Artificial-Noise Aided Transmit Design for Outage Constrained Service Integration

被引:0
作者
Mei, Weidong [1 ]
Li, Lingxiang [1 ]
Chen, Zhi [1 ]
Huang, Chuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2016年
关键词
Service integration; Artificial noise; Broadcast channel; Outage secrecy rate; Convex restriction approach; BROADCAST CHANNELS; WIRELESS NETWORKS; OPTIMIZATION; COMMON;
D O I
10.1109/ICC.2016.7511401
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers an artificial noise (AN)-aided transmit design for multi-user MISO systems in the eyes of service integration. Specifically, we combine two sorts of services, and serve them simultaneously: one multicast message intended for all receivers and one confidential message intended for only one authorized receiver. The confidential message is kept perfectly secure from all the unauthorized receivers. Assuming imperfect channel state information (CSI) of unauthorized receivers at the transmitter, our goal is to jointly design the input covariances of the multicast message, confidential message and AN such that the outage secrecy rate is maximized for a given outage probability, while keeping the outage probability of multicast message for each user below a certain threshold. Due to the intrinsical complexity of this problem, a safe and convex albeit suboptimal reformulation, based on two advanced convex restriction approaches, is applied to generate a tractable approximation for this problem. By this means, a computationally efficient lower bound on the outage secrecy rate can be determined. We also prove the feasibility of beamforming to achieve the obtained secrecy rate. Numerical results are presented to verify the efficacy of our proposed method.
引用
收藏
页数:7
相关论文
共 19 条
[1]  
[Anonymous], 1999, Athena scientific Belmont
[2]  
[Anonymous], 2013, Wireless physical layer security with Imperfect Channel state information: a survey. CoRR
[3]  
[Anonymous], 2009, CONVEX OPTIMIZATION
[4]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[5]   Complex-valued matrix differentiation: Techniques and key results [J].
Hjorungnes, Are ;
Gesbert, David .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (06) :2740-2746
[6]  
Hong YWP, 2014, SPRBRIEF ELECT, P1, DOI 10.1007/978-981-4560-14-6
[7]   Optimal and Successive Approaches to Signal Design for Multiple Antenna Physical Layer Multicasting [J].
Kim, Il Han ;
Love, David J. ;
Park, Seung Young .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (08) :2316-2327
[8]   Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization [J].
Li, Qiang ;
Ma, Wing-Kin .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2704-2717
[9]   Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages [J].
Ly, Hung D. ;
Liu, Tie ;
Liang, Yingbin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) :5477-5487
[10]   Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [J].
Ma, Shuai ;
Hong, Mingyi ;
Song, Enbin ;
Wang, Xiangfeng ;
Sun, Dechun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) :5558-5570