Resource allocation for physical-layer security in OFDMA downlink with imperfect CSI

被引:1
作者
Yang, Wei [1 ]
Mao, Jing [1 ]
Chen, Chen [1 ]
Cheng, Xiang [1 ]
Yang, Liu-qing [2 ]
Xiang, Hai-ge [1 ]
机构
[1] Peking Univ, State Key Lab Adv Opt Commun Syst & Networks, Beijing 100871, Peoples R China
[2] Colorado State Univ, Dept Elect & Comp Engn, Ft Collins, CO 80523 USA
基金
中国国家自然科学基金;
关键词
Resource allocation; Orthogonal frequency-division multiple access (OFDMA); Imperfect channel state information (CSI); Physical layer security; MULTIUSER OFDM; SYSTEMS; CHANNELS; D2D;
D O I
10.1631/FITEE.1700026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the problem of resource allocation in a downlink orthogonal frequency-division multiple access (OFDMA) broadband network with an eavesdropper under the condition that both legitimate users and the eavesdropper are with imperfect channel state information (CSI). We consider three kinds of imperfect CSI: (1) noise and channel estimation errors, (2) feedback delay and channel prediction, and (3) limited feedback channel capacity, where quantized CSI is studied using rate-distortion theory because it can be used to establish an information-theoretic lower bound on the capacity of the feedback channel. The problem is formulated as joint power and subcarrier allocation to optimize the maximum-minimum (max-min) fairness criterion over the users' secrecy rate. The problem considered is a mixed integer nonlinear programming problem. To reduce the complexity, we propose a two-step suboptimal algorithm that separately performs power and subcarrier allocation. For a given subcarrier assignment, optimal power allocation is achieved by developing an algorithm of polynomial computational complexity. Numerical results show that our proposed algorithm can approximate the optimal solution.
引用
收藏
页码:398 / 408
页数:11
相关论文
共 30 条
[1]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[2]  
Boyd S, 2004, CONVEX OPTIMIZATION
[3]   Downlink Throughput Maximization for OFDMA Systems With Feedback Channel Capacity Constraints [J].
Chen, Chen ;
Bai, Lin ;
Wu, Bo ;
Choi, Jinho .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (01) :441-446
[4]   On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI [J].
Chen, Xiaoming ;
Chen, Jian ;
Zhang, Huazi ;
Zhang, Yu ;
Yuen, Chau .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) :8014-8024
[5]   D2D for Intelligent Transportation Systems: A Feasibility Study [J].
Cheng, Xiang ;
Yang, Liuqing ;
Shen, Xia .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (04) :1784-1793
[6]  
Cover TM., 1991, ELEMENTS INFORM THEO, DOI [DOI 10.1002/0471200611, 10.1002/0471200611]
[7]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[8]  
Gradshteyn I. S., 2014, Table of integrals, series, and products
[9]   Secure Transmission in Cooperative Relaying Networks With Multiple Antennas [J].
Huang, Yuzhen ;
Wang, Jinlong ;
Zhong, Caijun ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (10) :6843-6856
[10]   Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI [J].
Huang, Yuzhen ;
Al-Qahtani, Fawaz S. ;
Duong, Trung Q. ;
Wang, Jinlong .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (08) :2959-2971