Abstract-We consider secure resource allocations for orthogonal frequency division multiple access two-way relay wireless sensor networks. The joint problem of subcarrier assignment, subcarrier pairing and power allocations is formulated under scenarios of using and not using cooperative jamming to maximize the secrecy sum rate subject to limited power budget at the relay station and orthogonal subcarrier allocation policies. The optimization problems are shown to be mixed integer programming and non-convex. For the scenario without cooperative jamming, we propose an asymptotically optimal algorithm based on the dual decomposition method, and a suboptimal algorithm with lower complexity. For the scenario with cooperative jamming, the resulting optimization problem is non-convex, and we propose a heuristic algorithm based on alternating optimization. Finally, the proposed schemes are evaluated by simulations and compared to the existing schemes.
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multi-antenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network. First, we formulate the power minimization problem based on the assumption that the legitimate transmitter has perfect channel state information (CSI) of the legitimate user and the eavesdroppers, where this problem can be reformulated into a second-order cone program (SOCP). In addition, we provide a closed-form solution of transmit beamforming for the scenario of an eavesdropper. Next, we consider robust secrecy rate optimization problems by incorporating two probabilistic channel uncertainties with CSI feedback. By exploiting the Bernstein-type inequality and S-Procedure to convert the probabilistic secrecy rate constraint into the determined constraint, we formulate this secrecy rate optimization problem into a convex optimization framework. Furthermore, we provide analyses to show the optimal transmit covariance matrix is rank-one for the proposed schemes. Numerical results are provided to validate the performance of these two conservative approximation methods, where it is shown that the Bernstein-type inequality based approach outperforms the S-Procedure approach in terms of the achievable secrecy rates.
Non-orthogonal multiple access (NOMA) is potentially capable of circumventing the limitations of the classic the orthogonal multiple access schemes, hence it has recently received significant research attention both in industry and academia. This article is focused on exploiting multiple antenna techniques in NOMA networks, with an emphasis on investigating the rate region of multiple-input multiple-output (MIMO)-NOMA, whist reviewing two popular multiple antennas aided NOMA structures, as well as underlining resource management problems of both single-carrier and multi-carrier MIMO-NOMA networks. This article also points out several effective methods of tackling the practical implementation constraints of multiple antenna NOMA networks. Finally, some promising open research directions are provided in context of multiple antenna aided NOMA.
With the proliferation of computation-extensive and latency-critical applications in the 5G and beyond networks, mobile-edge computing (MEC) or fog computing, which provides cloud-like computation and/or storage capabilities at the network edge, is envisioned to reduce computation latency as well as to conserve energy for wireless devices (WDs). This paper studies a novel device-to-device (D2D)-enabled multi-helper MEC system, in which a local user solicits its nearby WDs serving as helpers for cooperative computation. We assume a time division multiple access (TDMA) transmission protocol, under which the local user offloads the tasks to multiple helpers and downloads the results from them over orthogonal pre-scheduled time slots. Under this setup, we minimize the computation latency by optimizing the local user's task assignment jointly with the time and rate for task offloading and results downloading, as well as the computation frequency for task execution, subject to individual energy and computation capacity constraints at the local user and the helpers. However, the formulated problem is a mixed-integer nonlinear program (MINLP) that is difficult to solve. To tackle this challenge, we propose an efficient algorithm by first relaxing the original problem into a convex one, and then constructing a suboptimal task assignment solution based on the obtained optimal one. Next, we consider a benchmark scheme that endows the WDs with their maximum computation capacities. To further reduce the implementation complexity, we also develop a heuristic scheme based on the greedy task assignment. Finally, numerical results validate the effectiveness of our proposed algorithm, as compared against the heuristic scheme and other benchmark ones without either joint optimization of radio and computation resources or task assignment design.
