• ### Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers(1803.02412)

March 6, 2018 cs.IT, math.IT, cs.NI
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clusters, we consider artificial-noise-aided beamforming at the source node. Moreover, FD relay jamming is adopted to improve the system's security. To maintain secure communications against the untrusted relay node, a FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. Numerical results show that the optimal power allocation factor between data and artificial noise depends on the total number of antennas of the different colluding eavesdropping clusters.
• ### Securing OFDM-Based Wireless Links Using Temporal Artificial-Noise Injection(1803.00211)

March 1, 2018 cs.IT, math.IT, cs.NI
We investigate the physical layer security of wireless single-input single-output orthogonal-division multiplexing (OFDM) when a transmitter, which we refer to as Alice, sends her information to a receiver, which we refer to as Bob, in the presence of an eavesdropping node, Eve. To prevent information leakage, Alice sends an artificial-noise (AN) signal superimposed over her information signal. We investigate the impact of the channel delay spread, OFDM cyclic prefix, information/AN power allocation, and information and AN precoders design on the achievable average secrecy rate. We consider the two cases of known and unknown channel state information (CSI) at Alice. Furthermore, we compare both cases of per-sub-channel processing and joint sub-channels processing at Eve's receiver. Our numerical results show the gain of AN injection in terms of average secrecy rate for different OFDM operating conditions. Moreover, based on our new insights, we demonstrate that the AN-aided scheme is effective and achieves almost the same average secrecy rate as the full-CSI case without the need for Eve's instantaneous CSI at Alice.
• ### A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks(1803.00210)

March 1, 2018 cs.IT, math.IT, cs.NI
We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to encrypt some data symbols which are then multiplexed in the frequency domain with the remaining unencrypted data symbols. To secure the unencrypted data symbols, Alice transmits an artificial-noise (AN) signal superimposed over her data signal. We propose a three-level optimization procedure to increase the average secrecy rate of this wiretap channel by optimizing the transmit power allocation between the encrypted data symbols, unencrypted data symbols and the AN symbols. Our numerical results show that the proposed scheme achieves considerable secrecy rate gains compared to the benchmark cases
• ### Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation(1801.02609)

Jan. 8, 2018 cs.IT, math.IT, cs.NI
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
• ### Secure Beamforming in Full-Duplex SWIPT Systems(1709.06623)

Sept. 19, 2017 cs.IT, math.IT
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
• ### Thresholds Optimization for One-Bit Feedback Multi-User Scheduling(1708.09551)

Aug. 31, 2017 cs.IT, math.IT, cs.NI
We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed scheme is very close to the sum rate of the full channel state information case, which is the upper bound performance.
• ### Achievable Rates of Buffer-Aided Full-Duplex Gaussian Relay Channels(1704.02596)

Aug. 2, 2017 cs.IT, math.IT, cs.NI
We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI channel where the RSI changes from one symbol duration to another within the codeword. We show that the RSI can be completely eliminated in the slow-RSI case when the FD relay is equipped with a buffer while the fast RSI cannot be eliminated. For the fixed-rate data transmission scenario, we derive the optimal transmission strategy that should be adopted by the source node and relay node to maximize the system throughput. We verify our analytical findings through simulations.
• ### Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems(1706.06225)

June 20, 2017 cs.IT, math.IT, cs.NI
This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdropping. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and average secrecy rate of the legitimate system. It is assumed that the legitimate transmitter knows the full channel information of the legitimate transceivers but does not know the instantaneous channel state information of the passive eavesdropper. Closed-form expressions for the secrecy rate and average secrecy rate are derived for the asymptotic case with a large number of transmit antennas. We also investigate 1) the power allocation between the data and the AN; 2) the power allocation between the spatial and the temporal AN. Computer simulations are carried out to evaluate the performance of our proposed artificial noise scheme.
• ### Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair(1706.05442)

June 16, 2017 cs.IT, math.IT, cs.NI
We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the random data arrival behavior at the transmitter and the channel randomness of the legitimate link can improve the system's security. Moreover, we design a jamming scheme for the attacker and investigate its impact on the secure throughput of the legitimate system. The attacker designs his power splitting parameter and jamming/eavesdropping probability based on the energy state of the attacker's battery to minimize the secure throughput of the legitimate system.
• ### Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks(1706.03444)

June 12, 2017 cs.IT, math.IT, cs.NI
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.
• ### A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the Presence of an Eavesdropper(1612.08067)

Dec. 23, 2016 cs.IT, math.IT, cs.NI
We propose a simple yet efficient scheme for a set of energy-harvesting sensors to establish secure communication with a common destination (a master node). An eavesdropper attempts to decode the data sent from the sensors to their common destination. We assume a single modulation scheme that can be implemented efficiently for energy-limited applications. We design a multiple-access scheme for the sensors under secrecy and limited-energy constraints. In a given time slot, each energy-harvesting sensor chooses between sending its packet or remaining idle. The destination assigns a set of data time slots to each sensor. The optimization problem is formulated to maximize the secrecy sum-throughput.
• ### Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks(1612.08076)

