3,020 research outputs found
Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers
In this correspondence, we study the secure multiantenna transmission with
artificial noise (AN) under imperfect channel state information in the presence
of spatially randomly distributed eavesdroppers. We derive the optimal
solutions of the power allocation between the information signal and the AN for
minimizing the secrecy outage probability (SOP) under a target secrecy rate and
for maximizing the secrecy rate under a SOP constraint, respectively. Moreover,
we provide an interesting insight that channel estimation error affects the
optimal power allocation strategy in opposite ways for the above two
objectives. When the estimation error increases, more power should be allocated
to the information signal if we aim to decrease the rate-constrained SOP,
whereas more power should be allocated to the AN if we aim to increase the
SOP-constrained secrecy rate.Comment: 7 pages, 6 figure
Improved Direct Counterfactual Quantum Communication
Recently, a novel direct counterfactual quantum communication protocol was
proposed using chained quantum Zeno effect. We found that this protocol is far
from being widely used in practical channels, due to the side effect of
'chained', which leads to a dramatic increase of the equivalent optical
distance between Alice and Bob. Therefore, not only the transmission time of a
single bit increases in multiple times, but also the protocol is more sensitive
to the noise. Here, we proposed an improved protocol, in which quantum
interference is employed to destroy the nested structure induced by 'chained'
effect. Moreover, we proved that a better counterfactuality is easier to be
achieved, and showed that our protocol outperforms the former in the presence
of noises.Comment: 6 pages, 4 figure
Improving Anti-Eavesdropping Ability without Eavesdropper's CSI: A Practical Secure Transmission Design Perspective
This letter studies the practical design of secure transmissions without
knowing eavesdropper's channel state information (ECSI). An ECSI-irrelevant
metric is introduced to quantize the intrinsic anti-eavesdropping ability (AEA)
that the transmitter has on confronting the eavesdropper via secrecy encoding
together with artificial-noise-aided signaling. Non-adaptive and adaptive
transmission schemes are proposed to maximize the AEA with the optimal encoding
rates and power allocation presented in closed-form expressions. Analyses and
numerical results show that maximizing the AEA is equivalent to minimizing the
secrecy outage probability (SOP) for the worst case by ignoring eavesdropper's
receiver noise. Therefore, the AEA is a useful alternative to the SOP for
assessing and designing secure transmissions when the ECSI cannot be prior
known.Comment: 4 pages, 2 figures, to be published on IEEE Wireless Communications
Letters (WCL
Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization
Wireless caching has been widely recognized as a promising technique for
efficient content delivery. In this paper, by taking different file secrecy
levels into consideration, physical-layer security oriented content placement
is optimized in a stochastic cache-enabled cellular network. We propose an
analytical framework to investigate the nontrivial file delivery-secrecy
tradeoff. Specifically, we first derive the closed-form expressions for the
file hit and secrecy probabilities. The global optimal probabilistic content
placement policy is then analytically derived in terms of hit probability
maximization under file secrecy constraints. Numerical results are demonstrated
to verify our analytical findings and show that the targeted file secrecy
levels are crucial in balancing the file delivery-secrecy tradeoff.Comment: 5 pages, 4 figures, accepted to be published in IEEE Transactions on
Vehicular Technolog
Secure and Energy-Efficient Transmissions in Cache-Enabled Heterogeneous Cellular Networks: Performance Analysis and Optimization
This paper studies physical-layer security for a cache-enabled heterogeneous
cellular network comprised of a macro base station and multiple small base
stations (SBSs). We investigate a joint design on caching placement and file
delivery for realizing secure and energy-efficient transmissions against
randomly distributed eavesdroppers. We propose a novel hybrid "most popular
content" and "largest content diversity" caching placement policy to distribute
files of different popularities. Depending on the availability and placement of
the requested file, we employ three cooperative transmission schemes, namely,
distributed beamforming, frequency-domain orthogonal transmission, and best SBS
relaying, respectively. We derive analytical expressions for the connection
outage probability and secrecy outage probability for each transmission scheme.
