Exploiting Opportunistic Scheduling in Uplink Wiretap Networks

Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetrically located legitimate users (LUs) and eavesdroppers. To exploit multiuser diversity, the cumulative distribution function-based scheduling method is leveraged to schedule the transmissions of the LUs. Under this scheduling framework, the closed-form expressions of the secrecy outage probability and ergodic secrecy rate are derived, illustrating the interplay among the system parameters, such as the channel statistics and the number of LUs and eavesdroppers. Through the secrecy outage analysis of the proposed scheduling schemes, we observe that the secrecy throughput is not always maximized with a larger channel access ratio (CAR), and consequently, we design a CAR adjustment scheme to maximize the secrecy throughput while satisfying the required secrecy level. We also prove that under our proposed scheduling schemes, the secrecy diversity order of each LU is equal to the reciprocal of the LU's CAR, implying that full diversity order is achieved, and the ergodic secrecy rate of each LU normalized by its CAR achieves the optimal double-logarithmic growth when the number of LUs increases to infinity.

[1]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[3]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[4]  Byeong Gi Lee,et al.  Wireless packet scheduling based on the cumulative distribution function of user transmission rates , 2005, IEEE Transactions on Communications.

[5]  Moustafa Youssef,et al.  Opportunistic Secrecy with a Strict Delay Constraint , 2013, IEEE Transactions on Communications.

[6]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[7]  Hsiao-Hwa Chen,et al.  Interference-Limited Resource Optimization in Cognitive Femtocells With Fairness and Imperfect Spectrum Sensing , 2016, IEEE Transactions on Vehicular Technology.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[10]  Yichao Huang,et al.  Random Beamforming with Heterogeneous Users and Selective Feedback: Individual Sum Rate and Individual Scaling Laws , 2013, IEEE Transactions on Wireless Communications.

[11]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[12]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[13]  Victor C. M. Leung,et al.  Opportunistic fair resource sharing with secrecy considerations in uplink wiretap channels , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[15]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[16]  Victor C. M. Leung,et al.  Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling , 2015, 2015 IEEE International Conference on Communications (ICC).

[17]  Bang Chul Jung,et al.  On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks , 2013, IEEE Communications Letters.

[18]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[19]  Björn E. Ottersten,et al.  Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.

[20]  Victor C. M. Leung,et al.  CDF-Based Scheduling Algorithm for Proportional Throughput Fairness , 2016, IEEE Communications Letters.

[21]  Kin K. Leung,et al.  Multi-user diversity for secrecy in wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).

[22]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[23]  Jianping Pan,et al.  Scheduling in a secure wireless network , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[24]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[25]  Shi Jin,et al.  On Secrecy of a Multi-Antenna System with Eavesdropper in Close Proximity , 2015, IEEE Signal Processing Letters.

[26]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[27]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[29]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[30]  Victor C. M. Leung,et al.  Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead , 2015, IEEE/ACM Transactions on Networking.

[31]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[32]  Victor C. M. Leung,et al.  Opportunistic Downlink Scheduling With Resource-Based Fairness and Feedback Reduction in Distributed Antenna Systems , 2016, IEEE Transactions on Vehicular Technology.

[33]  RIYA,et al.  On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels With Opportunistic Scheduling , 2015 .