Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI

被引:0
作者
Wei Yang
Jing Mao
Chen Chen
Xiang Cheng
Liu-qing Yang
Hai-ge Xiang
机构
[1] Peking University,State Key Laboratory of Advanced Optical Communication Systems and Networks
[2] Colorado State University,Department of Electrical & Computer Engineering
来源
Frontiers of Information Technology & Electronic Engineering | 2018年 / 19卷
关键词
Resource allocation; Orthogonal frequency-division multiple access (OFDMA); Imperfect channel state information (CSI); Physical layer security; TN92;
D O I
暂无
中图分类号
学科分类号
摘要
We investigate the problem of resource allocation in a downlink orthogonal frequency-division multiple access (OFDMA) broadband network with an eavesdropper under the condition that both legitimate users and the eavesdropper are with imperfect channel state information (CSI). We consider three kinds of imperfect CSI: (1) noise and channel estimation errors, (2) feedback delay and channel prediction, and (3) limited feedback channel capacity, where quantized CSI is studied using rate-distortion theory because it can be used to establish an informationtheoretic lower bound on the capacity of the feedback channel. The problem is formulated as joint power and subcarrier allocation to optimize the maximum-minimum (max-min) fairness criterion over the users’ secrecy rate. The problem considered is a mixed integer nonlinear programming problem. To reduce the complexity, we propose a two-step suboptimal algorithm that separately performs power and subcarrier allocation. For a given subcarrier assignment, optimal power allocation is achieved by developing an algorithm of polynomial computational complexity. Numerical results show that our proposed algorithm can approximate the optimal solution.
引用
收藏
页码:398 / 408
页数:10
相关论文
共 60 条
[1]  
Chen C.(2011)Downlink throughput maximization for OFMDA systems with feedback channel capacity constraints IEEE Trans Signal Process 59 441-446
[2]  
Bai L.(2016)On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI IEEE Trans Veh Technol 65 8014-8024
[3]  
Wu B.(2015)D2D for intelligent transportation systems: a feasibility study IEEE Trans Intell Transp Syst 16 1784-1793
[4]  
Chen X.M.(1978)The Gaussian wire-tap channel IEEE Trans Inform Theory 24 451-456
[5]  
Chen J.(1978)Broadcast channels with confidential messages IEEE Trans Inform Theory 24 339-348
[6]  
Zhang H.Z.(2015)Secure transmission in^MIMO wiretap channels using generalorder transmit antenna selection with outdated CSI IEEE Trans Commun 63 2959-2971
[7]  
Cheng X.(2016)Secure transmission in cooperative relaying networks with multiple antennas IEEE Trans Wirel Commun 15 6843-6856
[8]  
Yang L.Q.(2003)Transmit power adaptation for multiuser OFMDA systems IEEE J Sel Areas Commun 21 171-178
[9]  
Shen X.(2015)Security-aware max–min resource allocation in multiuser OFMDA downlink IEEE Trans Inform Forens Secur 10 529-542
[10]  
Cheong S.K.L.Y.(2005)Adaptive resource allocation in multiuser^OFDM systems with proportional rate constraints IEEE Trans Wirel Commun 4 2726-2737