Pilot and Data Power Allocation in Poisson Interference Field With Protected Zone for Physical-Layer Security

被引:3
作者
Ahn, Sungjun [1 ]
Park, Sung-Ik [1 ]
Kang, Joonhyuk [2 ]
Jeong, Seongah [3 ]
机构
[1] Elect & Telecommun Res Inst, Media Res Div, Daejeon 305700, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Elect Engn, Daejeon 305702, South Korea
[3] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
关键词
Security; Interference; Channel estimation; Resource management; Fading channels; Payloads; Receivers; Physical-layer security; stochastic geometry; protected zone; pilot-data power allocation; NETWORKS;
D O I
10.1109/LWC.2020.3027838
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical-layer security has become widely recognized as a promising technique to enhance wireless security by exploiting the characteristics including fading, noise, and interference. This letter explores an opportunity to enhance physical-layer security by balancing the power expense between pilot and payload signals without any prior knowledge related to eavesdroppers. In lieu of presuming perfect channel acquisition, we consider a practical wiretap channel with the receivers enabled by pilot-aided channel estimation (CE). The problem is tackled by accounting for the network interference from cochannel interferers in unknown locations by which the secrecy level is significantly affected. Specifically, the secrecy transmission rate (STR) reflecting the CE errors is derived for the worst-case within the use of a protected zone. We investigate the feasible region of pilot and data power allocation under reliability and secrecy constraints, and the optimal power allocation for pilot and data to maximize the STR is proposed, whose performance is verified via simulations.
引用
收藏
页码:271 / 275
页数:5
相关论文
共 17 条
[1]  
Ahn S, 2017, CONSUM COMM NETWORK, P986, DOI 10.1109/CCNC.2017.7983267
[2]  
[Anonymous], 2011, IEEE ICC
[3]  
Antoniou A., 2007, Practical Optimization - Algorithms and engineering applications
[4]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628
[5]   What should 6G be? [J].
Dang, Shuping ;
Amin, Osama ;
Shihada, Basem ;
Alouini, Mohamed-Slim .
NATURE ELECTRONICS, 2020, 3 (01) :20-29
[6]   On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes [J].
El Shafie, Ahmed ;
Al-Dhahir, Naofal ;
Ding, Zhiguo ;
Hamila, Ridha .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (08) :3948-3960
[7]   A tutorial on MM algorithms [J].
Hunter, DR ;
Lange, K .
AMERICAN STATISTICIAN, 2004, 58 (01) :30-37
[8]   Secure Communication in Stochastic Wireless Networks-Part I: Connectivity [J].
Pinto, Pedro C. ;
Barros, Joao ;
Win, Moe Z. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :125-138
[9]  
Press W, 2007, Numerical recipes: The art of scientific computing
[10]   A MATHEMATICAL THEORY OF COMMUNICATION [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (04) :623-656