skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Secure Communications in Tiered 5G Wireless Networks with Cooperative Jamming
Cooperative jamming is deemed as a promising physical layer based approach to secure wireless transmissions in the presence of eavesdroppers. In this paper, we investigate cooperative jamming in a two-tier 5G heterogeneous network (HetNet), where the macro base stations (MBSs) at the macrocell tier are equipped with large-scale antenna arrays to provide space diversity and the local base stations (LBSs) at the local cell tier adopt non-orthogonal multiple access (NOMA) to accommodate dense local users. In the presence of imperfect channel state information, we propose three robust secrecy transmission algorithms that can be applied to various scenarios with different security requirements. The first algorithm employs robust beamforming (RBA) that aims to optimize the secrecy rate of a marco user (MU) in a macrocell. The second algorithm provides robust power allocation (RPA) that can optimize the secrecy rate of a local user (LU) in a local cell. The third algorithm tackles a robust joint optimization (RJO) problem across tiers that seeks the maximum secrecy sum rate of a target MU and a target LU robustly. We employ convex optimization techniques to find feasible solutions to these highly non-convex problems. Numerical results demonstrate that the proposed algorithms are highly effective in improving the secrecy performance of a two-tier HetNet.  more » « less
Award ID(s):
1829553 1704274
PAR ID:
10092595
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
IEEE Transactions on Wireless Communications
ISSN:
1536-1276
Page Range / eLocation ID:
1 to 1
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper investigates reconfigurable intelligent surface (RIS)-assisted secure multiuser communication systems in the presence of hardware impairments (HIs) at the RIS and the transceivers. We jointly optimize the beamforming vectors at the base station (BS) and the phase shifts of the reflecting elements at the RIS so as to maximize the weighted minimum approximate ergodic secrecy rate (WMAESR), subject to the transmission power constraints at the BS and unit-modulus constraints at the RIS. To solve the formulated optimization problem, we first decouple it into two tractable subproblems and then use the block coordinate descent (BCD) method to alternately optimize the subproblems. Two different methods are proposed to solve the two obtained subproblems. The first method transforms each subproblem into a second order cone programming (SOCP) problem by invoking the penalty convex–concave procedure (CCP) method and the closed-form fractional programming (FP) criterion, and then directly solves them by using CVX. The second method leverages the minorization-maximization (MM) algorithm. Specifically, we first derive a concave approximation function, which is a lower bound of the original objective function, and then the two subproblems are transformed into two simple surrogate problems that admit closed-form solutions. Simulation results verify the performance gains of the proposed robust transmission methods over existing non-robust designs. In addition, the MM algorithm is shown to have much lower complexity than the SOCP-based algorithm. 
    more » « less
  2. null (Ed.)
    We propose a joint channel estimation and data detection (JED) algorithm for cell-free massive multi-user (MU) multiple-input multiple-output (MIMO) systems. Our algorithm yields improved reliability and reduced latency while minimizing the pilot overhead of coherent uplink transmission. The proposed JED method builds upon a novel non-convex optimization problem that we solve approximately and efficiently using forward- backward splitting. We use simulation results to demonstrate that our algorithm achieves robust data transmission with more than 3x reduced pilot overhead compared to orthogonal training in a 128 antenna cell-free massive MU-MIMO system in which 128 users transmit data over 128 time slots. 
    more » « less
  3. We introduce the concept of using unmanned aerial vehicles (UAVs) as drone base stations for in-band Integrated Access and Backhaul (IB-IAB) scenarios for 5G networks. We first present a system model for forward link transmissions in an IB-IAB multi-tier drone cellular network. We then investigate the key challenges of this scenario and propose a framework that utilizes the flying capabilities of the UAVs as the main degree of freedom to find the optimal precoder design for the backhaul links, user-base station association, UAV 3D hovering locations, and power allocations. We discuss how the proposed algorithm can be utilized to optimize the network performance in both large and small scales. Finally, we use an exhaustive search-based solution to demonstrate the performance gains that can be achieved from the presented algorithm in terms of the received signal to interference plus noise ratio (SINR) and overall network sum-rate. 
    more » « less
  4. Wireless systems must be resilient to jamming attacks. Existing mitigation methods based on multi-antenna processing require knowledge of the jammer's transmit characteristics that may be difficult to acquire, especially for smart jammers that evade mitigation by transmitting only at specific instants. We propose a novel method to mitigate smart jamming attacks on the massive multi-user multiple-input multiple-output (MU-MIMO) uplink which does not require the jammer to be active at any specific instant. By formulating an optimization problem that unifies jammer estimation and mitigation, channel estimation, and data detection, we exploit that a jammer cannot change its subspace within a coherence interval. Theoretical results for our problem formulation show that its solution is guaranteed to recover the users' data symbols under certain conditions. We develop two efficient iterative algorithms for approximately solving the proposed problem formulation: MAED, a parameter-free algorithm which uses forward-backward splitting with a box symbol prior, and SO-MAED, which replaces the prior of MAED with soft-output symbol estimates that exploit the discrete transmit constellation and which uses deep unfolding to optimize algorithm parameters. We use simulations to demonstrate that the proposed algorithms effectively mitigate a wide range of smart jammers without a priori knowledge about the attack type. 
    more » « less
  5. Deploying drone-mounted base stations (DBSs) can quickly recover the communications of the mobile users (MUs) in a disaster struck area. That is, the DBSs can act as relay nodes to transmit data from remote working base stations to the MUs. Since the DBSs could be deployed very close to the MUs, the access link data rates between the DBSs and the MUs are well provisioned. However, the DBSs may be far away from the remote working base stations, and thus the backhaul link data rate between a DBS and the remote working base station could be throttled. Free Space Optics (FSO), which has been demonstrated to provision high speed point-to-point wireless communications, can be leveraged to improve the capacity of the backhaul link. Since FSO requires line-of-sight between a DBS and a remote working macro base station, DBSs have to carefully deployed. In this paper, we design a QoS aware drone base station placement and mobile user association strategy (RESCUE) to jointly optimize the DBS deployment, MU association, and bandwidth allocation such that the number of the served MUs in the disaster struck area could be maximized. The performance of RESCUE is validated via extensive simulations. 
    more » « less