4.7 Article

Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems

期刊

IEEE TRANSACTIONS ON SIGNAL PROCESSING
卷 64, 期 15, 页码 4050-4064

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSP.2016.2558164

关键词

Physical layer security; distributed antenna systems; artificial noise; random matrix theory; non-convex optimization

资金

  1. Foundation for the Author of National Excellent Doctoral Dissertation of China [201340]
  2. New Century Excellent Talents Support Fund of China [NCET-13-0458]
  3. National High-Tech Research and Development Program of China [2015AA01A708]
  4. Fok Ying Tong Education Fund [141063]
  5. Young Talent Support Fund of Science and Technology of Shaanxi Province [2015KJXX-01]
  6. MEST, NRF, Korea [R1A2A1A05000977]

向作者/读者索取更多资源

This paper studies the artificial noise (AN) assisted secure transmission for a distributed antenna systems (DAS). To avoid a significant overhead caused by full legitimate channel state information (CSI) acquisition, tracking and collection in the central processor, we propose a distributed AN scheme utilizing the large-scale CSI of the legitimate receiver and eavesdropper. Our objective is to maximize the ergodic secrecy rate (ESR) via optimizing the power allocation between the confidential signal and AN for each remote antenna (RA) under the per-antenna power constraint. Specifically, exploiting random matrix theory, we first establish an analytical expression of the achievable ESR, which leads to a non-convex optimization problem with multiple non-convex constraints in the form of high-order fixed-point equations. To handle the intractable constraints, we recast it into a max-min optimization problem, and propose an iterative block coordinate descent (BCD) algorithm to provide a stationary solution. The BCD algorithm is composed of three subproblems, where the first two subproblems are convex with closed-form solutions, and the last one is a convex-concave game whose saddle-point is located by a tailored barrier algorithm. Simulation results validate the effectiveness of the proposed iterative algorithm and show that our scheme not only reduces the system overhead greatly but also maintains a good secrecy performance.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据