Joint secure transceiver design and power allocation for AN-assisted MIMO networks

H Xia, X Zhou, S Han, C Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
H Xia, X Zhou, S Han, C Li, Y Chai
IEEE Transactions on Wireless Communications, 2021ieeexplore.ieee.org
In this paper, we focus on antieavesdropping design in a multicell multiuser interference
channel coexisting with a multiantenna eavesdropper, in which multiuser interference arises
as a nonneglectable factor in securing communication. Supposing the eavesdropper is
equipped with an arbitrary number of antennas, we jointly exploit the role of inherent
multiuser interference and artificial noise (AN) to enhance security, and propose a
noniterative secure transceiver design under a multiple input multiple output (MIMO) …
In this paper, we focus on antieavesdropping design in a multicell multiuser interference channel coexisting with a multiantenna eavesdropper, in which multiuser interference arises as a nonneglectable factor in securing communication. Supposing the eavesdropper is equipped with an arbitrary number of antennas, we jointly exploit the role of inherent multiuser interference and artificial noise (AN) to enhance security, and propose a noniterative secure transceiver design under a multiple input multiple output (MIMO) framework. The quantity relationship of system parameters is then analyzed to ensure feasibility. And the achievable secrecy rate is then derived without any knowledge of the eavesdropper. Finally, to balance the power allocated to AN and secrecy data, a power allocation strategy aiming at maximizing the achievable secrecy rate is designed, while guaranteeing legitimate users the required quality of service. With the adopted design, both the multiuser interference and AN are leveraged to facilitate communication security such that the proposed secure transceiver design can adapt to changes in eavesdropping antennas. Extensive numerical results have verified our analysis and demonstrated that the proposed power allocation strategy outperforms the baseline algorithms in terms of the achievable secrecy rate.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果