DocumentCode :
1518951
Title :
Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints
Author :
Qiao, Deli ; Gursoy, Mustafa Cenk ; Velipasalar, Senem
Author_Institution :
Dept. of Electr. Eng., Univ. of Nebraska-Lincoln, Lincoln, NE, USA
Volume :
6
Issue :
3
fYear :
2011
Firstpage :
628
Lastpage :
639
Abstract :
In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect channel side information (CSI) is available at both the transmitter and the receivers. Initially, the scenario in which the transmitter sends common messages to two receivers and confidential messages to one receiver is considered. For this case, the effective secure throughput region, which is the region of constant arrival rates of common and confidential messages that can be supported by the buffer-constrained transmitter and fading broadcast channel, is defined. It is proven that this effective throughput region is convex implying that time-sharing between any two viable transmission and power control strategies results in effective throughput values inside the region. Then, the optimal power control policies that achieve the boundary points of the effective secure throughput region are investigated and an algorithm for the numerical computation of the optimal power adaptation schemes is provided. Additionally, the throughput region achieved by time-division multiplexing of common and confidential messages is explored. Subsequently, the special case in which the transmitter sends only confidential messages to one receiver is addressed in more detail. For this case, effective secure throughput is formulated and two different power adaptation policies are studied. These power adaptation policies are compared with the opportunistic ones that are optimal in the absence of quality of service (QoS) constraints. It is shown that opportunistic schemes, in which data transmission with high rates and high power occurs only when the main channel is much better than the eavesdropper channel, are no longer optimal under buffer constraints, and the transmitter should sen- - d the data at a certain moderate rate and power even when the main channel strength is comparable to that of the eavesdropper channel to avoid buffer overflows.
Keywords :
broadcast channels; fading channels; optimal control; power control; quality of service; queueing theory; radio receivers; radio transmitters; telecommunication security; time division multiplexing; buffer-constrained transmitter; channel side information; confidential messages; eavesdropper channel; fading broadcast channels; optimal power control; power adaptation policies; quality of service; secure wireless communication; statistical queueing constraints; throughput region; time-division multiplexing; time-sharing; Fading; Power control; Quality of service; Receivers; Signal to noise ratio; Throughput; Transmitters; Effective secure throughput; information-theoretic security; optimal power control; quality of service (QoS) constraints; secure broadcasting; superposition coding; time-division multiplexing (TDM);
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2011.2155650
Filename :
5770214
Link To Document :
بازگشت