Font Size: a A A

Research On Security Guaranteed Wireless Resources Management Technologies

Posted on:2018-01-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:L JiangFull Text:PDF
GTID:1318330518994735Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless communication technologies,varieties of wireless networks are emerging. Network security is a core problem which has gotten more attention. Traditionally, the cryptographic techniques have been employed to protect the communication confidentiality against eavesdropping attacks, which, however, increases communication overheads and introduces additional system complexity for the secret key distribution and management.As an alternative, physical layer security (PLS) has emerged as a new secure communication method which is identified as a promising strategy that provides secure wireless transmissions by smartly exploiting the imperfections of the communications medium and by jointly considering the rich physical transmission technologies, including multiple antenna technologies, cooperative relaying technologies, channel encoding technologies and multiple carriers technologies. With careful planning and execution, physical layer security will protect the communication phase of the network while cryptography will protect the processed data after the communication phase. As such, they will form a well-integrated security solution that efficiently safeguards sensitive and confidential data for the wireless networks.This thesis proposes a new security architecture which includes three domains: the physical domain, the energy domain and the social domain.The newly secure information transmission schemes are proposed in each of these domains. The main contributions of this paper include the following aspects.Firstly, this thesis begins with considering the secure tranmission of the secondary systems in the underlaid cognitive multiple relay networks,where the confidential messages sent to the secondary reciever may be eavesdropped by the potential eavesdroppers (illegal users). In this case, a relay selection scheme is proposed which jointly considers the best relay selection and dynamic power allocation in order to maximize secrecy rate(SR) and to minimize energy consumption. Moreover, the finite-state Markov channels, the residual relay energy and the occupancy of the primary spectrum are jointly considered in the relay selection and power allocation process. Specifically, the formulation of the proposed relay selection and power allocation scheme is based on the restless bandit problem, which is solved by the primal-dual index heuristic algorithm.Numerical results are presented to show our proposed scheme has the maximum SR and minimum energy consumption compared to the existing ones.Secondly, a cooperation scenario between a primary system and a wireless-powered secondary system is considered. In particular, we focus on secure information tranmission for the primary system in the presence of untrusted secondary user and potential eavesdroppers. We aim to design a secure beamforming strategy to maximize the secondary system data rate while guaranteeing the secondary transmitter power constraint and the secrecy quality of service (QoS) requirement of the primary system. The resulting optimization problem is non-convexity in general.We propose a computationally efficient approximation algorithm based on a two-stage procedure. Simulation results demonstrate our proposed secure beamforming strategy achieves a significant transmission rate of the secondary system while provides a positive secrecy rate for the primary system.Furthermore, we consider the cooperative cognitive device-to-device(D2D) networks. we focus on secure information transmission for the cellular users when the energy harvesting idle D2D users are the potential eavesdroppers. We aim to design secure beamforming to maximize the D2D users data rate while guaranteeing the secrecy rate requirements of the cellular users and the minimum required amounts of power transferred to the idle D2D users. To solve this non-convex problem, a semi-definite relaxation (SDR) approach is adopted to obtain the optimal solution. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the D2D users while provides a high secrecy rate for the cellular users and facilitates efficient power transfer for the idle D2D users.At last, in the cooperative relaying network, the confidential information of the source may be eavesdropped by an untrusted relay who is relaying the signal. Thus, we proposed a social closeness-aware energy harvesting D2D secure relaying scheme, which aims to maximize the D2D network throughput meeting the physcial distance, energy harvesting amount of the relay and the social closeness constraints. A heuristic algorithm is proposed to solve the above optimization problem.Numerical results verify that the proposed scheme can achieve significant D2D relaying throughput.Furthermore, we considered energy harvesting D2D secure broadcasting scenario, the confidential information of the cluster may be eavesroppered by the untrusted members. Thus, we proposed a social community-aware energy harvesting D2D secure broadcasting scheme,which aims to maximize the community data rate meeting the constriants of the physcial distance between the cluster and the member, energy harvesting amount of the cluster and the closeness between the cluster and the member. A heuristic algorithm is proposed to solve the above optimization problem. Numerical results verify the effectiveness of the proposed scheme.
Keywords/Search Tags:Wireless Networks, Cooperative Relaying, Social Networks, Physical Layer Security, Energy Harvesting
PDF Full Text Request
Related items