1 / 18

Combining Dirty-Paper Coding and Artificial Noise for Secrecy

Combining Dirty-Paper Coding and Artificial Noise for Secrecy. Bo Wang 1 , Pengcheng Mu 1 , Chao Wang 1 , Weile Zhang 1 , Hui-Ming Wang 1 , and Bobin Yao 2. 1 School of Electron. & Inform. Eng., Xi’an Jiaotong University, Xi’an, China, 710049. 2 School of Electron. & Control Eng.,

clarknancy
Download Presentation

Combining Dirty-Paper Coding and Artificial Noise for Secrecy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Combining Dirty-Paper Coding and Artificial Noise for Secrecy Bo Wang1, Pengcheng Mu1, Chao Wang1, Weile Zhang1, Hui-Ming Wang1, and Bobin Yao2 1School of Electron. & Inform. Eng., Xi’an Jiaotong University, Xi’an, China, 710049 2School of Electron. & Control Eng., Chang’an University, Xi’an, China, 710064

  2. Outline • Introduction • System model • Problem formulation • Transmission scheme • Optimization algorithm • Simulation results • Conclusions IEEE ICASSP 2016

  3. X Y Alice Bob Z Eve Introduction • Physical layer security Shannon’49 • Wiretap channel Wyner’75 CsiszarKorner-TIT’78 Secrecy capacity Secrecy rate & wiretap code IEEE ICASSP 2016

  4. Introduction • Multi-antenna techniques • BeamformingKhistiWornell-TIT’10 • Artificial noise (AN) GoelNegi-TWC’08 LiMa-TSP’13 • Intrinsic secrecy in multiuser networks IEEE ICASSP 2016

  5. System model • M-user wiretap broadcast channel • An N-antenna transmitter Alice • M single-antenna legitimate receivers Bob-m • A single-antenna passive eavesdropper Eve large-scale fading IEEE ICASSP 2016

  6. System model • Broadcasting • Secrecy capacity & dirty-paper coding (DPC) EkremUlukus-TIT’11 & BagherikaramMotahariKhandani-TIT’13 IEEE ICASSP 2016

  7. System model • Secrecy outage • Secrecy outage probability (SOP) ? IEEE ICASSP 2016

  8. Problem formulation • Secrecy rate maximization secrecy rate of Bob-1 normal communication rate of Bob-m SOP of Bob-1 power budget IEEE ICASSP 2016

  9. Transmission scheme • Zero-forcing dirty-paper coding (ZF-DPC) IEEE ICASSP 2016

  10. Transmission scheme • Hybrid secure transmission scheme IEEE ICASSP 2016

  11. Transmission scheme • Simplified optimization problem IEEE ICASSP 2016

  12. Optimization algorithm • Simplified SOP • Introduce IEEE ICASSP 2016

  13. Optimization algorithm • Decomposition (fix ) IEEE ICASSP 2016

  14. Optimization algorithm • Solution to the inner problem • optimal power allocation among IEEE ICASSP 2016

  15. Optimization algorithm • Solution to the outer problem convex quasi-concave The global optimum can be found ! IEEE ICASSP 2016

  16. Simulation results • Comparison with the traditional AN scheme IEEE ICASSP 2016

  17. Conclusions • DPC enables a simple and accurate characterization of the intrinsic secrecy in a multiuser broadcast channel. • The proposed hybrid secure transmission scheme supports the secure transmission for one user and the normal transmission for some other users simultaneously. The achievable secrecy rate can be close to that of the traditional AN scheme. IEEE ICASSP 2016

  18. THANK YOU Bo Wang School of Electronic and Information Engineering, Xi’an Jiaotong University antaeusas@stu.xjtu.edu.cn

More Related