46,421 research outputs found
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
On the Design of Secure Full-Duplex Multiuser Systems under User Grouping Method
Consider a full-duplex (FD) multiuser system where an FD base station (BS) is
designed to simultaneously serve both downlink users and uplink users in the
presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the
minimum secrecy rate (SR) among all legitimate users by proposing a novel user
grouping method, where information signals at the FD-BS are accompanied with
artificial noise to degrade the Eves' channel. The SR problem has a highly
nonconcave and nonsmooth objective, subject to nonconvex constraints due to
coupling between the optimization variables. Nevertheless, we develop a
path-following low-complexity algorithm, which invokes only a simple convex
program of moderate dimensions at each iteration. We show that our
path-following algorithm guarantees convergence at least to a local optima. The
numerical results demonstrate the merit of our proposed approach compared to
existing well-known ones, i.e., conventional FD and nonorthogonal multiple
access.Comment: 6 pages, 3 figure
A New Design Paradigm for Secure Full-Duplex Multiuser Systems
We consider a full-duplex (FD) multiuser system where an FD base station (BS)
is designed to simultaneously serve both downlink (DL) and uplink (UL) users in
the presence of half-duplex eavesdroppers (Eves). The problem is to maximize
the minimum (max-min) secrecy rate (SR) among all legitimate users, where the
information signals at the FD-BS are accompanied with artificial noise to
debilitate the Eves' channels. To enhance the max-min SR, a major part of the
power budget should be allocated to serve the users with poor channel
qualities, such as those far from the FD-BS, undermining the SR for other
users, and thus compromising the SR per-user. In addition, the main obstacle in
designing an FD system is due to the self-interference (SI) and co-channel
interference (CCI) among users. We therefore propose an alternative solution,
where the FD-BS uses a fraction of the time block to serve near DL users and
far UL users, and the remaining fractional time to serve other users. The
proposed scheme mitigates the harmful effects of SI, CCI and multiuser
interference, and provides system robustness. The SR optimization problem has a
highly nonconcave and nonsmooth objective, subject to nonconvex constraints.
For the case of perfect channel state information (CSI), we develop a
low-complexity path-following algorithm, which involves only a simple convex
program of moderate dimension at each iteration. We show that our
path-following algorithm guarantees convergence at least to a local optimum.
Then, we extend the path-following algorithm to the cases of partially known
Eves' CSI, where only statistics of CSI for the Eves are known, and worst-case
scenario in which Eves can employ a more advanced linear decoder. The merit of
our proposed approach is further demonstrated by extensive numerical results.Comment: Accepted for publication in IEEE Journal on Selected Areas in
Communications (JSAC), 201
Robust Secure Transmission for Active RIS Enabled Symbiotic Radio Multicast Communications
In this paper, we propose a robust secure transmission scheme for an active
reconfigurable intelligent surface (RIS) enabled symbiotic radio (SR) system in
the presence of multiple eavesdroppers (Eves). In the considered system, the
active RIS is adopted to enable the secure transmission of primary signals from
the primary transmitter to multiple primary users in a multicasting manner, and
simultaneously achieve its own information delivery to the secondary user by
riding over the primary signals. Taking into account the imperfect channel
state information (CSI) related with Eves, we formulate the system power
consumption minimization problem by optimizing the transmit beamforming and
reflection beamforming for the bounded and statistical CSI error models, taking
the worst-case SNR constraints and the SNR outage probability constraints at
the Eves into considerations, respectively. Specifically, the S-Procedure and
the Bernstein-Type Inequality are implemented to approximately transform the
worst-case SNR and the SNR outage probability constraints into tractable forms,
respectively. After that, the formulated problems can be solved by the proposed
alternating optimization (AO) algorithm with the semi-definite relaxation and
sequential rank-one constraint relaxation techniques. Numerical results show
that the proposed active RIS scheme can reduce up to 27.0% system power
consumption compared to the passive RIS.Comment: 32 Pages, 12 figures, accepted to IEEE Transactions on Wireless
Communication
Host-acquired virus genes support an ancient antiviral role of the piRNA pathway in dipterans
Endogenous viral elements (EVEs) have been recently investigated as a source of transgenerational immune memory. These “viral fossils” are abundant in Aedes mosquitoes and partner with the host’s primary antiviral defense system, the RNA interference (RNAi) pathways. This partnership appears unique to mosquitoes, which encode an expansion of the Piwi endoribonucleases. To interrogate EVE-Piwi partnerships and their role in antiviral defense, I performed a comparative small RNA analysis of two naturally occurring EVE-virus pairs – one in the mosquito Aedes albopictus, and one in the midge Chaoborus americanus. Both express an EVE related to the nucleoprotein of their respective bunyavirus. My results show that Piwis generally do not have antiviral functions in Chaoborus, however EVEs are associated with Piwi recruitment to matched viral RNAs. These findings raise the possibility that RNAi-mediated EVE-virus interactions may be more common among insects than currently recognized
Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks
We consider a broadcast channel, in which a multi-antenna transmitter (Alice)
sends confidential information signals to legitimate users (Bobs) in
the presence of eavesdroppers (Eves). Alice uses MIMO precoding to generate
the information signals along with her own (Tx-based) friendly jamming.
Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves
a "vulnerability region" around each Bob, which can be exploited by a nearby
Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ)
with Rx-based friendly jamming (RxFJ), generated by each Bob. Specifically,
each Bob uses self-interference suppression (SIS) to transmit a friendly
jamming signal while simultaneously receiving an information signal over the
same channel. We minimize the powers allocated to the information, TxFJ, and
RxFJ signals under given guarantees on the individual secrecy rate for each
Bob. The problem is solved for the cases when the eavesdropper's channel state
information is known/unknown. Simulations show the effectiveness of the
proposed solution. Furthermore, we discuss how to schedule transmissions when
the rate requirements need to be satisfied on average rather than
instantaneously. Under special cases, a scheduling algorithm that serves only
the strongest receivers is shown to outperform the one that schedules all
receivers.Comment: IEEE Transactions on Communication
- …