Achievable Ergodic Secrecy Rate in Bursty Interference Channels with Opportunistic User Scheduling

Cited 4 time in webofscience Cited 2 time in scopus
  • Hit : 396
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Jae Hwanko
dc.contributor.authorKim, Hyung-Myungko
dc.contributor.authorChoi, Wanko
dc.date.accessioned2019-12-13T07:24:03Z-
dc.date.available2019-12-13T07:24:03Z-
dc.date.created2019-11-05-
dc.date.created2019-11-05-
dc.date.created2019-11-05-
dc.date.issued2019-11-
dc.identifier.citationIEEE TRANSACTIONS ON COMMUNICATIONS, v.67, no.11, pp.7686 - 7699-
dc.identifier.issn0090-6778-
dc.identifier.urihttp://hdl.handle.net/10203/268893-
dc.description.abstractThis paper studies secure transmissions in a bursty interference channel constructed by opportunistic user scheduling. To improve the physical layer security, we propose a signal-to-noise-plus-interference ratio (SINR) based opportunistic transmission scheme and mathematically analyze the ergodic secrecy rate per transmitter-receiver pair. In this scheme, a subset among $K$ transmitter-receiver pairs is selected opportunistically, but each transmitter determines its activation state based on limited feedback of the SINR from its designated receiver only, without any information from other transmitters. For comparison, we also analyze the ergodic secrecy rates per transmitter-receiver pair for two benchmark schemes: non-opportunistic transmission and random transmission. Using derived analytical expressions, the achievable ergodic secrecy rates per transmitter-receiver pair are obtained by optimizing the activation probability for each scheme. To solve the non-convex optimization problem, we first show that the objective function is a sum of quasi-concave functions. Then, leveraging this fact, we propose a two-level iterative algorithm based on the damped Newton method. Furthermore, asymptotic behaviors of the achievable ergodic secrecy rate per transmitter-receiver pair are analyzed to offer insights behind the mathematical expressions. Our analytical and numerical results exhibit the gain of the proposed SINR based opportunistic transmission scheme compared to the benchmark schemes.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleAchievable Ergodic Secrecy Rate in Bursty Interference Channels with Opportunistic User Scheduling-
dc.typeArticle-
dc.identifier.wosid000512366100023-
dc.identifier.scopusid2-s2.0-85075593760-
dc.type.rimsART-
dc.citation.volume67-
dc.citation.issue11-
dc.citation.beginningpage7686-
dc.citation.endingpage7699-
dc.citation.publicationnameIEEE TRANSACTIONS ON COMMUNICATIONS-
dc.identifier.doi10.1109/TCOMM.2019.2935196-
dc.contributor.localauthorKim, Hyung-Myung-
dc.contributor.localauthorChoi, Wan-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorBursty interference channel-
dc.subject.keywordAuthorergodic secrecy rate-
dc.subject.keywordAuthoropportunistic user scheduling-
dc.subject.keywordAuthorphysical layer security-
dc.subject.keywordPlusARTIFICIAL NOISE-
dc.subject.keywordPlusBROADCAST CHANNELS-
dc.subject.keywordPlusWIRELESS NETWORKS-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0