Dynamic Power Allocation over Multiple-Access Channels for Secrecy-Rate Maximization

In this paper, the dynamic power allocation problem over the multiple-access channel (MAC) against overhearing of eavesdroppers is investigated with the objective to maximize the users' secrecy rate under transmitted power constraints. Lyapunov drift approach is applied to derive the sub-optimal solution for this inherent non-convex optimization problem. Convergence condition and performance of the developed algorithm are investigated. Simulation results indicate that it outperforms the difference- of-two-convex-functions (DC) programming with much less computation time, and its achieved secrecy rate is close to the global optimum solution.

[1]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[2]  Michael J. Neely Delay-Based Network Utility Maximization , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Michael J. Neely,et al.  Optimal Peer-to-Peer Schedulingfor Mobile Wireless Networkswith Redundantly Distributed Data , 2014, IEEE Transactions on Mobile Computing.

[4]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[5]  Wenbo Wang,et al.  Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.

[6]  Saeedeh Parsaeefard,et al.  Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users , 2014, IEEE Transactions on Wireless Communications.

[7]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[8]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[9]  Eytan Modiano,et al.  Dynamic power allocation and routing for time varying wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Raef Bassily,et al.  Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.

[11]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[12]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[13]  Lin Xie,et al.  TDMA and FDMA Based Resource Allocations for Quality of Service Provisioning Over Wireless Relay Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[16]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[17]  Özgür Erçetin,et al.  Control of Wireless Networks With Secrecy , 2010, IEEE/ACM Transactions on Networking.

[18]  Imre Csiszár,et al.  Secrecy Generation for Multiaccess Channel Models , 2013, IEEE Transactions on Information Theory.

[20]  Tho Le-Ngoc,et al.  Joint Subchannel Assignment and Power Allocation for OFDMA Femtocell Networks , 2014, IEEE Transactions on Wireless Communications.

[21]  Yingbin Liang,et al.  Wireless broadcast networks: Reliability, security, and stability , 2008, 2008 Information Theory and Applications Workshop.