of optimization and signal processing. Because of its importance in
security designs, the latter research direction is surveyed in a comprehensive
way in this paper. The survey begins with typical wiretap channel models to
cover common scenarios and systems. The topics on physical-layer security
designs are then summarized from resource allocation, beamforming/precoding,
and antenna/node selection and cooperation. Based on the aforementioned
schemes, the performance metrics and fundamental optimization problems are
discussed, which are generally adopted in security designs. Thereafter, the
state of the art of optimization approaches on each research topic of physical
layer security is reviewed from four categories of optimization problems, such
as secrecy rate maximization, secrecy outrage probability minimization, power
consumption minimization, and secure energy efficiency maximization.
Furthermore, the impacts of channel state information on optimization and
design are discussed. Finally, the survey concludes with the observations on
potential future directions and open challenges.Comment: to appear in IEEE Communications Surveys & Tutorial