Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI

被引:0
|
作者
Wei Yang
Jing Mao
Chen Chen
Xiang Cheng
Liu-qing Yang
Hai-ge Xiang
机构
[1] Peking University,State Key Laboratory of Advanced Optical Communication Systems and Networks
[2] Colorado State University,Department of Electrical & Computer Engineering
来源
Frontiers of Information Technology & Electronic Engineering | 2018年 / 19卷
关键词
Resource allocation; Orthogonal frequency-division multiple access (OFDMA); Imperfect channel state information (CSI); Physical layer security; TN92;
D O I
暂无
中图分类号
学科分类号
摘要
We investigate the problem of resource allocation in a downlink orthogonal frequency-division multiple access (OFDMA) broadband network with an eavesdropper under the condition that both legitimate users and the eavesdropper are with imperfect channel state information (CSI). We consider three kinds of imperfect CSI: (1) noise and channel estimation errors, (2) feedback delay and channel prediction, and (3) limited feedback channel capacity, where quantized CSI is studied using rate-distortion theory because it can be used to establish an informationtheoretic lower bound on the capacity of the feedback channel. The problem is formulated as joint power and subcarrier allocation to optimize the maximum-minimum (max-min) fairness criterion over the users’ secrecy rate. The problem considered is a mixed integer nonlinear programming problem. To reduce the complexity, we propose a two-step suboptimal algorithm that separately performs power and subcarrier allocation. For a given subcarrier assignment, optimal power allocation is achieved by developing an algorithm of polynomial computational complexity. Numerical results show that our proposed algorithm can approximate the optimal solution.
引用
收藏
页码:398 / 408
页数:10
相关论文
共 50 条
  • [41] Polarization Sensitive Array Based Physical-Layer Security
    Gong, Shiqi
    Xing, Chengwen
    Chen, Sheng
    Fei, Zesong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) : 3964 - 3981
  • [42] Analysis of Physical-Layer Security in Future Mobile Communication
    Ming, Yang
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 3144 - 3147
  • [43] Physical-layer security of underwater wireless optical communication
    Wei, Yixin
    Yang, Changgang
    Wei, Amin
    Zhang, Guofeng
    Qin, Chengbing
    Chen, Ruiyun
    Hu, Jianyong
    Xiao, Liantuan
    Jia, Suotang
    ACTA PHYSICA SINICA, 2025, 74 (06)
  • [44] Physical-Layer Security of Visible Light Communications with Jamming
    Tian, Dinghui
    Zhang, Wensheng
    Sun, Jian
    Wang, Cheng-Xiang
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [45] Physical-Layer Security in 6G Networks
    Mucchi, Lorenzo
    Jayousi, Sara
    Caputo, Stefano
    Panayirci, Erdal
    Shahabuddin, Shahriar
    Bechtold, Jonathan
    Morales, Ivan
    Stoica, Razvan-Andrei
    Abreu, Giuseppe
    Haas, Harald
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1901 - 1914
  • [46] A New Physical-layer Security Measure - Secrecy Pressure
    Mucchi, Lorenzo
    Ronga, Luca
    Huang, Kaibin
    Chen, Yifan
    Wang, Rui
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [47] Physical Layer Security With DCO-OFDM-Based VLC Under the Effects of Clipping Noise and Imperfect CSI
    Panayirci, Erdal
    Bektas, Ekin B.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (07) : 4259 - 4273
  • [48] Radio resource allocation to provide physical layer security in relay-assisted cognitive radio networks
    Alavi, Faezeh
    Saeedi, Hamid
    IET COMMUNICATIONS, 2015, 9 (17) : 2124 - 2130
  • [49] Energy-Efficient Resource Allocation for NOMA-MEC Networks With Imperfect CSI
    Fang, Fang
    Wang, Kaidi
    Ding, Zhiguo
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (05) : 3436 - 3449
  • [50] Jammer Selection for Physical-Layer Security Using Fuzzy Logic
    Huang, Lijiao
    Guo, Li
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 618 - 623