|
|
Optimization of Secrecy Rate for Energy Harvesting Gaussian Wiretap Channel |
Xie Xian-zhong Zhang Xiu-juan Lei Wei-jia |
(Institute of Personal Communications, Chongqing University of Posts and Telecommunications, Chongqing 400065, China) |
|
|
Abstract To solve the problems of security threats and energy constrained in wireless networks, this paper studies secure communication of energy harvesting Gaussian wiretap channel based on Save-then-Transmit (ST) protocol. Firstly, the optimization of the system secrecy rate is studied. Next, to further improve the system secrecy rate, a Cooperative Jamming (CJ) scheme is given. Besides, the sufficient and necessary conditions for this scheme to achieve a higher secrecy rate are discussed. Then, an iterative optimization algorithm of the secrecy rate in this scheme is proposed. Finally, a low complexity selection scheme for single helper is given. Simulation results show that, the first optimization scheme obviously improves the system secrecy rate. The second cooperative jamming scheme can further enhance the system secrecy rate and has fast convergence rate. When the original energy harvesting Gaussian wiretap channel can not operate secure communication, the cooperative jamming scheme can achieve secure transmission under certain conditions.
|
Received: 09 February 2015
Published: 17 July 2015
|
|
Fund: The National Natural Science Foundation of China (61271259, 61301123); The Chongqing Natural Science Foundation (CTSC2011JJA40006); The Research Project of Chongqing Education Commission (KJ120501, KJ120502, KJ130535); The Special Fund of Chongqing Key Laboratory (CSTC); The Program for Changjiang Scholars and Innovative Research Team in University (IRT1299) |
Corresponding Authors:
Xie Xian-zhong
E-mail: xiexzh@cqupt.edu.cn
|
|
|
|
[1] |
Shiu Y S, Chang S Y, Wu H C, et al.. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
|
[2] |
Wyner A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
[3] |
Xie Jian-wei and Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers[C]. Proceedings of the Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, 2012: 193-200.
|
[4] |
Xie Jian-wei and Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: blind cooperative jamming[C]. Proceedings of the Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, 2013: 1-5.
|
[5] |
Bassily R and Ulukus S. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks[J]. IEEE Transactions on Signal Processing, 2013, 61(6): 1544-1554.
|
[6] |
Oggier F and Hassibi B. The secrecy capacity of the MIMO wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(8): 4961-4972.
|
[7] |
Ekrem E and Ulukus S. The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(4): 2083-2114.
|
[8] |
Bustin R, Liu Ruo-heng, and Poor H V. An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel[C]. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, 2009: 2602-2606.
|
[9] |
Fakoorian S A A and Swindlehurst A L. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel[C]. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, 2012: 2321-2325.
|
[10] |
Khisti A and Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.
|
[11] |
Sudevalayam S and Kulkarni P. Energy harvesting sensor nodes: Survey and implications[J]. IEEE Communications Surveys &Tutorials, 2011, 13(3): 443-461.
|
[12] |
Visser H J and Vullers R J M. RF energy harvesting and transport for wireless sensor network applications: principles and requirements[J]. Proceedings of the IEEE, 2013, 101(6): 1410-1423.
|
[13] |
Lu Xiao, Wang Ping, Niyato D, et al.. Wireless networks with RF energy harvesting: A contemporary survey[OL]. http://arxiv.org/abs/1406.6470-2014.
|
[14] |
Luo Shi-xin, Zhang Rui, and Lim T J. Optimal save-then-transmit protocol for energy harvesting wireless transmitters[J]. IEEE Transactions on Wireless Communications, 2013, 12(3): 1196-1207.
|
|
|
|