Dec. 23, 2016 cs.IT, math.IT, cs.NI
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time slot to the secondary nodes to send their data and to power the energy-harvesting primary transmitter from the secondary radio-frequency signals. During the second stage, the primary transmitter sends its data to its destination and to the secondary nodes. During the third stage, the secondary nodes amplify and forward the primary data. We propose five different schemes for secondary access and powering the primary transmitter. We derive closed-form expressions for the primary and secondary rates for all the proposed schemes. Two of the proposed schemes use distributed beamforming to power the primary transmitter. We design a sparsity-aware relay-selection scheme based on the compressive sensing principles. Our numerical results demonstrate the gains of our proposed schemes for both the primary and secondary systems.
• ### An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems(1612.06056)

Dec. 19, 2016 cs.IT, math.IT, cs.NI
We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables the legitimate transmitter to send artificial-noise (AN) vectors in a way such that the interference can be canceled at the legitimate receiver prior to information decoding. Secondly, its power is used to energize the legitimate receiver. We optimize the cyclic prefix length, the time-switching and power-splitting parameters, and the power allocation ratio between the data and AN signals at the legitimate transmitter to maximize the average secrecy rate subject to a constraint on the average energy transfer rate at the legitimate receiver. Our numerical results demonstrate that our proposed scheme can achieve up to 23% average secrecy rate gain relative to a pure power-splitting scheme.
• ### Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying~System(1612.05881)

Dec. 18, 2016 cs.IT, math.IT, cs.NI
This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying strategies, namely randomize-and-forward and decode-and-forward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.
• ### Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks(1612.05885)

Dec. 18, 2016 cs.IT, math.IT, cs.NI
In this letter, we investigate the security of a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropper. The batteries at the legitimate transmitting nodes (i.e. the source node and the jamming node) are assumed to be limited in capacity and are modeled as queueing systems. We investigate the impact of the energy arrival rates at the batteries on the achievable secrecy rates. In our energy-constrained network, we propose an efficient scheme to enhance the system's security by optimizing the transmission times of the source node. The jammer uses a subset of its antennas (and transmit radio-frequency chains) to create a beamformer which maximizes the system's secrecy rate while completely canceling the artificial noise at the legitimate destination. Our numerical results demonstrate the significant average secrecy rate gain of our proposed scheme.
• ### Secure Communications in the Presence of a Buffer-Aided Wireless-Powered Relay With Self-Energy Recycling(1612.05887)

Dec. 18, 2016 cs.IT, math.IT, cs.NI
We consider a relay-assisted wireless network, where the energy-harvesting buffer-aided relay node is powered by radio-frequency signals from a source node wishing to communicate with its destination. We propose two secure cooperative protocols for a network composed of a source node equipped with a data buffer communicating with its destination in the presence of a buffer-aided relay node and an eavesdropper. Our proposed protocols are designed based on the channel state information and the buffer state information at the source and relay nodes. The burstiness of data at the source node queue (buffer) and the energy recycling process at the relay are taken into account in our analysis. In addition, we take the decoding and signal processing circuit power consumption constraints into consideration. For the limiting case of an infinite-size battery at the relay, we derive a sufficient condition for the energy queue to saturate. Our numerical results demonstrate the throughput gains of our proposed protocols.
• ### Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks With Node Buffers(1612.05715)

Dec. 17, 2016 cs.NI
This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters in a given frame is much smaller than the number of users, which is the case when the arrival rates to the queues are very small and the number of users is large. If the network is not naturally sparse, we design the user requests to be sparse such that only few requests are sent to the destination. We refer to the detected nonempty-queue transmitters in a given frame as frame owners. Our design goal is to minimize the nodes' total transmit power in a given frame. In the case of unslotted-time data transmission, the optimization problem is shown to be a convex optimization program. We propose an approximate formulation to simplify the problem and obtain a closed-form expression for the assigned time durations to the nodes. The solution of the approximate optimization problem demonstrates that the time duration assigned to a node in the set of frame owners is the ratio of the square-root of the buffer occupancy of that node to the sum of the square-roots of each occupancy of all the frame owners. We then investigate the slotted-time data transmission scenario, where the time durations assigned for data transmission are slotted. In addition, we show that the full-duplex capability of a node increases the data transmission portion of the frame and enables a distributed implementation of the proposed schemes.
• ### Cognitive Access Protocol for Alleviating Sensing Errors in Cognitive Multiple-Access Systems(1610.09449)

