Abstract
In the new generation wireless communication systems, when multiple users are served, information security among them should be considered to protect each user’s privacy. In this case, physical layer security techniques can be adopted for this mutual confidence problem. Unlike other traditional physical layer security methods, the proposed scheme improves secrecy rate with the information of users’ access statuses (i.e., being served or idle), and it is denoted as SRT-AS. In the SRT-AS, appropriate parameters expressing users’ actual access statuses are introduced, and an adaptive transmitter and receiver design strategy is used to increase security. It can be found that no iterative process is included in the SRT-AS, moreover, performance analysis and simulation results illustrate that the SRT-AS is feasible for the multi-user system.
The research reported in this paper was supported in part by the National Natural Science Foundation of China (NSFC) under Grant No. 61431011, and the Opening Project of Key Laboratory of Cognitive Radio and Information Processing (Guilin University of Electronic Technology), Ministry of Education, under Grant No. 2013KF04.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
3GPP (v 0.0.6).: Overview of 3GPP Release 13 (2014)
Zhu, H.J., Du, S.G., Gao, Z.Y., Dong, M.X., Cao, Z.F.: A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22–32 (2014)
Xu, Q.C., Su, Z., Han, B., Fang, D.F., Xu, Z.J., Gan, X.Y.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. (2015). doi:10.1007/s12083-015-0330-6
Su, Z., Xu, Q.C., Zhu, H.J., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)
Calabuig, J., Monserrat, J.F., Gomez-Barquero, D.: 5th generation mobile networks: a new opportunity for the convergence of mobile broadband and broadcast services. IEEE Commun. Mag. 53(2), 198–205 (2015)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1550–1573 (2014)
Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. proc. ieee. 100(11), 3056–3076 (2012)
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Renzo, M.D.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)
Zhang, J., Yuen, C., Wen, C.K., Jin, S., Gao, X.: Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: large system analysis. IEEE Commun. Lett. 18(9), 1627–1630 (2014)
Fakoorian, S.A.A., Swindlehurst, A.L.: On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J. Sel. Areas Commun. 31(9), 1701–1713 (2013)
Geraci, G., Couillet, R., Yuan, J., Debbah, M., Collings, I.B.: Large system analysis of linear precoding in MISO broadcast channels with confidential messages. IEEE J. Sel. Areas Commun. 31(9), 1660–1671 (2013)
Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.B.: Secrecy sumrates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472–3482 (2012)
Liu, R., Liu, T., Poor, H.V., Shamai, S.: Multiple-input multiple-output Gaussian broadcast channels with confidential messages. IEEE Trans. Inf. Theory 56(9), 4215–4227 (2010)
Jungnickel, V., Manolakis, K., Zirwas, W., et al.: The role of small cells, coordinated multipoint, and massive MIMO in 5G. IEEE Commun. Mag. 52(5), 44–51 (2014)
Ho, W.W.L., Quek, T.Q.S., Sun, S., Heath, R.W.: Decentralized precoding for multicell MIMO downlink. IEEE Trans. Wirel. Commun. 10(6), 1798–1809 (2011)
Lutkepohl, H.: Handbook of Matrixes. Wiley, Chichester (1997)
Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. The John Hopkins University Press, Baltimore (1996)
Li, Q., Yang, Y., Ma, W.K., Lin, M., Ge, J.H., Lin, J.R.: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 63(1), 206–220 (2015)
3GPP TS 36.104 (v11.3.0).: Evolved universal terrestrial radio access (E-UTRA); Base station (BS) radio transmission and reception. Release 11 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Xu, D., Ren, P., Du, Q., Sun, L. (2015). Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_62
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_62
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)