Power Allocation for Energy Efficiency and Secrecy of Wireless Interference Networks

被引:68
作者
Sheng, Zhichao [1 ]
Tuan, Hoang Duong [1 ]
Nasir, Ali Arshad [2 ]
Duong, Trung Q. [3 ]
Poor, H. Vincent [4 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Ultimo, NSW 2007, Australia
[2] King Fahd Univ Petr & Minerals, Dept Elect Engn, Dhahran 31261, Saudi Arabia
[3] Queens Univ Belfast, Belfast BT7 1NN, Antrim, North Ireland
[4] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会; 澳大利亚研究理事会;
关键词
Interference network; secure communication; energy-efficient communication; power allocation; path-following algorithms; PHYSICAL LAYER SECURITY; INFORMATION; CHANNELS;
D O I
10.1109/TWC.2018.2815626
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of achieved secrecy throughput per Joule under link security requirements. Three scenarios for the access of channel state information are considered: the perfect channel state information; partial channel state information with channels from the transmitters to the eavesdropper exponentially distributed; and not perfectly known channels between the transmitters and the users with exponentially distributed errors. The paper develops various path-following procedures of low complexity and rapid convergence for the optimal power allocation. Their effectiveness and viability are illustrated through numerical examples. The power allocation schemes are shown to achieve both high secrecy throughput and energy efficiency.
引用
收藏
页码:3737 / 3751
页数:15
相关论文
共 34 条
[1]   Cooperative Security at the Physical Layer [A summary of recent advances] [J].
Bassily, Raef ;
Ekrem, Ersen ;
He, Xiang ;
Tekin, Ender ;
Xie, Jianwei ;
Bloch, Matthieu R. ;
Ulukus, Sennur ;
Yener, Aylin .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) :16-28
[2]  
Chen Y., 2016, P IEEE GLOB WORKSH W, P1
[3]   On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers [J].
Chorti, Arsenia ;
Perlaza, Samir M. ;
Han, Zhu ;
Poor, H. Vincent .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1850-1863
[4]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[5]  
Farhat Jamil, 2015, 2015 International Symposium on Wireless Communication Systems (ISWCS). Proceedings, P701, DOI 10.1109/ISWCS.2015.7454439
[6]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445
[7]   Outage-Efficient Strategies for Multiuser MIMO Networks With Channel Distribution Information [J].
Ghosh, Sagnik ;
Rao, Bhaskar D. ;
Zeidler, James R. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (12) :6312-6324
[8]   Joint Load Balancing and Interference Management for Small-Cell Heterogeneous Networks With Limited Backhaul Capacity [J].
Ho Huu Minh Tam ;
Hoang Duong Tuan ;
Duy Trong Ngo ;
Duong, Trung Q. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (02) :872-884
[9]   Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems [J].
Hoang, Tiep M. ;
Duong, Trung Q. ;
Suraweera, Himal A. ;
Tellambura, Chintha ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (12) :5039-5051
[10]   Optimal power control in interference-limited fading wireless channels with outage-probability specifications [J].
Kandukuri, S ;
Boyd, S .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (01) :46-55