Physical Layer Security Scheme Based on Base Station Cooperation in Dense Heterogeneous Networks

Author(s):  
Bo Zhang ◽  
Kaizhi Huang ◽  
Ming Yi ◽  
Mingliang Li
IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 5607-5623 ◽  
Author(s):  
Lin Hu ◽  
Hong Wen ◽  
Bin Wu ◽  
Jie Tang ◽  
Fei Pan

2020 ◽  
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

Abstract Physical layer security of non-orthogonal multiple access (NOMA) system which uses simultaneous wireless information and power transfer (SWIPT) technique is deeply dicussed in this paper. Generally, eavesdropper in the downlink of NOMA system may use successive interference cancellation technology (SIC) to obtain the secrecy information of receiver. To tackle this problem, we propose a physical layer security scheme to minimize the transmit power of the base station (BS) while the secrecy rates of receivers are guaranteed. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmit power of the BS.


Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


2014 ◽  
Vol 62 (24) ◽  
pp. 6391-6401 ◽  
Author(s):  
Fengchao Zhu ◽  
Feifei Gao ◽  
Minli Yao ◽  
Hongxing Zou

Sign in / Sign up

Export Citation Format

Share Document