{"title":"针对窃听者合谋的rsma通信安全可靠性权衡","authors":"Huiyun Xia, Xiaokang Zhou, Shuai Han, Cheng Li","doi":"10.1109/LWC.2023.3279860","DOIUrl":null,"url":null,"abstract":"This letter exploits secure beamforming for achieving security-reliability tradeoff in rate splitting multiple access (RSMA)-based communications against eavesdropper collusion. Considering user fairness, we maximize the minimum secrecy rate (MSR) among all legitimate users subject to the quality of service (QoS) constraints and transmit power constraint. A feasibility check problem is first presented to avoid infeasible cases. Then, a successive convex approximation-based algorithm is proposed to iteratively optimize the beamforming design. Numerical results show that the proposed RSMA-based design outperforms the baseline design in terms of MSR within certain QoS requirement ranges to trade security for reliability by balancing the power allocated to the common stream and private streams. And the performance advantage enlarges as the number of collusive eavesdroppers increases.","PeriodicalId":13343,"journal":{"name":"IEEE Wireless Communications Letters","volume":"12 1","pages":"1504-1507"},"PeriodicalIF":4.6000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security-Reliability Tradeoff in RSMA-Based Communications Against Eavesdropper Collusion\",\"authors\":\"Huiyun Xia, Xiaokang Zhou, Shuai Han, Cheng Li\",\"doi\":\"10.1109/LWC.2023.3279860\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This letter exploits secure beamforming for achieving security-reliability tradeoff in rate splitting multiple access (RSMA)-based communications against eavesdropper collusion. Considering user fairness, we maximize the minimum secrecy rate (MSR) among all legitimate users subject to the quality of service (QoS) constraints and transmit power constraint. A feasibility check problem is first presented to avoid infeasible cases. Then, a successive convex approximation-based algorithm is proposed to iteratively optimize the beamforming design. Numerical results show that the proposed RSMA-based design outperforms the baseline design in terms of MSR within certain QoS requirement ranges to trade security for reliability by balancing the power allocated to the common stream and private streams. And the performance advantage enlarges as the number of collusive eavesdroppers increases.\",\"PeriodicalId\":13343,\"journal\":{\"name\":\"IEEE Wireless Communications Letters\",\"volume\":\"12 1\",\"pages\":\"1504-1507\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2023-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Wireless Communications Letters\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/LWC.2023.3279860\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Wireless Communications Letters","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/LWC.2023.3279860","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Security-Reliability Tradeoff in RSMA-Based Communications Against Eavesdropper Collusion
This letter exploits secure beamforming for achieving security-reliability tradeoff in rate splitting multiple access (RSMA)-based communications against eavesdropper collusion. Considering user fairness, we maximize the minimum secrecy rate (MSR) among all legitimate users subject to the quality of service (QoS) constraints and transmit power constraint. A feasibility check problem is first presented to avoid infeasible cases. Then, a successive convex approximation-based algorithm is proposed to iteratively optimize the beamforming design. Numerical results show that the proposed RSMA-based design outperforms the baseline design in terms of MSR within certain QoS requirement ranges to trade security for reliability by balancing the power allocated to the common stream and private streams. And the performance advantage enlarges as the number of collusive eavesdroppers increases.
期刊介绍:
IEEE Wireless Communications Letters publishes short papers in a rapid publication cycle on advances in the state-of-the-art of wireless communications. Both theoretical contributions (including new techniques, concepts, and analyses) and practical contributions (including system experiments and prototypes, and new applications) are encouraged. This journal focuses on the physical layer and the link layer of wireless communication systems.