Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI

被引:0
|
作者
Wei Yang
Jing Mao
Chen Chen
Xiang Cheng
Liu-qing Yang
Hai-ge Xiang
机构
[1] Peking University,State Key Laboratory of Advanced Optical Communication Systems and Networks
[2] Colorado State University,Department of Electrical & Computer Engineering
来源
Frontiers of Information Technology & Electronic Engineering | 2018年 / 19卷
关键词
Resource allocation; Orthogonal frequency-division multiple access (OFDMA); Imperfect channel state information (CSI); Physical layer security; TN92;
D O I
暂无
中图分类号
学科分类号
摘要
We investigate the problem of resource allocation in a downlink orthogonal frequency-division multiple access (OFDMA) broadband network with an eavesdropper under the condition that both legitimate users and the eavesdropper are with imperfect channel state information (CSI). We consider three kinds of imperfect CSI: (1) noise and channel estimation errors, (2) feedback delay and channel prediction, and (3) limited feedback channel capacity, where quantized CSI is studied using rate-distortion theory because it can be used to establish an informationtheoretic lower bound on the capacity of the feedback channel. The problem is formulated as joint power and subcarrier allocation to optimize the maximum-minimum (max-min) fairness criterion over the users’ secrecy rate. The problem considered is a mixed integer nonlinear programming problem. To reduce the complexity, we propose a two-step suboptimal algorithm that separately performs power and subcarrier allocation. For a given subcarrier assignment, optimal power allocation is achieved by developing an algorithm of polynomial computational complexity. Numerical results show that our proposed algorithm can approximate the optimal solution.
引用
收藏
页码:398 / 408
页数:10
相关论文
共 50 条
  • [1] Resource allocation for physical-layer security in OFDMA downlink with imperfect CSI
    Yang, Wei
    Mao, Jing
    Chen, Chen
    Cheng, Xiang
    Yang, Liu-qing
    Xiang, Hai-ge
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (03) : 398 - 408
  • [2] Resource Allocation for Semantic Communication under Physical-layer Security
    Li, Yang
    Zhou, Xinyu
    Zhao, Jun
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2063 - 2068
  • [3] Bispectral Resource Allocation With Imperfect CSI
    Zhao, Lei
    Zhang, Wenjie
    Jiang, Ming
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [4] Radio Resource Allocation for Physical-layer Security in OFDMA Based HetNets with Unknown Mode of Adversary
    Sheikhzadeh, Saeed
    Javan, Mohammad R.
    Mokari, Nader
    2017 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2017,
  • [5] Subcarrier Allocation for Physical-Layer Security in Cooperative OFDMA Networks
    Cai, Chunxiao
    Cai, Yueming
    Yang, Weiwei
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (12) : 3387 - 3390
  • [6] Physical Layer Security Enhancement for mmWave System with Multiple RISs and Imperfect CSI
    Tu, Qingqing
    Dong, Zheng
    Zou, Xianbing
    Wei, Ning
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2024, E107B (06) : 430 - 445
  • [7] Robust Resource Allocation for Vehicular Communications With Imperfect CSI
    Wu, Weihua
    Liu, Runzi
    Yang, Qinghai
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (09) : 5883 - 5897
  • [8] Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper
    GONG Shiqi
    XING Chengwen
    FEI Zesong
    KUANG Jingming
    中国通信, 2016, 13 (03) : 82 - 95
  • [9] Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper
    Gong Shiqi
    Xing Chengwen
    Fei Zesong
    Kuang Jingming
    CHINA COMMUNICATIONS, 2016, 13 (03) : 82 - 95
  • [10] Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks
    Wang, Xiaowei
    Tao, Meixia
    Mo, Jianhua
    Xu, Youyun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 693 - 702