Abstract-Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are presumed to harvest energy only from the received signals. To tackle this problem, we propose in this paper an artificial noise (AN) aided transmission scheme to facilitate the secrecy information transmission to IRs and yet meet the energy harvesting requirement for ERs, under the assumption that the AN can be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts, to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified threenode wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission, or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints at the transmitter as well as an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be non-convex, for each of which we propose the optimal solution based on the dual decomposition as well as suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison where the AN is not used at the transmitter and the AN is used but cannot be cancelled by the IR, respectively. Finally, the performances of proposed schemes are evaluated by simulations in terms of various trade-offs for wireless (secrecy) information versus energy transmissions.Index Terms-Simultaneous wireless information and power transfer (SWIPT), physical-layer security, energy harvesting, power control, artificial noise, fading channel, outage probability, ergodic capacity, alternating optimization.
Abstract-Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped by the energy receivers (ERs), which are presumed to harvest energy only from the received signals. To tackle this problem, we propose in this paper an artificial noise (AN) aided transmission scheme to facilitate the secrecy information transmission to IRs and yet meet the energy harvesting requirement for ERs, under the assumption that the AN can be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts, to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified threenode wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission, or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints at the transmitter as well as an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be non-convex, for each of which we propose the optimal solution based on the dual decomposition as well as suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison where the AN is not used at the transmitter and the AN is used but cannot be cancelled by the IR, respectively. Finally, the performances of proposed schemes are evaluated by simulations in terms of various trade-offs for wireless (secrecy) information versus energy transmissions.Index Terms-Simultaneous wireless information and power transfer (SWIPT), physical-layer security, energy harvesting, power control, artificial noise, fading channel, outage probability, ergodic capacity, alternating optimization.
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined. K. Cumanan is with the
This paper studies secrecy transmission with the aid of a group of wireless energy harvesting (WEH)-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. The source node in the network does simultaneous wireless information and power transfer (SWIPT) with each relay employing a power splitting (PS) receiver in the first phase; each relay further divides its harvested power for forwarding the received signal and generating artificial noise (AN) for jamming the eavesdroppers in the second transmission phase. In the centralized case with global channel state information (CSI), we provide closed-form expressions for the optimal and/or suboptimal AF-relay beamforming vectors to maximize the achievable secrecy rate subject to individual power constraints of the relays, using the technique of semidefinite relaxation (SDR), which is proved to be tight. A fully distributed algorithm utilizing only local CSI at each relay is also proposed as a performance benchmark. Simulation results validate the effectiveness of the proposed multi-AF relaying with CJ over other suboptimal designs.On the other hand, privacy and authentication have increasingly become major concerns for wireless communications and physical (PHY)-layer security has emerged as a new layer of defence to realize perfect secrecy transmission in addition to the costly upper-layer techniques such as cryptography. In this regard, relay-assisted secure transmission was proposed [5,6] and PHY-layer security enhancements by means of cooperative communications have since attracted much attention [7][8][9][10][11][12][13][14][15][16][17][18][19][20].In particular, cooperative schemes can be mainly classified into three categories: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ) [7] with CJ being most relevant to PHY-layer security.Specifically, coordinated CJ refers to the scheme of generating a common jamming signal across all single-antenna relay helpers against eavesdropping [7,10,12,13], while uncoordinated CJ considers that each relay helper emits independent artificial noise (AN) to confound the eavesdroppers [15,16]. It is expected that in the scenarios where the direct link is broken between the transmitter (Tx) and the legitimate receiver (Rx), some of the relays have to take on their conventional role of forwarding the information while others will perform CJ [17,18]. A recent paradigm that generalizes all the above-mentioned cooperation strategies is cooperative beamforming (CB) mixed with CJ [19,20], where the available power at each relay is split into two parts: one for forwarding the confidential message and the other for CJ.However, mixed CB-CJ approaches may be prohibitive in applications with low power devices because idle relays with limited battery supplies would likely prefer saving power for their own traffic to assisting others' communication. In light of this, SWIPT provides the incentive for potential helpers to perform dedicated CB mixed with CJ at no expense of its own power,...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citationsācitations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright Ā© 2024 scite LLC. All rights reserved.
Made with š for researchers
Part of the Research Solutions Family.