January 01, 2018

Beamforming with Artificial Noise for Secure MISOME Cognitive Radio Transmissions

In this paper, we consider multiple-input singleoutput multi-eavesdropper (MISOME) cognitive radio networks (CRNs), where a secondary user (SU) aims to transmit confidential information to a legitimate SU receiver (SU-RX) in the presence of a primary user (PU) and a multi-antenna passive eavesdropper in fast fading environments. For this system setting, we study beamforming with artificial noise (AN) for the SU to achieve confidential communications. We consider designing an AN-assisted optimal beamforming scheme, denoted cognitive beamforming (CB), that maximizes the ergodic secrecy rate. Moreover, we propose two suboptimal beamforming schemes, namely, scaled beamforming (SB) and projected beamforming (PB). We develop an analytical framework to assess the performance of the proposed schemes in a unified manner. First, we analyze the achievable ergodic secrecy rate of the three schemes. Second, we derive the optimal power allocation for the information and AN signals that maximize the achievable ergodic secrecy rate in the large-antenna regime. Third, we study the performance of the three schemes in terms of the secrecy outage probability. Using numerical simulations, we validate our analytical results and show that CB achieves the best performance among the three proposed schemes. In addition, we provide insights into the effect of various system parameters on the secrecy performance. In particular, we show that the interference threshold at the PU plays an important role in the beamforming design.

View Original Article

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...