Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming
Qiang Li,Wing-Kin Ma +1 more
Reads0
Chats0
TLDR
This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers, and addresses the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario.Abstract:
In recent years there has been growing interest in study of multi-antenna transmit designs for providing secure communication over the physical layer. This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers. Specifically, we address the transmit covariance optimization for secrecy-rate maximization (SRM) of that scenario. The challenge of this problem is that it is a nonconvex optimization problem. This paper shows that the SRM problem can actually be solved in a convex and tractable fashion, by recasting the SRM problem as a semidefinite program (SDP). The SRM problem we solve is under the premise of perfect channel state information (CSI). This paper also deals with the imperfect CSI case. We consider a worst-case robust SRM formulation under spherical CSI uncertainties, and we develop an optimal solution to it, again via SDP. Moreover, our analysis reveals that transmit beamforming is generally the optimal transmit strategy for SRM of the considered scenario, for both the perfect and imperfect CSI cases. Simulation results are provided to illustrate the secrecy-rate performance gains of the proposed SDP solutions compared to some suboptimal transmit designs.read more
Citations
More filters
Posted Content
Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers
TL;DR: Joint caching and scalable video coding of video files are proposed to enable secure cooperative multiple-input multiple-output (MIMO) transmission and exploit the cache memory of all BSs for improving system performance.
Journal ArticleDOI
Evolutionary game-based secrecy rate adaptation in wireless sensor networks
TL;DR: By developing the classical wire-tap channel, an approach to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered WSNs is constructed and it is proved the game is stable; that is, there exist evolutionarily stable strategies that explain which strategies will be selected by a sensor nodes in the end.
Proceedings ArticleDOI
Robust artificial-noise aided transmit design for multi-user MISO systems with integrated services
Weidong Mei,Zhi Chen,Chuan Huang +2 more
TL;DR: A general case of imperfect channel state information (CSI) is considered, aiming at a joint and robust design of the input covariances for the multicast message, confidential message and AN, such that the worst-case secrecy rate region is maximized subject to the sum power constraint.
Posted Content
Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI
TL;DR: This paper develops a suboptimal algorithm based on alternating optimization, the penalty-based and semidefinite relaxation methods and reveals that the proposed scheme significantly reduces the transmit power compared to other benchmark schemes.
Journal ArticleDOI
Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems
TL;DR: This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers.
References
More filters
Book
Convex Optimization
Stephen Boyd,Lieven Vandenberghe +1 more
TL;DR: In this article, the focus is on recognizing convex optimization problems and then finding the most appropriate technique for solving them, and a comprehensive introduction to the subject is given. But the focus of this book is not on the optimization problem itself, but on the problem of finding the appropriate technique to solve it.
Book
Matrix Analysis
Roger A. Horn,Charles R. Johnson +1 more
TL;DR: In this article, the authors present results of both classic and recent matrix analyses using canonical forms as a unifying theme, and demonstrate their importance in a variety of applications, such as linear algebra and matrix theory.
Journal ArticleDOI
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
TL;DR: This paper describes how to work with SeDuMi, an add-on for MATLAB, which lets you solve optimization problems with linear, quadratic and semidefiniteness constraints by exploiting sparsity.
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.