Combining Dirty-Paper Coding and Artificial Noise for Secrecy

Slides:



Advertisements
Similar presentations
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
Advertisements

Derives the optimal achievable rate for MISO secondary users under coexistence constraints Proposes practical strategy for cognition and cooperation in.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Authors: David N.C. Tse, Ofer Zeitouni. Presented By Sai C. Chadalapaka.
Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei.
Enhancing Secrecy With Channel Knowledge
HKUST Robust Optimal Cross Layer Designs for TDD- OFDMA Systems with Imperfect CSIT and Unknown Interference — State-Space Approach based on 1-bit.
Asymptotic Throughput Analysis of Massive M2M Access
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
Multiuser OFDM with Adaptive Subcarrier, Bit, and Power Allocation Wong, et al, JSAC, Oct
HKUST Combined Cross-Layer Design and HARQ for TDD Multiuser systems with Outdated CSIT Rui Wang & Vincent K. N. Lau Dept. of ECE The Hong Kong University.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Simultaneous Rate and Power Control in Multirate Multimedia CDMA Systems By: Sunil Kandukuri and Stephen Boyd.
Joint work with Miguel Rodrigues, Munnunjahan Ara, Vinay Prabhu and João Xavier Filter Design with Secrecy Constraints Hugo Reboredo Instituto de Telecomunicações.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Seyed Mohamad Alavi, Chi Zhou, Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology, Chicago, IL, USA ICC 2009.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Miao Zhao, Ming Ma and Yuanyuan Yang
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
GreenDelivery: Proactive Content Caching and Push with Energy- Harvesting-based Small Cells IEEE Communications Magazine, 2015 Sheng Zhou, Jie Gong, Zhenyu.
Multicast Algorithms for Multi- Channel Wireless Mesh Networks Guokai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt Mutka Department of Computer Science and.
May 7, 2014, Florence, Italy Retrospective Interference Alignment for the 3-user MIMO Interference Channel with.
A Game Approach for Multi-Channel Allocation in Multi-Hop Wireless Networks Lin Gao, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
PRICE-BASED SPECTRUM MANAGEMENT IN COGNITIVE RADIO NETWORKS Fan Wang, Marwan Krunz, and Shuguang Cui Department of Electrical & Computer Engineering, University.
Low Complexity User Selection Algorithms for Multiuser MIMO Systems with Block Diagonalization Zukang Shen, Runhua Chen, Jeff Andrews, Robert Heath, and.
Joint Illumination-Communication Optimization in Visible Light Communication Zhongqiang Yao, Hui Tian and Bo Fan State Key Laboratory of Networking and.
Ali Al-Saihati ID# Ghassan Linjawi
1 Codage avec Information Adjacante (DPC : Dirty paper coding) et certaines de ses applications : Tatouage (Watermarking) MIMO broadcast channels Gholam-Reza.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Multiuser OFDM with Adaptive Subcarrier, Bit and Power Allocation (IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 10, OCTOBER 1999)
OFDMA Based Two-hop Cooperative Relay Network Resources Allocation Mohamad Khattar Awad, Xuemin (Sherman) Shen Student Member, IEEE Senior Member, IEEE.
Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach Lin Gao, Xinbing Wang, Youyun Xu, Qian Zhang Shanghai Jiao Tong University,
Simultaneous routing and resource allocation via dual decomposition AUTHOR: Lin Xiao, Student Member, IEEE, Mikael Johansson, Member, IEEE, and Stephen.
Presented by Abhijit Mondal Haritabh Singh Suman Mondal
Lin Tian ∗ ‡, Di Pang ∗,Yubo Yang ∗, Jinglin Shi ∗, Gengfa Fang †, Eryk Dutkiewicz † ∗ Institute of Computing Technology, Chinese Academy of Science, China.
指導老師 : 王瑞騰 老師 學生 : 盧俊傑 On Cognitive Radio Networks with Opportunistic Power Control Strategies in Fading Channels IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,
Scheduling Considerations for Multi-User MIMO
Doc.: aj Submission November 2014 Slide 1 Shiwen He , Haiming Wang Quasi-Orthogonal STBC for IEEE aj ( 45GHz ) Authors/contributors:
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
History-based Adaptive Modulation for a Downlink Multicast Channel in OFDMA systems Haibo Wang, Hans Peter Schwefel and Thomas Skjodeberg Toftegaard Center.
Optimal Sequence Allocation and Multi-rate CDMA Systems Krishna Kiran Mukkavilli, Sridhar Rajagopal, Tarik Muharemovic, Vikram Kanodia.
Secure M-PSK Communication Via Directional Modulation University of Luxembourg, University of Illinois in Chicago ICASSP, Shanghai, 2016 Ashkan Kalantari,
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
Is there a promising way?
Introduction to Cognitive radios Part two
Sept Best Paper Award Unified Analysis of Linear Block Precoding for Distributed Antenna Systems Toshiaki Koike-Akino1 Andreas F. Molisch2 Zhifeng.
CCSDS Physical Layer Security White Paper
Divide-and-Conquer Based Cooperative Jamming
EE359 – Lecture 15 Outline Announcements: MIMO Channel Capacity
Yinsheng Liu, Beijing Jiaotong University, China
Cross layer design is wireless multi-hop network
Physical Layer Security in Multiple Antenna Systems
Distributed MIMO Patrick Maechler April 2, 2008.
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Optimal Sequence Allocation and Multi-rate CDMA Systems
Scheduling in Wireless Communication Systems
Independent Encoding for the Broadcast Channel
Master Thesis Presentation
Opportunistic Beam-forming with Limited Feedback
Power Efficient Communication ----Joint Routing, Scheduling and Power Control Design Presenter: Rui Cao.
Color image noise removal algorithm utilizing hybrid vector filtering
Reza Sohrabi and Yingbo Hua
Lihua Weng Dept. of EECS, Univ. of Michigan
Presentation transcript:

