21 research outputs found

    Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer

    Full text link
    This paper considers a basic MIMO information-energy (I-E) broadcast system, where a multi-antenna transmitter transmits information and energy simultaneously to a multi-antenna information receiver and a dual-functional multi-antenna energy receiver which is also capable of decoding information. Due to the open nature of wireless medium and the dual purpose of information and energy transmission, secure information transmission while ensuring efficient energy harvesting is a critical issue for such a broadcast system. Assuming that physical layer security techniques are applied to the system to ensure secure transmission from the transmitter to the information receiver, we study beamforming design to maximize the achievable secrecy rate subject to a total power constraint and an energy harvesting constraint. First, based on semidefinite relaxation, we propose global optimal solutions to the secrecy rate maximization (SRM) problem in the single-stream case and a specific full-stream case where the difference of Gram matrices of the channel matrices is positive semidefinite. Then, we propose a simple iterative algorithm named inexact block coordinate descent (IBCD) algorithm to tackle the SRM problem of general case with arbitrary number of streams. We proves that the IBCD algorithm can monotonically converge to a Karush-Kuhn-Tucker (KKT) solution to the SRM problem. Furthermore, we extend the IBCD algorithm to the joint beamforming and artificial noise design problem. Finally, simulations are performed to validate the performance of the proposed beamforming algorithms.Comment: Submitted to journal for possible publication. First submission to arXiv Mar. 14 201

    Sample Approximation-Based Deflation Approaches for Chance SINR Constrained Joint Power and Admission Control

    Get PDF
    Consider the joint power and admission control (JPAC) problem for a multi-user single-input single-output (SISO) interference channel. Most existing works on JPAC assume the perfect instantaneous channel state information (CSI). In this paper, we consider the JPAC problem with the imperfect CSI, that is, we assume that only the channel distribution information (CDI) is available. We formulate the JPAC problem into a chance (probabilistic) constrained program, where each link's SINR outage probability is enforced to be less than or equal to a specified tolerance. To circumvent the computational difficulty of the chance SINR constraints, we propose to use the sample (scenario) approximation scheme to convert them into finitely many simple linear constraints. Furthermore, we reformulate the sample approximation of the chance SINR constrained JPAC problem as a composite group sparse minimization problem and then approximate it by a second-order cone program (SOCP). The solution of the SOCP approximation can be used to check the simultaneous supportability of all links in the network and to guide an iterative link removal procedure (the deflation approach). We exploit the special structure of the SOCP approximation and custom-design an efficient algorithm for solving it. Finally, we illustrate the effectiveness and efficiency of the proposed sample approximation-based deflation approaches by simulations.Comment: The paper has been accepted for publication in IEEE Transactions on Wireless Communication

    Outage Constrained Robust Secure Transmission for MISO Wiretap Channels

    Full text link
    In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceeds certain threshold with high probability. Therefore including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem non-convex and hence difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem using a novel two-step approach. Under a wide range of uncertainty models, our developed algorithms can obtain high-quality solutions, sometimes even exact global solutions, for the robust secure beamformer design problem. Simulation results are presented to verify the effectiveness and robustness of the proposed algorithms

    Arithmetic Average Density Fusion -- Part I: Some Statistic and Information-theoretic Results

    Full text link
    Finite mixture such as the Gaussian mixture is a flexible and powerful probabilistic modeling tool for representing the multimodal distribution widely involved in many estimation and learning problems. The core of it is representing the target distribution by the arithmetic average (AA) of a finite number of sub-distributions which constitute a mixture. While the mixture has been widely used for single sensor filter design, it is only recent that the AA fusion demonstrates compelling performance for multi-sensor filter design. In this paper, some statistic and information-theoretic results are given on the covariance consistency, mean square error, mode-preservation capacity, and the information divergence of the AA fusion approach. In particular, based on the concept of conservative fusion, the relationship of the AA fusion with the existing conservative fusion approaches such as covariance union and covariance intersection is exposed. A suboptimal weighting approach has been proposed, which jointly with the best mixture-fit property of the AA fusion leads to a max-min optimization problem. Linear Gaussian models are considered for algorithm illustration and simulation comparison, resulting in the first-ever AA fusion-based multi-sensor Kalman filter.Comment: 30 pages, 14 figures, 3 tables. Information Fusion, 202

    Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities

    Full text link
    In cognitive radio networks (CRNs) with multiple channels, various channel-assembling (ChA) strategies may be applied to secondary users (SUs), resulting in different achieved capacity. However, there is no previous work on determining the capacity upper bound (UB) of ChA for SUs under given system configurations. In this paper, we derive the maximum capacity for CRNs with ChA through Markov chain modeling, considering that primary user (PU) activities are relatively static, compared with SU services. We first deduce a closed-form expression for the maximum capacity in a dynamic ChA strategy and then demonstrate that no other ChA strategy can provide higher capacity than that achieved by this dynamic strategy. © 2012 IEEE.The work of L. Jiao and F. Y. Li was supported in part by the Research Council of Norway through the ECO-boat MOL project under Grant 210426. The work of E. Song was supported in part by the National Natural Science Foundation of China under Grant 60901037 and in part by the Foundation for Basic Research of Sichuan University for Distinguished Young Scholars under Grant 0082604132188. The work of V. Pla was supported by the Spanish Ministerio de Ciencia e Innovacion through Project TIN2010-21378-C02-02. The review of this paper was coordinated by Prof. B. Hamdaoui.Jiao, L.; Song, E.; Pla, V.; Li, FY. (2013). Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities. IEEE Transactions on Vehicular Technology. 62(4):1849-1855. https://doi.org/10.1109/TVT.2012.2236115S1849185562

    Joint Source-Relay Design for Full-Duplex MIMO AF Relay Systems

    Get PDF
    The performance of full-duplex (FD) relay systems can be greatly impacted by the self-interference (SI) at relays. By exploiting multiple antennas, the spectral efficiency of FD relay systems can be enhanced through spatial SI mitigation. This paper studies joint source transmit beamforming and relay processing to achieve rate maximization for FD multiple-input-multiple-output (MIMO) amplify-and-forward (AF) relay systems with consideration of relay processing delay. The problem is difficult to solve mainly due to the SI constraint induced by the relay processing delay. In this paper, we first present a sufficient condition under which the relay amplification matrix has rank-one structure. Then, for the case of rank-one amplification matrix, the rate maximization problem is equivalently simplified into an unconstrained problem that can be locally solved using the gradient ascent method. Next, we propose a penalty-based algorithmic framework, named P-BSUM, for a class of constrained optimization problems that have difficult equality constraints in addition to some convex constraints. By rewriting the rate maximization problem with a set of auxiliary variables, we apply the P-BSUM algorithm to the rate maximization problem in the general case. Finally, numerical results validate the efficiency of the proposed algorithms and show that the joint source-relay design approach under the rankone assumption could be strictly suboptimal as compared to the P-BSUM-based joint source-relay design approach

    Power allocation in multi-channel cognitive radio networks with channel assembling

    Get PDF
    Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one is to minimize the collision probability with PUs and the second one is to maximize the data rate while keeping the collision probability bounded. It is shown that the optimal solution for the first problem is to allocate all power onto the best channel based on a certain criterion. The second problem with a per-channel power budget constraint is proven to be NP-hard and therefore a pseudo-polynomial time solution for the problem is proposed. When a total power budget for all channels is imposed in the second problem, a computationally efficient algorithm is introduced. The proposed algorithms are validated by numerical experiments

    Optimal dimensionality reduction of sensor data in multisensor estimation fusion

    No full text
    corecore