{"title":"未知攻击模式下基于OFDMA的HetNets物理层安全的无线电资源分配","authors":"Saeed Sheikhzadeh, M. Javan, N. Mokari","doi":"10.1109/IWCIT.2017.7947671","DOIUrl":null,"url":null,"abstract":"Consider an orthogonal frequency division multiple access (OFDMA)-based heterogeneous cellular network (HetNet) in which a macrocell is underlaid with several small cells overheard by eavesdropper and jamming by jammer. In this paper, our goal is to design a transmission strategy, such that the achievable secrecy rate is maximized subject to the individual transmit power constraints for the macrocell base station (MBS) and each small-cell base station (SBS) and a constraint for the interference caused by SBSs to the macrocell user equipments (MUEs). There exists an adversary which can choose between two functional modes: eavesdropping the transmission between the legitimate parties or jamming it, but not both at the same time. We assume that the mode of adversary on each sub-carrier is unknown. To solve this non-convex problem, we employ an iterative approach in which sub-carriers and transmit powers of each base stations are alternatively assigned and optimized at every step. To handle the non-convexity of the power allocation, we adopt the successive convex approximation (SCA) approach by exploiting arithmetic-geometric mean (AGM) and logarithmic and difference-of-two-concave-functions (D.C.) approximations to transform problem into a sequence of convex subproblems. Simulation results demonstrate the close-to-optimal performance of the proposed schemes.","PeriodicalId":243813,"journal":{"name":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary\",\"authors\":\"Saeed Sheikhzadeh, M. Javan, N. Mokari\",\"doi\":\"10.1109/IWCIT.2017.7947671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Consider an orthogonal frequency division multiple access (OFDMA)-based heterogeneous cellular network (HetNet) in which a macrocell is underlaid with several small cells overheard by eavesdropper and jamming by jammer. In this paper, our goal is to design a transmission strategy, such that the achievable secrecy rate is maximized subject to the individual transmit power constraints for the macrocell base station (MBS) and each small-cell base station (SBS) and a constraint for the interference caused by SBSs to the macrocell user equipments (MUEs). There exists an adversary which can choose between two functional modes: eavesdropping the transmission between the legitimate parties or jamming it, but not both at the same time. We assume that the mode of adversary on each sub-carrier is unknown. To solve this non-convex problem, we employ an iterative approach in which sub-carriers and transmit powers of each base stations are alternatively assigned and optimized at every step. To handle the non-convexity of the power allocation, we adopt the successive convex approximation (SCA) approach by exploiting arithmetic-geometric mean (AGM) and logarithmic and difference-of-two-concave-functions (D.C.) approximations to transform problem into a sequence of convex subproblems. Simulation results demonstrate the close-to-optimal performance of the proposed schemes.\",\"PeriodicalId\":243813,\"journal\":{\"name\":\"2017 Iran Workshop on Communication and Information Theory (IWCIT)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Iran Workshop on Communication and Information Theory (IWCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCIT.2017.7947671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Iran Workshop on Communication and Information Theory (IWCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCIT.2017.7947671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary
Consider an orthogonal frequency division multiple access (OFDMA)-based heterogeneous cellular network (HetNet) in which a macrocell is underlaid with several small cells overheard by eavesdropper and jamming by jammer. In this paper, our goal is to design a transmission strategy, such that the achievable secrecy rate is maximized subject to the individual transmit power constraints for the macrocell base station (MBS) and each small-cell base station (SBS) and a constraint for the interference caused by SBSs to the macrocell user equipments (MUEs). There exists an adversary which can choose between two functional modes: eavesdropping the transmission between the legitimate parties or jamming it, but not both at the same time. We assume that the mode of adversary on each sub-carrier is unknown. To solve this non-convex problem, we employ an iterative approach in which sub-carriers and transmit powers of each base stations are alternatively assigned and optimized at every step. To handle the non-convexity of the power allocation, we adopt the successive convex approximation (SCA) approach by exploiting arithmetic-geometric mean (AGM) and logarithmic and difference-of-two-concave-functions (D.C.) approximations to transform problem into a sequence of convex subproblems. Simulation results demonstrate the close-to-optimal performance of the proposed schemes.