3,020 research outputs found

    Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers

    Full text link
    In this correspondence, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under a target secrecy rate and for maximizing the secrecy rate under a SOP constraint, respectively. Moreover, we provide an interesting insight that channel estimation error affects the optimal power allocation strategy in opposite ways for the above two objectives. When the estimation error increases, more power should be allocated to the information signal if we aim to decrease the rate-constrained SOP, whereas more power should be allocated to the AN if we aim to increase the SOP-constrained secrecy rate.Comment: 7 pages, 6 figure

    Improved Direct Counterfactual Quantum Communication

    Full text link
    Recently, a novel direct counterfactual quantum communication protocol was proposed using chained quantum Zeno effect. We found that this protocol is far from being widely used in practical channels, due to the side effect of 'chained', which leads to a dramatic increase of the equivalent optical distance between Alice and Bob. Therefore, not only the transmission time of a single bit increases in multiple times, but also the protocol is more sensitive to the noise. Here, we proposed an improved protocol, in which quantum interference is employed to destroy the nested structure induced by 'chained' effect. Moreover, we proved that a better counterfactuality is easier to be achieved, and showed that our protocol outperforms the former in the presence of noises.Comment: 6 pages, 4 figure

    Improving Anti-Eavesdropping Ability without Eavesdropper's CSI: A Practical Secure Transmission Design Perspective

    Full text link
    This letter studies the practical design of secure transmissions without knowing eavesdropper's channel state information (ECSI). An ECSI-irrelevant metric is introduced to quantize the intrinsic anti-eavesdropping ability (AEA) that the transmitter has on confronting the eavesdropper via secrecy encoding together with artificial-noise-aided signaling. Non-adaptive and adaptive transmission schemes are proposed to maximize the AEA with the optimal encoding rates and power allocation presented in closed-form expressions. Analyses and numerical results show that maximizing the AEA is equivalent to minimizing the secrecy outage probability (SOP) for the worst case by ignoring eavesdropper's receiver noise. Therefore, the AEA is a useful alternative to the SOP for assessing and designing secure transmissions when the ECSI cannot be prior known.Comment: 4 pages, 2 figures, to be published on IEEE Wireless Communications Letters (WCL

    Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization

    Full text link
    Wireless caching has been widely recognized as a promising technique for efficient content delivery. In this paper, by taking different file secrecy levels into consideration, physical-layer security oriented content placement is optimized in a stochastic cache-enabled cellular network. We propose an analytical framework to investigate the nontrivial file delivery-secrecy tradeoff. Specifically, we first derive the closed-form expressions for the file hit and secrecy probabilities. The global optimal probabilistic content placement policy is then analytically derived in terms of hit probability maximization under file secrecy constraints. Numerical results are demonstrated to verify our analytical findings and show that the targeted file secrecy levels are crucial in balancing the file delivery-secrecy tradeoff.Comment: 5 pages, 4 figures, accepted to be published in IEEE Transactions on Vehicular Technolog

    Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization

    Full text link
    This paper studies physical-layer security for a cache-enabled heterogeneous cellular network comprised of a macro base station and multiple small base stations (SBSs). We investigate a joint design on caching placement and file delivery for realizing secure and energy-efficient transmissions against randomly distributed eavesdroppers. We propose a novel hybrid "most popular content" and "largest content diversity" caching placement policy to distribute files of different popularities. Depending on the availability and placement of the requested file, we employ three cooperative transmission schemes, namely, distributed beamforming, frequency-domain orthogonal transmission, and best SBS relaying, respectively. We derive analytical expressions for the connection outage probability and secrecy outage probability for each transmission scheme. Afterwards, we design the optimal transmission rates and caching allocation successively to achieve a maximal overall secrecy throughput and secrecy energy efficiency, respectively. Numerical results verify the theoretical analyses and demonstrate the superiority of the proposed hybrid caching policy.Comment: 13 pages in double-column, 9 figures, accepted for publication on IEEE Transactions on Communication

    Analytic calculation of Energy-Energy Correlation in e+e−e^+ e^- annihilation at NLO

    Full text link
    We present the first fully analytic calculation of the Quantum Chromodynamics (QCD) event shape observable Energy-Energy Correlation in electron-positron annihilation at Next-To-Leading Order (NLO). This result sheds light on the analytic structure of the event shape observables beyond Leading Order (LO) and serves as a motivation to employ our methods in the investigation of other event shape observables that so far have not been calculated analytically.Comment: 10 pages, 1 figure. Contribution to the proceedings of Loops and Legs 2018, C18-04-29.

    The Energy-Energy Correlation at Next-to-Leading Order in QCD, Analytically

    Full text link
    The energy-energy correlation (EEC) between two detectors in e+e−e^+e^- annihilation was computed analytically at leading order in QCD almost 40 years ago, and numerically at next-to-leading order (NLO) starting in the 1980s. We present the first analytical result for the EEC at NLO, which is remarkably simple, and facilitates analytical study of the perturbative structure of the EEC. We provide the expansion of EEC in the collinear and back-to-back regions through to next-to-leading power, information which should aid resummation in these regions.Comment: 6 pages, 1 figure, plus 6 pages and 4 figures; v2: uploaded the ancillary file EEC_NLO_supplemental.

    Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks

    Full text link
    Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only

    Energy-Efficient Transmission Design in Non-Orthogonal Multiple Access

    Full text link
    Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency (SE) in 5G. In this correspondence, we study the benefit of NOMA in enhancing energy efficiency (EE) for a multi-user downlink transmission, where the EE is defined as the ratio of the achievable sum rate of the users to the total power consumption. Our goal is to maximize the EE subject to a minimum required data rate for each user, which leads to a non-convex fractional programming problem. To solve it, we first establish the feasible range of the transmitting power that is able to support each user's data rate requirement. Then, we propose an EE-optimal power allocation strategy that maximizes the EE. Our numerical results show that NOMA has superior EE performance in comparison with conventional orthogonal multiple access (OMA)

    Evolution of individual quantum Hall edge states in the presence of disorder

    Full text link
    Employing the Bloch eigenmode matching approach, we numerically study the evolution of individual quantum Hall edge states with respect to disorder. As shown by the two-parameter renormalization group flow of the Hall and Thouless conductances, quantum Hall edge states with high Chern number n are completely different from that of n=1 case. Two categories of individual edge modes are evaluated in a quantum Hall system with high Chern number. Edge states from the lowest Landau level have similar eigenfunctions which are well localized at the system edge and independent of the Fermi energy. On the other hand, at fixed Fermi energy, the edge state from higher Landau levels has larger expansion, which leads to less stable quantum Hall states at high Fermi energies. By presenting the local current density distribution, the influence of disorder on eigenmode-resolved edge states is vividly demonstrated.Comment: Front. Phys. 13, 13730
    • …
    corecore