Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks

Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, we formulate an analytical framework for resource allocation in a downlink OFDMA-based broadband network with coexistence of secure users (SU) and normal users (NU). The problem is formulated as joint power and subcarrier allocation with the objective of maximizing average aggregate information rate of all NU's while maintaining an average secrecy rate for each individual SU under a total transmit power constraint for the base station. We solve this problem in an asymptotically optimal manner using dual decomposition. Our analysis shows that an SU becomes a candidate competing for a subcarrier only if its channel gain on this subcarrier is the largest among all and exceeds the second largest by a certain threshold. Furthermore, while the power allocation for NU's follows the conventional water-filling principle, the power allocation for SU's depends on both its own channel gain and the largest channel gain among others. We also design a suboptimal algorithm to reduce the computational cost. Numerical studies are conducted to evaluate the performance of the proposed algorithms in terms of the achievable pair of information rate for NU's and secrecy rate for SU at different power consumptions.

[1]  Khaled Ben Letaief,et al.  Multiuser OFDM with adaptive subcarrier, bit, and power allocation , 1999, IEEE J. Sel. Areas Commun..

[2]  Kwang Bok Lee,et al.  Transmit power adaptation for multiuser OFDM systems , 2003, IEEE J. Sel. Areas Commun..

[3]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[4]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[5]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[6]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[7]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Fan Zhang,et al.  Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM Systems , 2006, IEEE Transactions on Wireless Communications.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  M. Tao,et al.  Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel , 2010, IEEE Communications Letters.

[11]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..