5,123 research outputs found
Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers
In this correspondence, we study the secure multiantenna transmission with
artificial noise (AN) under imperfect channel state information in the presence
of spatially randomly distributed eavesdroppers. We derive the optimal
solutions of the power allocation between the information signal and the AN for
minimizing the secrecy outage probability (SOP) under a target secrecy rate and
for maximizing the secrecy rate under a SOP constraint, respectively. Moreover,
we provide an interesting insight that channel estimation error affects the
optimal power allocation strategy in opposite ways for the above two
objectives. When the estimation error increases, more power should be allocated
to the information signal if we aim to decrease the rate-constrained SOP,
whereas more power should be allocated to the AN if we aim to increase the
SOP-constrained secrecy rate.Comment: 7 pages, 6 figure
Improving Anti-Eavesdropping Ability without Eavesdropper's CSI: A Practical Secure Transmission Design Perspective
This letter studies the practical design of secure transmissions without
knowing eavesdropper's channel state information (ECSI). An ECSI-irrelevant
metric is introduced to quantize the intrinsic anti-eavesdropping ability (AEA)
that the transmitter has on confronting the eavesdropper via secrecy encoding
together with artificial-noise-aided signaling. Non-adaptive and adaptive
transmission schemes are proposed to maximize the AEA with the optimal encoding
rates and power allocation presented in closed-form expressions. Analyses and
numerical results show that maximizing the AEA is equivalent to minimizing the
secrecy outage probability (SOP) for the worst case by ignoring eavesdropper's
receiver noise. Therefore, the AEA is a useful alternative to the SOP for
assessing and designing secure transmissions when the ECSI cannot be prior
known.Comment: 4 pages, 2 figures, to be published on IEEE Wireless Communications
Letters (WCL
Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization
Wireless caching has been widely recognized as a promising technique for
efficient content delivery. In this paper, by taking different file secrecy
levels into consideration, physical-layer security oriented content placement
is optimized in a stochastic cache-enabled cellular network. We propose an
analytical framework to investigate the nontrivial file delivery-secrecy
tradeoff. Specifically, we first derive the closed-form expressions for the
file hit and secrecy probabilities. The global optimal probabilistic content
placement policy is then analytically derived in terms of hit probability
maximization under file secrecy constraints. Numerical results are demonstrated
to verify our analytical findings and show that the targeted file secrecy
levels are crucial in balancing the file delivery-secrecy tradeoff.Comment: 5 pages, 4 figures, accepted to be published in IEEE Transactions on
Vehicular Technolog
Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization
This paper studies physical-layer security for a cache-enabled heterogeneous
cellular network comprised of a macro base station and multiple small base
stations (SBSs). We investigate a joint design on caching placement and file
delivery for realizing secure and energy-efficient transmissions against
randomly distributed eavesdroppers. We propose a novel hybrid "most popular
content" and "largest content diversity" caching placement policy to distribute
files of different popularities. Depending on the availability and placement of
the requested file, we employ three cooperative transmission schemes, namely,
distributed beamforming, frequency-domain orthogonal transmission, and best SBS
relaying, respectively. We derive analytical expressions for the connection
outage probability and secrecy outage probability for each transmission scheme.
Afterwards, we design the optimal transmission rates and caching allocation
successively to achieve a maximal overall secrecy throughput and secrecy energy
efficiency, respectively. Numerical results verify the theoretical analyses and
demonstrate the superiority of the proposed hybrid caching policy.Comment: 13 pages in double-column, 9 figures, accepted for publication on
IEEE Transactions on Communication
Cooper instability generated by attractive fermion-fermion interaction in the two-dimensional semi-Dirac semimetals
Cooper instability associated with superconductivity in the two-dimensional
semi-Dirac semimetals is attentively studied in the presence of attractive
Cooper-pairing interaction, which is the projection of an attractive
fermion-fermion interaction. Performing the standard renormalization group
analysis shows that the Cooper theorem is violated at zero chemical potential
but instead Cooper instability can be generated only if the absolute strength
of fermion-fermion coupling exceeds certain critical value and transfer
momentum is restricted to a confined region, which is determined by the initial
conditions. Rather, the Cooper theorem would be instantly restored once a
finite chemical potential is introduced and thus a chemical potential-tuned
phase transition is expected. Additionally, we briefly examine the effects of
impurity scatterings on the Cooper instability at zero chemical potential,
which in principle are harmful to Cooper instability although they can enhance
the density of states of systems. Furthermore, the influence of competition
between a finite chemical potential and impurities upon the Cooper instability
is also simply investigated. These results are expected to provide instructive
clues for exploring unconventional superconductors in the kinds of semimetals.Comment: 18 pages; 14 figure
Distribution of quantum Fisher information in asymmetric cloning machines
An unknown quantum state cannot be copied on demand and broadcast freely due
to the famous no-cloning theorem. Approximate cloning schemes have been
proposed to achieve the optimal cloning characterized by the maximal fidelity
between the original and its copies. Here, from the perspective of quantum
