Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels

2018 ◽  
Vol 7 (4) ◽  
pp. 514-517 ◽  
Author(s):  
Huanhuan Song ◽  
Hong Wen ◽  
Lin Hu ◽  
Yi Chen ◽  
Run-Fa Liao
2016 ◽  
Vol 65 (5) ◽  
pp. 3042-3056 ◽  
Author(s):  
Leonardo Jimenez Rodriguez ◽  
Nghi H. Tran ◽  
Tho Le-Ngoc

2020 ◽  
Vol 12 (10) ◽  
pp. 175
Author(s):  
Xin Song ◽  
Lin Xia ◽  
Siyang Xu ◽  
Yue Wang

In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme.


Author(s):  
Cuong Dang ◽  
Leonardo J. Rodr´ıguez ◽  
Nghi H. Tran ◽  
Forrest Sheng Bao ◽  
Shivakumar Sastry

In this research work, we investigate the secrecy rate and optimal power allocation schemes for a half-duplex (HD) wire-tap Rayleigh fading channel in which a source wishes to communicate securely to a destination in the presence of an eavesdropper and under the aid of an amplify-and-forward (AF) relay. The secrecy capacity and the corresponding optimal power allocation schemes are examined under both individual and joint power constraints. Due to the absence of an insightful expression of the secrecy rate for a given power allocation scheme, determining such secrecy capacity is challenging. To overcome this issue, we first propose a novel method to calculate the expectation of an exponentially distributed random variable using the exponential integral function. By exploiting this calculation, we then establish the average secrecy rate of the considered AF relay channel in closed-form. By examining the quasi-concavity of the optimal power allocation problem, it is then concluded that the problem is quasi-concave. As such, the globally optimal solution exists and is unique for both individual and joint power constraints. A simple root finding method then can be applied into the derived close-formed formula to approximately calculate the optimal power allocation scheme to achieve the secrecy capacity. Numerical results are then provided to confirm the accuracy of the derived formula and the optimality of the proposed power allocation.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Jue Liu ◽  
Nan Sha ◽  
Weiwei Yang ◽  
Jia Tu ◽  
Lianxin Yang

In this paper, we investigate secure unmanned aerial vehicle (UAV) communication in the presence of multiple UAV adaptive eavesdroppers (AEs), where each AE can conduct eavesdropping or jamming adaptively by learning others’ actions for degrading the secrecy rate more seriously. The one-leader and multi-follower Stackelberg game is adopted to analyze the mutual interference among multiple AEs, and the optimal transmit powers are proven to exist under the existing conditions. Following that, a mixed-strategy Stackelberg Equilibrium based on finite and discretized power set is also derived and a hierarchical Q-learning based power allocation algorithm (HQLA) is proposed to obtain the optimal power allocation strategy of the transmitter. Numerical results show that secrecy performance can be degraded severely by multiple AEs and verify the availability of the optimal power allocation strategy. Finally, the effect of the eavesdropping cost on the AE’s attack mode strategies is also revealed.


Sign in / Sign up

Export Citation Format

Share Document