Secrecy throughput of wireless interference networks with uncertain channel state information

Z. Sheng, H. D. Tuan, A. A. Nasir, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the access of channel state information are considered: perfect channel state information, partial channel state information with channels from the transmitters to the eavesdropper exponentially distributed, and imperfectly known channels between the transmitters and the users with exponentially distributed errors. The paper develops various path-following procedures of low complexity and rapid convergence for the optimal power allocation. Their effectiveness and viability are illustrated through numerical examples. The power allocation schemes are shown to achieve high secrecy throughput.

Original languageEnglish (US)
Title of host publication2017 IEEE Globecom Workshops, GC Wkshps 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-7
Number of pages7
ISBN (Electronic)9781538639207
DOIs
StatePublished - Jul 2 2017
Event2017 IEEE Global Telecommunications Conference, GC 2017 - Singapore, Singapore
Duration: Dec 4 2017Dec 8 2017

Publication series

Name2017 IEEE Globecom Workshops, GC Wkshps 2017 - Proceedings
Volume2018-January

Other

Other2017 IEEE Global Telecommunications Conference, GC 2017
Country/TerritorySingapore
CitySingapore
Period12/4/1712/8/17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Keywords

  • Interference network
  • Path-following algorithms
  • Power allocation
  • Secure communication

Fingerprint

Dive into the research topics of 'Secrecy throughput of wireless interference networks with uncertain channel state information'. Together they form a unique fingerprint.

Cite this