Fisher information (QFI), we investigate the distribution of QFI in asymmetric
cloning machines which produce two nonidentical copies. As one might expect,
improving the QFI of one copy results in decreasing the QFI of the other copy,
roughly the same as that of fidelity. It is perhaps also unsurprising that
asymmetric phase-covariant cloning machine outperforms universal cloning
machine in distributing QFI since a priori information of the input state has
been utilized. However, interesting results appear when we compare the
distributabilities of fidelity (which quantifies the full information of
quantum states), and QFI (which only captures the information of relevant
parameters) in asymmetric cloning machines. In contrast to the results of
fidelity, where the distributability of symmetric cloning is always optimal for
any d-dimensional cloning, we find that asymmetric cloning performs always
better than symmetric cloning on the distribution of QFI for , but
this conclusion becomes invalid when .Comment: 9 pages, 5 figures. Comments are welcom
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
Device-to-device (D2D) communication raises new transmission secrecy
protection challenges, since conventional physical layer security approaches,
such as multiple antennas and cooperation techniques, are invalid due to its
resource/size constraints. The full-duplex (FD) jamming receiver, which
radiates jamming signals to confuse eavesdroppers when receiving the desired
signal simultaneously, is a promising candidate. Unlike existing endeavors that
assume the FD jamming receiver always improves the secrecy performance compared
with the half-duplex (HD) receiver, we show that this assumption highly depends
on the instantaneous residual self-interference cancellation level and may be
invalid. We propose an adaptive jamming receiver operating in a switched FD/HD
mode for a D2D link in random networks. Subject to the secrecy outage
probability constraint, we optimize the transceiver parameters, such as
signal/jamming powers, secrecy rates and mode switch criteria, to maximize the
secrecy throughput. Most of the optimization operations are taken off-line and
only very limited on-line calculations are required to make the scheme with low
complexity. Furthermore, some interesting insights are provided, such as the
secrecy throughput is a quasi-concave function. Numerical results are
demonstrated to verify our theoretical findings, and to show its superiority
compared with the receiver operating in the FD or HD mode only
Searching SUSY Leptonic Partner at the CERN LHC
Motivated by the observed excess of the di-photon signal in Higgs searches,
, we argue that models with
enhanced alone are the most favorable scenarios
when the latest LHC/Tevatron results are all taken into account. We study the
phenomenology of a supersymmetric scenario of light stau first proposed by
\textit{Carena et. al. \cite{carlos}} that predicts a 125 GeV SM-like Higgs
boson with enhanced diphoton decay through light stau loops. Since it is
extremely challenging to search the Drell-Yan stau pair at the LHC due to the
small production rate, we focus on the parameter space with enhanced production
of inclusive stau pairs, in particular, via fusion or gaugino pairs.
We study its phenomenology in both pure leptonic tau channels
and hadronic tau tagged channels. We find the same-sign dilepton from
may
significantly improve the discovery potential with even 7--8 TeV LHC of data. In the case of hadronic tau pair, we use the final
state to search and find that even with the
most optimistic region of GeV, it requires at least 50
fb data of 14 TeV LHC to reach a significance of 3.5 .
Therefore, we conclude it is difficult to claim discovery only through hadronic
tau based on the data by the 2012 shut-down. 5 reach for our most
optimistic region then requires 100 fb data with 14 TeV running.Comment: 18 pages, 8 figures, version accepted by Physics Letter
Energy-Efficient Transmission Design in Non-Orthogonal Multiple Access
Non-orthogonal multiple access (NOMA) is considered as a promising technology
for improving the spectral efficiency (SE) in 5G. In this correspondence, we
study the benefit of NOMA in enhancing energy efficiency (EE) for a multi-user
downlink transmission, where the EE is defined as the ratio of the achievable
sum rate of the users to the total power consumption. Our goal is to maximize
the EE subject to a minimum required data rate for each user, which leads to a
non-convex fractional programming problem. To solve it, we first establish the
feasible range of the transmitting power that is able to support each user's
data rate requirement. Then, we propose an EE-optimal power allocation strategy
that maximizes the EE. Our numerical results show that NOMA has superior EE
performance in comparison with conventional orthogonal multiple access (OMA)
Influence and Safety Evaluation of Underground Structure Construction on Adjacent Existing Subway Section
In recent years, with the rapid development of subway and underground comprehensive pipe corridor, the problem of close connection between underground structure and existing subway section structure is often encountered in engineering construction. During construction, the newly built underground structure will disturb the stratum, easily cause the additional displacement deformation and internal force change of the existing tunnel structure, and then lead to safety accidents. Therefore, it is particularly important to analyze the influence and safety evaluation of the new construction on the existing subway structure. This paper takes the construction of new underground power pipe gallery close to the existing subway section as an engineering case. The influence of adjacent construction on the existing structure is analyzed by three-dimensional finite element method, and then the safety of the existing structure is evaluated through deformation prediction, internal force analysis and bearing capacity checking calculation, and some construction safety protection suggestions are put forward. It has a certain reference for similar proximity projects
- β¦