5,123 research outputs found

    Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers

    Full text link
    In this correspondence, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under a target secrecy rate and for maximizing the secrecy rate under a SOP constraint, respectively. Moreover, we provide an interesting insight that channel estimation error affects the optimal power allocation strategy in opposite ways for the above two objectives. When the estimation error increases, more power should be allocated to the information signal if we aim to decrease the rate-constrained SOP, whereas more power should be allocated to the AN if we aim to increase the SOP-constrained secrecy rate.Comment: 7 pages, 6 figure

    Improving Anti-Eavesdropping Ability without Eavesdropper's CSI: A Practical Secure Transmission Design Perspective

    Full text link
    This letter studies the practical design of secure transmissions without knowing eavesdropper's channel state information (ECSI). An ECSI-irrelevant metric is introduced to quantize the intrinsic anti-eavesdropping ability (AEA) that the transmitter has on confronting the eavesdropper via secrecy encoding together with artificial-noise-aided signaling. Non-adaptive and adaptive transmission schemes are proposed to maximize the AEA with the optimal encoding rates and power allocation presented in closed-form expressions. Analyses and numerical results show that maximizing the AEA is equivalent to minimizing the secrecy outage probability (SOP) for the worst case by ignoring eavesdropper's receiver noise. Therefore, the AEA is a useful alternative to the SOP for assessing and designing secure transmissions when the ECSI cannot be prior known.Comment: 4 pages, 2 figures, to be published on IEEE Wireless Communications Letters (WCL

    Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization

    Full text link
    Wireless caching has been widely recognized as a promising technique for efficient content delivery. In this paper, by taking different file secrecy levels into consideration, physical-layer security oriented content placement is optimized in a stochastic cache-enabled cellular network. We propose an analytical framework to investigate the nontrivial file delivery-secrecy tradeoff. Specifically, we first derive the closed-form expressions for the file hit and secrecy probabilities. The global optimal probabilistic content placement policy is then analytically derived in terms of hit probability maximization under file secrecy constraints. Numerical results are demonstrated to verify our analytical findings and show that the targeted file secrecy levels are crucial in balancing the file delivery-secrecy tradeoff.Comment: 5 pages, 4 figures, accepted to be published in IEEE Transactions on Vehicular Technolog

    Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization

    Full text link
    This paper studies physical-layer security for a cache-enabled heterogeneous cellular network comprised of a macro base station and multiple small base stations (SBSs). We investigate a joint design on caching placement and file delivery for realizing secure and energy-efficient transmissions against randomly distributed eavesdroppers. We propose a novel hybrid "most popular content" and "largest content diversity" caching placement policy to distribute files of different popularities. Depending on the availability and placement of the requested file, we employ three cooperative transmission schemes, namely, distributed beamforming, frequency-domain orthogonal transmission, and best SBS relaying, respectively. We derive analytical expressions for the connection outage probability and secrecy outage probability for each transmission scheme. Afterwards, we design the optimal transmission rates and caching allocation successively to achieve a maximal overall secrecy throughput and secrecy energy efficiency, respectively. Numerical results verify the theoretical analyses and demonstrate the superiority of the proposed hybrid caching policy.Comment: 13 pages in double-column, 9 figures, accepted for publication on IEEE Transactions on Communication

    Cooper instability generated by attractive fermion-fermion interaction in the two-dimensional semi-Dirac semimetals

    Full text link
    Cooper instability associated with superconductivity in the two-dimensional semi-Dirac semimetals is attentively studied in the presence of attractive Cooper-pairing interaction, which is the projection of an attractive fermion-fermion interaction. Performing the standard renormalization group analysis shows that the Cooper theorem is violated at zero chemical potential but instead Cooper instability can be generated only if the absolute strength of fermion-fermion coupling exceeds certain critical value and transfer momentum is restricted to a confined region, which is determined by the initial conditions. Rather, the Cooper theorem would be instantly restored once a finite chemical potential is introduced and thus a chemical potential-tuned phase transition is expected. Additionally, we briefly examine the effects of impurity scatterings on the Cooper instability at zero chemical potential, which in principle are harmful to Cooper instability although they can enhance the density of states of systems. Furthermore, the influence of competition between a finite chemical potential and impurities upon the Cooper instability is also simply investigated. These results are expected to provide instructive clues for exploring unconventional superconductors in the kinds of semimetals.Comment: 18 pages; 14 figure

