Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink

In this paper, we study the problem of resource allocation for a multiuser orthogonal frequency-division multiple access (OFDMA) downlink with eavesdropping. The considered setup consists of a base station, several users, and a single eavesdropper that intends to wiretap the transmitted message within each OFDMA subchannel. By taking into consideration the existence of the eavesdropper, the base station aims to assign subchannels and allocate the available power in order to optimize the max-min fairness criterion over the users' secrecy rate. The considered problem is a mixed integer nonlinear program. For a fixed subchannel assignment, the optimal power allocation is obtained by developing an algorithm of polynomial computational complexity. In the general case, the problem is investigated from two different perspectives due to its combinatorial nature. In the first, the number of users is equal or higher than the number of subchannels, whereas in the second, the number of users is less than the number of subchannels. In the first case, we provide the optimal solution in polynomial time by transforming the original problem into an assignment one for which there are polynomial time algorithms. In the second case, the secrecy rate formula is linearly approximated and the problem is transformed to a mixed integer linear program, which is solved by a branch-and-bound algorithm. Moreover, optimality is discussed for two particular cases where the available power tends to infinity and zero, respectively. Based on the resulting insights, three heuristic schemes of polynomial complexity are proposed, offering a better balance between performance and complexity. Simulation results demonstrate that each one of these schemes achieves its highest performance at a different power regime of the system.

[1]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[2]  John W. Fowler,et al.  Heuristics for minimizing regular performance measures in unrelated parallel machine scheduling problems , 2011, Comput. Oper. Res..

[3]  George L. Nemhauser,et al.  Models for representing piecewise linear cost functions , 2004, Oper. Res. Lett..

[4]  John M. Cioffi,et al.  Increase in capacity of multiuser OFDM system using dynamic subchannel allocation , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[5]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[6]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[8]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[9]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[10]  Yueming Cai,et al.  Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks , 2013, EURASIP Journal on Wireless Communications and Networking.

[11]  Derrick Wing Kwan Ng,et al.  Resource Allocation for Secure OFDMA Networks with Imperfect CSIT , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[12]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[13]  Jing Wang,et al.  Joint power allocation and artificial noise design for multiuser wiretap OFDM channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[15]  Mauro Dell'Amico,et al.  Assignment Problems , 1998, IFIP Congress: Fundamentals - Foundations of Computer Science.

[16]  Miguel R. D. Rodrigues,et al.  Power allocation strategies for OFDM Gaussian wiretap channels with a friendly jammer , 2013, 2013 IEEE International Conference on Communications (ICC).

[17]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[18]  Jeffrey G. Andrews,et al.  Fundamentals of Lte , 2010 .

[19]  Josef A. Nossek,et al.  Rate Balancing in Multiuser MIMO OFDM Systems , 2009, IEEE Transactions on Communications.

[20]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[21]  Frédérique E. Oggier,et al.  An Error Probability Approach to MIMO Wiretap Channels , 2011, IEEE Transactions on Communications.

[22]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[23]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Xin-Ping Guan,et al.  Cross-layer scheduling with secrecy demands in delay-aware OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[26]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[27]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[28]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[29]  Zhu Han,et al.  Physical layer security in wireless networks with passive and active eavesdroppers , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[30]  Stelios Timotheou,et al.  Asset-Task Assignment Algorithms in the Presence of Execution Uncertainty , 2011, Comput. J..

[31]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[32]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[33]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[34]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[35]  S. Shamai,et al.  Secrecy Capacity Region of Parallel Broadcast Channels , 2007, 2007 Information Theory and Applications Workshop.

[36]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[37]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[38]  Athina P. Petropulu,et al.  Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.

[39]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[40]  Nihar Jindal,et al.  Are yesterday-s information-theoretic fading models and performance metrics adequate for the analysis of today's wireless systems? , 2012, IEEE Communications Magazine.

[41]  Nicola Laurenti,et al.  Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes , 2014, IEEE Transactions on Information Forensics and Security.

[42]  Narendra Karmarkar,et al.  A new polynomial-time algorithm for linear programming , 1984, STOC '84.

[43]  Holger Boche,et al.  Accepted for Publication in Ieee Transactions on Signal Processing 1 Robust Qos-constrained Optimization of Downlink Multiuser Miso Systems , 2022 .

[44]  Zhu Han,et al.  Weighted Max-Min Resource Allocation for Frequency Selective Channels , 2010, IEEE Transactions on Signal Processing.

[45]  Walid Saad,et al.  On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[46]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[47]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security - Part I: Theoretical Aspects , 2006, ArXiv.