2012 IEEE International Symposium on Information Theory Proceedings 2012
DOI: 10.1109/isit.2012.6283032
|View full text |Cite
|
Sign up to set email alerts
|

Wireless network control with privacy using hybrid ARQ

Abstract: We consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. We develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. We provide a scheme that combines power control, flow control, and scheduling in order to maximize a global utility function, subject to the stability of the data queues, an average power constraint, and a constr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…On the other hand, the studied model is also applicable to a network in which the eavesdroppers are not malicious nodes, but rather are legitimate participants in the network. In such a case, the proposed model applies to situations in which some messages are not intended for all nodes of the network such as when some content is "premium" content and should be received only by those who have paid for it (legitimate receivers) while others (eavesdroppers) should be denied access (e.g., as in [9]). This is also applicable to cognitive networks in which the primary users might have some messages that they wish to secure against known secondary users [23].…”
Section: B Secure Transmission Schemementioning
confidence: 99%
“…On the other hand, the studied model is also applicable to a network in which the eavesdroppers are not malicious nodes, but rather are legitimate participants in the network. In such a case, the proposed model applies to situations in which some messages are not intended for all nodes of the network such as when some content is "premium" content and should be received only by those who have paid for it (legitimate receivers) while others (eavesdroppers) should be denied access (e.g., as in [9]). This is also applicable to cognitive networks in which the primary users might have some messages that they wish to secure against known secondary users [23].…”
Section: B Secure Transmission Schemementioning
confidence: 99%
“…The overhead due to acquiring CSI increases with increasing number of users in the network. To avoid this overhead, in [23], we developed a solution, based on HARQ transmission with incremental redundancy. The solution scheme utilized an upper bound of the secrecy outage probability obtained by using Markov inequality, so that the amount of information leakage to the other nodes can be quantified independently over each time slot.…”
Section: Introductionmentioning
confidence: 99%
“…Hence some performance is sacrificed. To that end, in this paper, we investigate the cross-layer resource allocation problem with confidentiality under a more realistic and practical network model as in [23], where both the users and the base station are oblivious to the instantaneous channel state information, and we obtain an optimal dynamic control algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…For encoding, a wiretap code with incremental redundancy is employed, obtaining an incremental redundancy HARQ (IR-HARQ) scheme, and an outage formulation is considered. The approach of [7] is then extended in [8] to a multiuser uplink scenario, with each user aiming at transmitting a combination of public and confidential messages to a single base station, with the other users acting potentially as eavesdroppers. A suboptimal strategy of power allocation and scheduling to maximize the overall network utility is then derived.…”
Section: Introductionmentioning
confidence: 99%