Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers

被引:17
作者
Abbas, Mohammed Adil [1 ]
Song, Hojin [2 ]
Hong, Jun-Pyo [3 ]
机构
[1] Univ Baghdad, Dev & Continuing Educ Ctr, Baghdad 17635, Iraq
[2] Agcy Def Dev, Daejeon 34186, South Korea
[3] Pukyong Natl Univ, Dept Informat & Commun Engn, Busan 608737, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; secrecy rate; potential eavesdropper; downlink; opportunistic user scheduling; artificial noise transmission; power allocation; PHYSICAL LAYER SECURITY; OPTIMAL POWER ALLOCATION; MIMO WIRETAP CHANNELS; LARGE SYSTEM-ANALYSIS; ARTIFICIAL-NOISE; BROADCAST CHANNELS; CONFIDENTIAL MESSAGES; WIRELESS NETWORKS; SUM-RATE; TRANSMISSION;
D O I
10.1109/TIFS.2018.2868494
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider user scheduling and power allocation techniques for downlinks where transmitted message must be kept confidential from all other unintended users and the number of users is larger than that of access point (AP) antennas. In order to maximize network secrecy rate with a limited number of antennas, the AP schedules a user who can achieve the largest secrecy rate and exploits multiple antennas for transmitting artificial noise to the unintended users. We derive the closed-form expressions of the optimal power allocation for the artificial noise and the average network secrecy rate through asymptotic analysis. The analysis results provide the insightful information on the behaviors of the user scheduling and the effect of system parameters on the network secrecy rate performance. It is shown that opportunistic scheduling with artificial noise transmission technique is more effective than the conventional precoding techniques for multiple confidential message transmissions in terms of network secrecy rate. Furthermore, we have also discussed a transmission strategy for the worst case scenarios where all unintended users are treated as colluding eavesdroppers. The simulations confirm the validity of the analysis results and provide additional information on the network performance in general cases.
引用
收藏
页码:969 / 980
页数:12
相关论文
共 43 条
[31]   Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels [J].
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :1134-1141
[32]   Weighted Sum Rate Maximization of MIMO Broadcast and Interference Channels With Confidential Messages [J].
Park, Daeyoung .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (03) :1742-1753
[33]   On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling [J].
Pei, Minyan ;
Swindlehurst, A. Lee ;
Ma, Dongtang ;
Wei, Jibo .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (01) :50-53
[34]   Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security [J].
Romero-Zurita, Nabil ;
Ghogho, Mounir ;
McLernon, Des .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (02) :71-74
[35]   On the capacity of MIMO broadcast channels with partial side information [J].
Sharif, M ;
Hassibi, B .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (02) :506-522
[36]  
Viswanath P, 2002, IEEE T INFORM THEORY, V48, P1277, DOI 10.1109/TIT.2002.1003822
[37]   Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks [J].
Yang, Maoqiang ;
Guo, Daoxing ;
Huang, Yuzhen ;
Duong, Trung Q. ;
Zhang, Bangning .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (12) :5189-5202
[38]   Safeguarding 5G Wireless Communication Networks Using Physical Layer Security [J].
Yang, Nan ;
Wang, Lifeng ;
Geraci, Giovanni ;
Elkashlan, Maged ;
Yuan, Jinhong ;
Di Renzo, Marco .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :20-27
[39]   Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels [J].
Zhang, Jun ;
Yuen, Chau ;
Wen, Chao-Kai ;
Jin, Shi ;
Wong, Kai-Kit ;
Zhu, Hongbo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :74-85
[40]   Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis [J].
Zhang, Jun ;
Yuen, Chau ;
Wen, Chao-Kai ;
Jin, Shi ;
Gao, Xiqi .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (09) :1627-1630