Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper

The tremendous performance gain of heterogeneous networks (HetNets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for HetNets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker (KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm.

[1]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Wang Li,et al.  Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.

[3]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[4]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[5]  Jinhong Yuan,et al.  Location-Based Secure Transmission for Wiretap Channels , 2015, IEEE Journal on Selected Areas in Communications.

[6]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[7]  Qiang Liu,et al.  Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions , 2015, IEEE Wireless Communications.

[8]  Hao Yu,et al.  Improved Computation for Levenberg–Marquardt Training , 2010, IEEE Transactions on Neural Networks.

[9]  Stephen P. Boyd,et al.  Optimal power control in interference-limited fading wireless channels with outage-probability specifications , 2002, IEEE Trans. Wirel. Commun..

[10]  H. Vincent Poor,et al.  Contract-Based Interference Coordination in Heterogeneous Cloud Radio Access Networks , 2015, IEEE Journal on Selected Areas in Communications.

[11]  Huiming Wang,et al.  Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[12]  Xinrong Li,et al.  RSS-Based Location Estimation with Unknown Pathloss Model , 2006, IEEE Transactions on Wireless Communications.

[13]  R. Kass Nonlinear Regression Analysis and its Applications , 1990 .

[14]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[15]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[16]  Chengwen Xing,et al.  Matrix-Monotonic Optimization for MIMO Systems , 2013, IEEE Transactions on Signal Processing.

[17]  Keping Long,et al.  Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey , 2013, IEEE Wireless Communications.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..