Oct. 29, 2016 cs.IT, math.IT, cs.NI
This letter studies a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. We propose a novel secondary access protocol which alleviates sensing errors and detects the availability of primary channels with the highest ability of detection. Under the proposed protocol, the SU may access the channel at one of a predefined instants within the time slot each of which associated with a certain access probability that changes based on the sensing outcome. There is also a possibility of accessing the channel at the beginning of the time slot without channel sensing. The optimization problem is stated such that the secondary throughput is maximized under stability of the primary queue and a constraint on the primary queueing delay. Numerical results demonstrate the beneficial gains of the proposed protocol in terms of secondary throughput.
• ### Optimal Spectrum Access for a Rechargeable Cognitive Radio User Based on Energy Buffer State(1409.1272)

Sept. 3, 2014 cs.IT, math.IT, cs.NI
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. We investigate the effect of the energy arrival rate, the amount of energy per energy packet, and the capacity of the energy queue on the SU throughput under fading channels. Results reveal that the proposed access strategy can enhance the performance of the SU.
• ### On Spectrum Sharing Between Energy Harvesting Cognitive Radio Users and Primary Users(1407.7267)

July 30, 2014 cs.IT, math.IT, cs.NI
This paper investigates the maximum secondary throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of both the PU and SU. Furthermore, we study the impact of the bursty arrivals at the PU on the energy harvested by the SU from RF transmissions. Moreover, we investigate the impact of the rate of energy harvesting from natural resources on the SU throughput. We assume fading channels and compute exact closed-form expressions for the energy harvested by the SU under fading. Results reveal that the proposed power allocation policy along with the implemented RF energy harvesting at the SU enhance the throughput of both primary and secondary links.
• ### On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation(1307.4744)

July 28, 2014 cs.IT, math.IT, cs.NI
In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for storing its own packets and the other for storing the fraction of the undelivered primary packets accepted for relaying. The secondary source is assumed to be a battery-based node which harvests energy packets from the environment. In addition to its data queues, the SU has an energy queue to store the harvested energy packets. The secondary energy packets are used for primary packets decoding and data packets transmission. More specifically, if the secondary energy queue is empty, the secondary source can neither help the primary source nor transmit a packet from the data queues. The energy queue is modeled as a discrete time queue with Markov arrival and service processes. Due to the interaction of the queues, we provide inner and outer bounds on the stability region of the proposed system. We investigate the impact of the energy arrival rate on the stability region. Numerical results show the significant gain of cooperation.
• ### On Orthogonal Band Allocation for Multi-User Multi-Band Cognitive Radio Networks: Stability Analysis(1405.2815)

July 27, 2014 cs.IT, math.IT, cs.NI
In this work, we study the problem of band allocation of $M_s$ buffered secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$ buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization problem used to obtain the stability region's envelope (closure) is established and is shown to be a linear program which can be solved efficiently and reliably. We compare our orthogonal allocation system with two typical low-complexity and intuitive band allocation systems. In one system, each cognitive user chooses a band randomly in each time slot with some assignment probability designed such that the system maintained stable, while in the other system fixed (deterministic) band assignment is adopted throughout the lifetime of the network. We derive the stability regions of these two systems. We prove mathematically, as well as through numerical results, the advantages of our proposed orthogonal system over the other two systems.
• ### Energy-Efficient Cooperative Cognitive Relaying Protocols for Full-Duplex Cognitive Radio Users and Delay-Aware Primary Users(1406.2255)

July 8, 2014 cs.IT, math.IT, cs.NI
This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop two protocols which involve cooperation between primary and secondary users. To satisfy certain quality of service requirements, users share time slot duration and frequency bandwidth. Moreover, the secondary user (SU) may leverage the primary feedback signal. The proposed protocols are designed such that the secondary rate is maximized and the primary queueing delay is maintained less than the queueing delay in case of non-cooperative PU. In addition, the proposed protocols guarantee the stability of the primary queue and maintain the average energy emitted by the CR user below a certain value. The proposed protocols also provide more robust and potentially continuous service for SUs compared to the conventional practice in cognitive networks where SUs transmit in the spectrum holes and silence sessions of the PUs. We include primary source burstiness, sensing errors, and feedback reception errors to the analysis of the proposed cooperative cognitive protocols. Numerical results show the beneficial gains of the cooperative protocols in terms of secondary rate and primary throughput, queueing delay, and average energy savings.
• ### Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal(1405.2814)

July 8, 2014 cs.NI
In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total channel bandwidth into two orthogonal subbands and assigns each to a queue probabilistically. We show the advantage of the proposed protocol over the prioritized cognitive relaying (PCR) protocol in which the SU assigns a priority in transmission to the primary packets over its own packets. We present two problem formulations, one based on throughput and the other on delay. Both optimization problems are shown to be linear programs for a given bandwidth assignment. Numerical results demonstrate the benefits of the proposed protocol.
• ### Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks(1404.1113)

July 8, 2014 cs.IT, math.IT, cs.NI
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle.