Secure communication over fading channels with statistical QoS constraints

@article{Qiao2010SecureCO,
  title={Secure communication over fading channels with statistical QoS constraints},
  author={Deli Qiao and Mustafa Cenk Gursoy and Senem Velipasalar},
  journal={2010 IEEE International Symposium on Information Theory},
  year={2010},
  pages={2503-2507}
}
In this paper, secure transmission of information over an ergodic fading channel is studied in the presence of statistical quality of service (QoS) constraints.We employ effective capacity to measure the secure throughput of the system, i.e., effective secure throughput. We assume that the channel side information (CSI) of the main and the eavesdropper channels is available at the transmitter side. Under this assumption, we investigate the optimal power control policies that maximize the… Expand
Secure Broadcasting over Fading Channels with Statistical QoS Constraints
TLDR
The fading broadcast channel with confidential messages is studied in the presence of statistical quality of service (QoS) constraints in the form of limitations on the buffer length to measure the throughput of the confidential and common messages. Expand
Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints
TLDR
Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput, and it is proven that this effective throughput region is convex implying that time-sharing between any two viable transmission and power control strategies results in effective throughput values inside the region. Expand
Secure Communication in Low Snr Regime Over Fading Channels in Mimo
In this work we consider MIMO fading channels and characterize the reliability function in the low-SNR regime as a function of the number of transmit and receive antennas. For the case when theExpand
An asymptotic secrecy rate analysis of a cooperative jamming strategy for physical-layer security
TLDR
A simple and efficient jammer selection algorithm is developed to find an appropriate jamming set to achieve almost the same performance, but significantly reduce the number of jammers used compared with all the jammers performing the CJ-NB strategy. Expand
CREEP: Cognitive relaying enabled efficiency and physical-layer security preserving framework
TLDR
Numerical results show CREEP not only improves PU's secrecy capacity but also enhances spectrum utilization, and theoretic analysis of a sum capacity maximization under certain rate and power constraints shows this. Expand
Secure multiple-input single-output communication - Part II: δ-secrecy symbol error probability and secrecy diversity
TLDR
A new notion of symbol error probability (SEP) for confidential information is put forth – called the ‘δ-secrecy SEP’ – to connect the reliability and confidentiality of the legitimate communication in MISOME wiretap channels and determines the optimal power allocation between the information-bearing signal and artificial noise. Expand
Interference masking for secure wireless broadcast communications
TLDR
A novel interference masking approach is proposed for secure broadcast scenarios, in which destinations switch roles from jammer to relay nodes during different time slots. Expand
Asymptotic regime analysis of NOMA uplink networks under QoS delay Constraints
TLDR
This study studies the performance of a two user uplink non orthogonal multiple access (NOMA) network under quality of service (QoS) delay constraints, captured through each user delay exponents in their effective capacity (EC) and proposes novel closed form expressions for the EC of the NOMA users. Expand
A survey of security issues in Cognitive Radio Networks
In the last decade, cognitive radio (CR) has emerged as a major next generation wireless networking technology, which is the most promising candidate solution to solve the spectrum scarcity andExpand
Group Secret Key Generation For Wireless Network
TLDR
A new group key generation strategy with low complexity is proposed, which combines point to point pair-wise key generation technique, the multi-segment scheme and the onetime pad in order to solve the non-convex max min problem. Expand
...
1
2
...

References

SHOWING 1-10 OF 17 REFERENCES
On the Secrecy Capacity of Fading Channels
TLDR
The positive impact of fading on the secrecy capacity is revealed and the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels is established. Expand
Secure Communication Over Fading Channels
TLDR
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1, which needs to be kept as secret as possible from receiver 2. Expand
Quality-of-Service Driven Power and Rate Adaptation over Wireless Links
  • Jia Tang, Xi Zhang
  • Computer Science
  • IEEE Transactions on Wireless Communications
  • 2007
TLDR
This work derives an optimal adaptation policy by integrating information theory with the concept of effective capacity for a block fading channel model and considers a more practical scenario where variable-power adaptive modulation is employed over both block fading and Markov correlated fading channels. Expand
The wire-tap channel
  • A. Wyner
  • Computer Science
  • The Bell System Technical Journal
  • 1975
TLDR
This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy. Expand
Effective capacity: a wireless link model for support of quality of service
  • D. Wu, R. Negi
  • Computer Science
  • IEEE Trans. Wirel. Commun.
  • 2003
TLDR
This paper proposes and develops a link-layer channel model termed effective capacity (EC), which first model a wireless link by two EC functions, namely, the probability of nonempty buffer, and the QoS exponent of a connection, and proposes a simple and efficient algorithm to estimate these EC functions. Expand
Quality of Service Analysis for Wireless User-Cooperation Networks
TLDR
A simple user-cooperation scheme is shown to significantly enlarge the achievable rate-region of the service constrained communication system, provided that the quality of the wireless link between cooperating users is better than the individual connections from the users to the intended destination. Expand
Cross-Layer-Model Based Adaptive Resource Allocation for Statistical QoS Guarantees in Mobile Wireless Networks
  • Jia Tang, Xi Zhang
  • Computer Science
  • IEEE Transactions on Wireless Communications
  • 2008
TLDR
The analyses indicate that the proposed resource-allocation algorithms are shown to be able to efficiently support the diverse QoS requirements for various real-time mobile users over different wireless channels and to be robust to the CSI feedback delay. Expand
Cross-Layer-Model Based Adaptive Resource Allocation for Statistical QoS Guarantees in Mobile Wireless Networks
TLDR
The analyses indicate that the proposed resource-allocation algorithms are shown to be able to efficiently support the diverse QoS requirements for various real-time mobile users over different wireless channels and to be robust to the CSI feedback delay. Expand
Wireless communications
TLDR
This book aims to provide a chronology of key events and individuals involved in the development of microelectronics technology over the past 50 years and some of the individuals involved have been identified and named. Expand
Convex Optimization
TLDR
A comprehensive introduction to the subject of convex optimization shows in detail how such problems can be solved numerically with great efficiency. Expand
...
1
2
...