TY - JOUR
T1 - Secure wireless communication and optimal power control under statistical queueing constraints
AU - Qiao, Deli
AU - Gursoy, Mustafa Cenk
AU - Velipasalar, Senem
N1 - Funding Information:
Manuscript received September 29, 2010; revised March 21, 2011; accepted April 25, 2011. Date of publication May 19, 2011; date of current version August 17, 2011. This work was supported by the National Science Foundation under Grant CNS – 0834753 and Grant CCF – 0917265. This work was presented in part at the the IEEE International Symposium on Information Theory (ISIT), Austin, TX, in June 2010. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Hisato Iwai.
PY - 2011/9
Y1 - 2011/9
N2 - In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect channel side information (CSI) is available at both the transmitter and the receivers. Initially, the scenario in which the transmitter sends common messages to two receivers and confidential messages to one receiver is considered. For this case, the effective secure throughput region, which is the region of constant arrival rates of common and confidential messages that can be supported by the buffer-constrained transmitter and fading broadcast channel, is defined. It is proven that this effective throughput region is convex implying that time-sharing between any two viable transmission and power control strategies results in effective throughput values inside the region. Then, the optimal power control policies that achieve the boundary points of the effective secure throughput region are investigated and an algorithm for the numerical computation of the optimal power adaptation schemes is provided. Additionally, the throughput region achieved by time-division multiplexing of common and confidential messages is explored. Subsequently, the special case in which the transmitter sends only confidential messages to one receiver is addressed in more detail. For this case, effective secure throughput is formulated and two different power adaptation policies are studied. These power adaptation policies are compared with the opportunistic ones that are optimal in the absence of quality of service (QoS) constraints. It is shown that opportunistic schemes, in which data transmission with high rates and high power occurs only when the main channel is much better than the eavesdropper channel, are no longer optimal under buffer constraints, and the transmitter should send the data at a certain moderate rate and power even when the main channel strength is comparable to that of the eavesdropper channel to avoid buffer overflows.
AB - In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect channel side information (CSI) is available at both the transmitter and the receivers. Initially, the scenario in which the transmitter sends common messages to two receivers and confidential messages to one receiver is considered. For this case, the effective secure throughput region, which is the region of constant arrival rates of common and confidential messages that can be supported by the buffer-constrained transmitter and fading broadcast channel, is defined. It is proven that this effective throughput region is convex implying that time-sharing between any two viable transmission and power control strategies results in effective throughput values inside the region. Then, the optimal power control policies that achieve the boundary points of the effective secure throughput region are investigated and an algorithm for the numerical computation of the optimal power adaptation schemes is provided. Additionally, the throughput region achieved by time-division multiplexing of common and confidential messages is explored. Subsequently, the special case in which the transmitter sends only confidential messages to one receiver is addressed in more detail. For this case, effective secure throughput is formulated and two different power adaptation policies are studied. These power adaptation policies are compared with the opportunistic ones that are optimal in the absence of quality of service (QoS) constraints. It is shown that opportunistic schemes, in which data transmission with high rates and high power occurs only when the main channel is much better than the eavesdropper channel, are no longer optimal under buffer constraints, and the transmitter should send the data at a certain moderate rate and power even when the main channel strength is comparable to that of the eavesdropper channel to avoid buffer overflows.
KW - Effective secure throughput
KW - information-theoretic security
KW - optimal power control
KW - quality of service (QoS) constraints
KW - secure broadcasting
KW - superposition coding
KW - time-division multiplexing (TDM)
UR - http://www.scopus.com/inward/record.url?scp=80051760779&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80051760779&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2011.2155650
DO - 10.1109/TIFS.2011.2155650
M3 - Article
AN - SCOPUS:80051760779
SN - 1556-6013
VL - 6
SP - 628
EP - 639
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 3 PART 1
M1 - 5770214
ER -