    Distribution of quantum Fisher information in asymmetric cloning machines

    Full text link
    An unknown quantum state cannot be copied on demand and broadcast freely due to the famous no-cloning theorem. Approximate cloning schemes have been proposed to achieve the optimal cloning characterized by the maximal fidelity between the original and its copies. Here, from the perspective of quantum Fisher information (QFI), we investigate the distribution of QFI in asymmetric cloning machines which produce two nonidentical copies. As one might expect, improving the QFI of one copy results in decreasing the QFI of the other copy, roughly the same as that of fidelity. It is perhaps also unsurprising that asymmetric phase-covariant cloning machine outperforms universal cloning machine in distributing QFI since a priori information of the input state has been utilized. However, interesting results appear when we compare the distributabilities of fidelity (which quantifies the full information of quantum states), and QFI (which only captures the information of relevant parameters) in asymmetric cloning machines. In contrast to the results of fidelity, where the distributability of symmetric cloning is always optimal for any d-dimensional cloning, we find that asymmetric cloning performs always better than symmetric cloning on the distribution of QFI for d≀18d\leq18, but this conclusion becomes invalid when d>18d>18.Comment: 9 pages, 5 figures. Comments are welcom

    Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks

    Full text link
    Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only

    Searching SUSY Leptonic Partner at the CERN LHC

    Full text link
    Motivated by the observed excess of the di-photon signal in Higgs searches, σγγ/ΟƒSM≃1.5\sigma_{\gamma\gamma}/\sigma_{\rm SM}\simeq 1.5, we argue that models with enhanced Ξ“(hβ†’Ξ³Ξ³)\Gamma(h\to \gamma\gamma) alone are the most favorable scenarios when the latest LHC/Tevatron results are all taken into account. We study the phenomenology of a supersymmetric scenario of light stau first proposed by \textit{Carena et. al. \cite{carlos}} that predicts a 125 GeV SM-like Higgs boson with enhanced diphoton decay through light stau loops. Since it is extremely challenging to search the Drell-Yan stau pair at the LHC due to the small production rate, we focus on the parameter space with enhanced production of inclusive stau pairs, in particular, via bbΛ‰b\bar{b} fusion or gaugino pairs. We study its phenomenology in both pure leptonic tau Ο„β„“Β±\tau^\pm_\ell channels and hadronic tau tagged Ο„h\tau_h channels. We find the same-sign dilepton from Ο‡~1Β±Ο‡~20β†’Ο„β„“Β±Ο„β„“Β±+X\tilde{\chi}^\pm_1 \tilde{\chi}^0_2 \to \tau^\pm_\ell \tau^\pm_\ell+X may significantly improve the discovery potential with even 7--8 TeV LHC of O(30fbβˆ’1){\cal O}(30 \text{fb}^{-1}) data. In the case of hadronic tau pair, we use the final state j+Ο„hΟ„h+ETj+\tau_h \tau_h +\cancel{E}_T to search and find that even with the most optimistic region of M2∼200βˆ’300M_2\sim 200-300 GeV, it requires at least 50 fbβˆ’1^{-1} data of 14 TeV LHC to reach a significance of 3.5 Οƒ\sigma. Therefore, we conclude it is difficult to claim discovery only through hadronic tau based on the data by the 2012 shut-down. 5 Οƒ\sigma reach for our most optimistic region then requires 100 fbβˆ’1^{-1} data with 14 TeV running.Comment: 18 pages, 8 figures, version accepted by Physics Letter

    Energy-Efficient Transmission Design in Non-Orthogonal Multiple Access

    Full text link
    Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency (SE) in 5G. In this correspondence, we study the benefit of NOMA in enhancing energy efficiency (EE) for a multi-user downlink transmission, where the EE is defined as the ratio of the achievable sum rate of the users to the total power consumption. Our goal is to maximize the EE subject to a minimum required data rate for each user, which leads to a non-convex fractional programming problem. To solve it, we first establish the feasible range of the transmitting power that is able to support each user's data rate requirement. Then, we propose an EE-optimal power allocation strategy that maximizes the EE. Our numerical results show that NOMA has superior EE performance in comparison with conventional orthogonal multiple access (OMA)

    Influence and Safety Evaluation of Underground Structure Construction on Adjacent Existing Subway Section

    Get PDF
    In recent years, with the rapid development of subway and underground comprehensive pipe corridor, the problem of close connection between underground structure and existing subway section structure is often encountered in engineering construction. During construction, the newly built underground structure will disturb the stratum, easily cause the additional displacement deformation and internal force change of the existing tunnel structure, and then lead to safety accidents. Therefore, it is particularly important to analyze the influence and safety evaluation of the new construction on the existing subway structure. This paper takes the construction of new underground power pipe gallery close to the existing subway section as an engineering case. The influence of adjacent construction on the existing structure is analyzed by three-dimensional finite element method, and then the safety of the existing structure is evaluated through deformation prediction, internal force analysis and bearing capacity checking calculation, and some construction safety protection suggestions are put forward. It has a certain reference for similar proximity projects
    • …
    corecore