Combining Dirty-Paper Coding and Artificial Noise for Secrecy Bo Wang1, Pengcheng Mu1, Chao Wang1, Weile Zhang1, Hui-Ming Wang1, and Bobin Yao2 1School of Electron. & Inform. Eng., Xi’an Jiaotong University, Xi’an, China, 710049 2School of Electron. & Control Eng., Chang’an University, Xi’an, China, 710064

Outline Introduction System model Problem formulation Transmission scheme Optimization algorithm Simulation results Conclusions 2018/7/23 IEEE ICASSP 2016

Introduction Physical layer security Shannon’49 Wiretap channel Wyner’75 CsiszarKorner-TIT’78 Secrecy capacity Secrecy rate & wiretap code Alice Eve Bob X Y Z 2018/7/23 IEEE ICASSP 2016

Introduction Multi-antenna techniques Beamforming KhistiWornell-TIT’10 Artificial noise (AN) GoelNegi-TWC’08 LiMa-TSP’13 Intrinsic secrecy in multiuser networks 2018/7/23 IEEE ICASSP 2016

System model M-user wiretap broadcast channel An N-antenna transmitter Alice M single-antenna legitimate receivers Bob-m A single-antenna passive eavesdropper Eve large-scale fading 2018/7/23 IEEE ICASSP 2016

System model Broadcasting Secrecy capacity & dirty-paper coding (DPC) EkremUlukus-TIT’11 & BagherikaramMotahariKhandani-TIT’13 2018/7/23 IEEE ICASSP 2016

System model ? Secrecy outage Secrecy outage probability (SOP) 2018/7/23 IEEE ICASSP 2016

normal communication rate of Bob-m Problem formulation Secrecy rate maximization secrecy rate of Bob-1 normal communication rate of Bob-m SOP of Bob-1 power budget 2018/7/23 IEEE ICASSP 2016

Transmission scheme Zero-forcing dirty-paper coding (ZF-DPC) 2018/7/23 IEEE ICASSP 2016

Transmission scheme Hybrid secure transmission scheme 2018/7/23 IEEE ICASSP 2016

Transmission scheme Simplified optimization problem 2018/7/23 IEEE ICASSP 2016

Optimization algorithm Simplified SOP Introduce 2018/7/23 IEEE ICASSP 2016

Optimization algorithm Decomposition (fix ) 2018/7/23 IEEE ICASSP 2016

Optimization algorithm Solution to the inner problem optimal power allocation among 2018/7/23 IEEE ICASSP 2016

Optimization algorithm Solution to the outer problem convex quasi-concave The global optimum can be found ! 2018/7/23 IEEE ICASSP 2016

Simulation results Comparison with the traditional AN scheme 2018/7/23 IEEE ICASSP 2016

Conclusions DPC enables a simple and accurate characterization of the intrinsic secrecy in a multiuser broadcast channel. The proposed hybrid secure transmission scheme supports the secure transmission for one user and the normal transmission for some other users simultaneously. The achievable secrecy rate can be close to that of the traditional AN scheme. 2018/7/23 IEEE ICASSP 2016

THANK YOU Bo Wang School of Electronic and Information Engineering, Xi’an Jiaotong University antaeusas@stu.xjtu.edu.cn