Enhanced secure multicast: Joint power allocation and beamforming design based on user clustering

Shengyu Li, Wenjun Xu, Xuemei Zhou, Jiaru Lin
{"title":"Enhanced secure multicast: Joint power allocation and beamforming design based on user clustering","authors":"Shengyu Li, Wenjun Xu, Xuemei Zhou, Jiaru Lin","doi":"10.1109/WCSP.2015.7340995","DOIUrl":null,"url":null,"abstract":"As communication security has become a critical problem in current wireless networks, physical layer security has attracted more and more research interest However, due to the large number of receiving users, traditional physical layer security techniques, e.g., artificial-noise-aided transmit beamforming, do not apply well to multicast transmission. To cope with this problem, an enhanced secure multicast scheme is proposed in this paper, in which multicast users with close channel vectors are divided into a cluster and different clusters are served on different channels. Based on this scheme, a heuristic user clustering algorithm and a joint power allocation and beamforming design algorithm are presented to maximize the globally achievable secure multicast rate. Simulation results show that the enhanced scheme can support a much higher secure transmission rate than traditional secure multicast schemes, and the proposed joint power allocation and beamforming design algorithm outperforms existing exhaustive searching methods greatly in terms of computation complexity.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP.2015.7340995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

As communication security has become a critical problem in current wireless networks, physical layer security has attracted more and more research interest However, due to the large number of receiving users, traditional physical layer security techniques, e.g., artificial-noise-aided transmit beamforming, do not apply well to multicast transmission. To cope with this problem, an enhanced secure multicast scheme is proposed in this paper, in which multicast users with close channel vectors are divided into a cluster and different clusters are served on different channels. Based on this scheme, a heuristic user clustering algorithm and a joint power allocation and beamforming design algorithm are presented to maximize the globally achievable secure multicast rate. Simulation results show that the enhanced scheme can support a much higher secure transmission rate than traditional secure multicast schemes, and the proposed joint power allocation and beamforming design algorithm outperforms existing exhaustive searching methods greatly in terms of computation complexity.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
增强安全组播:基于用户聚类的联合功率分配和波束成形设计
随着通信安全问题日益成为当前无线网络中的关键问题,物理层安全问题越来越受到人们的关注,但由于接收用户数量庞大,传统的物理层安全技术,如人工噪声辅助发射波束成形等,在组播传输中应用效果不佳。为了解决这一问题,本文提出了一种增强的安全组播方案,该方案将信道矢量接近的组播用户划分为一个簇,在不同的信道上服务不同的簇。在此基础上,提出了启发式用户聚类算法和联合功率分配与波束形成设计算法,以实现全局可达安全组播速率的最大化。仿真结果表明,改进后的方案比传统的安全组播方案支持更高的安全传输速率,所提出的联合功率分配和波束形成设计算法在计算复杂度方面大大优于现有的穷举搜索方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blind recognition of BCH code based on Galois field fourier transform Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks A modified distributed target localization scheme in the presence of Byzantine attack Outage performance analysis of amplify-and-forward cognitive relay networks with partial relay selection Performance comparison of subharnomic and Zernike polynomials method for compensation of low-frequency components in FFT-based Von Karman phase screen
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1