Opportunistic user scheduling and beamforming for physical layer security in multicast and interference networks멀티캐스트 및 간섭 네트워크에서 물리 계층 보안을 위한 기회주의적 사용자 스케줄링 및 빔 형성 방법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 150
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorChoi, Wan-
dc.contributor.advisor최완-
dc.contributor.authorLee, Jae-Hwan-
dc.date.accessioned2021-05-11T19:38:18Z-
dc.date.available2021-05-11T19:38:18Z-
dc.date.issued2019-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=871448&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/283274-
dc.description학위논문(박사) - 한국과학기술원 : 전기및전자공학부, 2019.8,[iv, 73 p. :]-
dc.description.abstractIn this dissertation, we study the transmission schemes for physical layer security in the single-cell multicast network with wireless information and power transfer, and the bursty interference network with opportunistic user scheduling. In the multiuser scenario, one of severe problems is the inter-group/user interference, which significantly degrades the reliable transmission quality in general. For this reason, a critical issue for multiuser networks is to resolve the inter-group/user interference issue. Interestingly, in two specific multiuser networks where we want to consider, the inter-group/user interference might be beneficial in terms of secure transmissions. As described above, it is very important to deal with the inter-group/user interference properly since it has both advantage and disadvantage simultaneously for reliable and secure transmissions. In this dissertation, we propose novel secure transmission schemes to solve the challenging inter-group/user interference problem in two specific multiuser networks by utilizing the artificial noise (AN) aided transmit beamforming and the opportunistic user scheduling, respectively. The main focus of this dissertation is to improve physical layer security, which is essential for reliable and secure transmissions. To this end, we adopt the secrecy rate criterion for physical layer security. We resolve the interference issue as well as enhance network performance by minimizing the transmit power under the secrecy rate constraint in the single-cell multicast network with wireless information and power transfer, and maximizing the ergodic secrecy rate per transmitter-receiver pair in the bursty interference network with opportunistic user scheduling. Firstly, we address the AN aided transmit beamforming problem for physical layer security in a multiple-input single-output (MISO) single-cell multicast network with wireless information and power transfer. To solve the inter-group interference issue and minimize the transmit power, we derive the closed-form suboptimal beamforming based on the null-space beamforming. The suboptimal beamforming is shown to be optimal when the number of transmit antennas goes to infinity. To further improve the performance in the finite regime of the number of transmit antennas, we propose an efficient iterative algorithm based on the successive convex approximation. Secondly, we investigate the opportunistic user scheduling problem for physical layer security in a MISO symmetric bursty interference network. To solve the inter-user interference issue, we propose a signal-to-interference-plus-noise ratio (SINR) based opportunistic transmission scheme. Then, the ergodic secrecy rate per transmitter-receiver pair is mathematically analyzed. To obtain the achievable ergodic secrecy rate per transmitter-receiver pair, we also propose a two-level iterative algorithm based on the golden section search and the damped Newton method. Thirdly, we consider the opportunistic user scheduling problem for physical layer security in a MISO asymmetric bursty interference network. To solve the inter-user interference issue, we propose a SINR based opportunistic transmission scheme. Then, the ergodic secrecy rate per transmitter-receiver pair is mathematically analyzed. Using the derived analytical expression, the achievable ergodic secrecy rate per transmitter-receiver pair is obtained through a proposed two-level iterative algorithm based on the interior point method and the damped Newton method. To catch more insights behind the mathematical expressions, we analyze asymptotic characteristics of the achievable ergodic secrecy rate per transmitter-receiver pair in interference limited and nose limited scenarios. Our analytic and numerical results verify the gains of the proposed schemes compared to the conventional or benchmark schemes.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectBursty interference network▼aergodic secrecy rate▼amulticast network▼aopportunistic user scheduling▼aphysical layer security▼awireless information and power transfer-
dc.subject버스티 간섭 네트워크▼a에르고딕 비밀 전송량▼a멀티캐스트 네트워크▼a기회주의적 사용자 스케줄링▼a물리 계층 보안▼a무선 정보 및 전력 전송-
dc.titleOpportunistic user scheduling and beamforming for physical layer security in multicast and interference networks-
dc.title.alternative멀티캐스트 및 간섭 네트워크에서 물리 계층 보안을 위한 기회주의적 사용자 스케줄링 및 빔 형성 방법-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전기및전자공학부,-
dc.contributor.alternativeauthor이재환-
Appears in Collection
EE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0