An Artificial Noise Scheme for Secure Communication in Heterogeneous D2D and Cellular Networks

Author(s):  
Shiwei Yan ◽  
Yong Shang ◽  
Xiguang Zhang ◽  
Dehuai Li ◽  
Xiaobo Li
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Quanzhong Li ◽  
Sai Zhao

By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary transmitter under the quality-of-service at the primary user and the transmit power constraint at the secondary transmitter. We consider the practical case that the channel state information (CSI) of the eavesdropper is imperfect, and we model the imperfect CSI by the worst-case model. We show that the robust secrecy rate maximization problem can be transformed to a series of semidefinite programmings based on S-procedure and rank-one relaxation. We also propose an effective method to recover the optimal rank-one solution. Simulations are provided to show the effectiveness of our proposed robust secure algorithm with comparison to the nonrobust secure design and traditional orthogonal multiple access schemes.


2020 ◽  
Vol 12 (10) ◽  
pp. 175
Author(s):  
Xin Song ◽  
Lin Xia ◽  
Siyang Xu ◽  
Yue Wang

In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Tao Hong ◽  
Geng-xin Zhang

The research of improving the secrecy capacity (SC) of wireless communication system using artificial noise (AN) is one of the classic models in the field of physical layer security communication. In this paper, we consider the peak-to-average power ratio (PAPR) problem in this AN-aided model. A power allocation algorithm for AN subspaces is proposed to solve the nonconvex optimization problem of PAPR. This algorithm utilizes a series of convex optimization problems to relax the nonconvex optimization problem in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation. Furthermore, we also derive the SC of the proposed signal under the condition of the AN-aided model with a finite alphabet and the nonlinear high-power amplifiers (HPAs). Simulation results show that the proposed algorithm reduces the PAPR value of transmit signal to improve the efficiency of HPA compared with benchmark AN-aided secure communication signals in the multiple-input single-output (MISO) model.


2013 ◽  
Vol 9 (1) ◽  
pp. 54-84 ◽  
Author(s):  
Shaik Shakeel Ahamad ◽  
V. N. Sastry ◽  
Siba K. Udgata

In this paper the authors propose a Secure Mobile Payment Framework in Multi hop Cellular Network environment (which is an integration of cellular networks and mobile ad hoc networks) using Mobile Agent technology and Digital Signature with Message Recovery (DSMR) mechanism based on ECDSA mechanism. Secure communication in Multi hop Cellular Networks is a nontrivial task because of lack of infrastructure, no prior trust relationships among nodes due to the absence of a centralized authority. Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism provides secure mobile payments in Multi hop Cellular Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. The proposed protocol ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, prevents Double Spending, Overspending and Money laundering. The security properties of the proposed protocol have been verified successfully using BAN Logic, AVISPA and Scyther Tools and presented with results.


Sign in / Sign up

Export Citation Format

Share Document