Afterwards, we design the optimal transmission rates and caching allocation
successively to achieve a maximal overall secrecy throughput and secrecy energy
efficiency, respectively. Numerical results verify the theoretical analyses and
demonstrate the superiority of the proposed hybrid caching policy.Comment: 13 pages in double-column, 9 figures, accepted for publication on
IEEE Transactions on Communication
Analytic calculation of Energy-Energy Correlation in annihilation at NLO
We present the first fully analytic calculation of the Quantum Chromodynamics
(QCD) event shape observable Energy-Energy Correlation in electron-positron
annihilation at Next-To-Leading Order (NLO). This result sheds light on the
analytic structure of the event shape observables beyond Leading Order (LO) and
serves as a motivation to employ our methods in the investigation of other
event shape observables that so far have not been calculated analytically.Comment: 10 pages, 1 figure. Contribution to the proceedings of Loops and Legs
2018, C18-04-29.
The Energy-Energy Correlation at Next-to-Leading Order in QCD, Analytically
The energy-energy correlation (EEC) between two detectors in
annihilation was computed analytically at leading order in QCD almost 40 years
ago, and numerically at next-to-leading order (NLO) starting in the 1980s. We
present the first analytical result for the EEC at NLO, which is remarkably
simple, and facilitates analytical study of the perturbative structure of the
EEC. We provide the expansion of EEC in the collinear and back-to-back regions
through to next-to-leading power, information which should aid resummation in
these regions.Comment: 6 pages, 1 figure, plus 6 pages and 4 figures; v2: uploaded the
ancillary file EEC_NLO_supplemental.
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
Device-to-device (D2D) communication raises new transmission secrecy
protection challenges, since conventional physical layer security approaches,
such as multiple antennas and cooperation techniques, are invalid due to its
resource/size constraints. The full-duplex (FD) jamming receiver, which
radiates jamming signals to confuse eavesdroppers when receiving the desired
signal simultaneously, is a promising candidate. Unlike existing endeavors that
assume the FD jamming receiver always improves the secrecy performance compared
with the half-duplex (HD) receiver, we show that this assumption highly depends
on the instantaneous residual self-interference cancellation level and may be
invalid. We propose an adaptive jamming receiver operating in a switched FD/HD
mode for a D2D link in random networks. Subject to the secrecy outage
probability constraint, we optimize the transceiver parameters, such as
signal/jamming powers, secrecy rates and mode switch criteria, to maximize the
secrecy throughput. Most of the optimization operations are taken off-line and
only very limited on-line calculations are required to make the scheme with low
complexity. Furthermore, some interesting insights are provided, such as the
secrecy throughput is a quasi-concave function. Numerical results are
demonstrated to verify our theoretical findings, and to show its superiority
compared with the receiver operating in the FD or HD mode only
Energy-Efficient Transmission Design in Non-Orthogonal Multiple Access
Non-orthogonal multiple access (NOMA) is considered as a promising technology
for improving the spectral efficiency (SE) in 5G. In this correspondence, we
study the benefit of NOMA in enhancing energy efficiency (EE) for a multi-user
downlink transmission, where the EE is defined as the ratio of the achievable
sum rate of the users to the total power consumption. Our goal is to maximize
the EE subject to a minimum required data rate for each user, which leads to a
non-convex fractional programming problem. To solve it, we first establish the
feasible range of the transmitting power that is able to support each user's
data rate requirement. Then, we propose an EE-optimal power allocation strategy
that maximizes the EE. Our numerical results show that NOMA has superior EE
performance in comparison with conventional orthogonal multiple access (OMA)
Evolution of individual quantum Hall edge states in the presence of disorder
Employing the Bloch eigenmode matching approach, we numerically study the
evolution of individual quantum Hall edge states with respect to disorder. As
shown by the two-parameter renormalization group flow of the Hall and Thouless
conductances, quantum Hall edge states with high Chern number n are completely
different from that of n=1 case. Two categories of individual edge modes are
evaluated in a quantum Hall system with high Chern number. Edge states from the
lowest Landau level have similar eigenfunctions which are well localized at the
system edge and independent of the Fermi energy. On the other hand, at fixed
Fermi energy, the edge state from higher Landau levels has larger expansion,
which leads to less stable quantum Hall states at high Fermi energies. By
presenting the local current density distribution, the influence of disorder on
eigenmode-resolved edge states is vividly demonstrated.Comment: Front. Phys. 13, 13730
- …