CN  Vol.5 No.3 C , September 2013
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
Abstract: In this paper, a resource allocation scheme based on physical layer security under non-ideal condition for OFDMA system is introduced. Firstly, the program uses the information security constructing an OFDMA system Wiretap Channel Model under non-ideal condition. Based on this model, arti?cial noise is generated for secure communications combatting passive multiple eavesdroppers. In order to maximize the average secrecy outage capacity without channel state information of eavesdroppers, we use dual decomposition method to implement subcarriers and power allocation in joint optimization. Simulation results show that the average secrecy outage capacity can achieve 7.81 bit/s/Hz while secrecy outage probability is 0.05 with 50 dB mtransmitpower and 64 sub-carrier for 8 authorized users.
Cite this paper: Ran, X. , Mo, Y. and Chen, Y. (2013) A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition. Communications and Network, 5, 204-210. doi: 10.4236/cn.2013.53B2039.

[1]   A. D. Wyner, “The Wire-tap Channel,” The Bell System Technical Journal, Vol. 54, No. 8, 1975, pp. 1355-1387. doi:10.1002/j.1538-7305.1975.tb02040.x

[2]   I. Csiszar and J. Koner, “Broadcast Channels with Confidential Messages,” IEEE Transactions on Information Theory, Vol. 24, No. 3, 1978, pp. 339-348. doi:10.1109/TIT.1978.1055892

[3]   Z. Li and X. G. Xia, “A Distributed Differentially Encoded OFDM Scheme for Asynchronous Cooperative Systems with Low Probability of Interception,” IEEE Transactions on Wireless Communication, Vol. 8, No. 7, 2009, pp. 3372-3379. doi:10.1109/TWC.2009.080365

[4]   F. Renna, N. Laurenti and H. V. Poor, “Physical Layer Secrecy for OFDM Systems,” in Proceedings of the IEEE European Wireless Conference, Lucca, Italy, 2010, pp. 782-789.

[5]   F. Renna, N. Laurenti and H. V. Poor, “High SNR Secrecy Rates with OFDM Signaling over Fading Channels,” in Proceedings of the IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications,Istanbul, Turkey, 2010, pp. 2692-2697.

[6]   E. Jorswieck and A. Wolf, “Resource Allocation for the Wire-tap Multi-carrier Broadcast Channel,” in Proceedings of International Workshop on Multiple Access Communications, Petersburg, Russia, 2008.

[7]   Z. Li, R. Yates and W. Trappe, “Secrecy Capacity ofIndependent Parallel Channels,” in Proceedings of Allerton Conference on Communications, 2006, pp. 841-848.

[8]   X. Zhou and M. R. McKay, “Secure Transmission with Artificial Noiseover Fading Channels: AchievableRate and Optimal Power Allocation,” IEEE Transactions on Vehicular Technology, 2010, pp. 3831-3842. doi:10.1109/TVT.2010.2059057

[9]   M. Bloch, J. Barros, M. R. S. Rodrigues and S. W. McLaughlin, “Wireless Information Theoretic Security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, 2008, pp. 2515-2534. doi:10.1109/TIT.2008.921908

[10]   D. W. K. Ng and R. Schober, Cross-layer Scheduling for Ofdma Amplify and Forward Relay Networks,” IEEE Transactions on Vehicular Technology, Vol. 59, No. 3, 2010, pp. 1443-1458. doi:10.1109/TVT.2009.2039814

[11]   W. Yu and R. Liu, “Dual Methods for Non-convex Spectrum Optimization of Multicarrier Systems,” IEEE Transactions on Communications, Vol. 54, No. 7, 2006, pp. 1310- 1322. doi:10.1109/TCOMM.2006.877962

[12]   S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. doi:10.1017/CBO9780511804441

[13]   D. P. Palomar and M. Chiang, “Chiang Tutorial on Decomposition Methods for Network Utility Maximization,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 8, 2006, pp. 1439-1451. doi:10.1109/JSAC.2006.879350

[14]   3GPP TR25.996 V9.0.0, Spatial Channel Model for Multiple Input Multiple Output Simulations [S]. 3GPP, 2009:

[15]   H. Gao, P. J. Smith and M. V. Clark, “Theoretical Reliability of MMSE Linear Diversity Combining in Rayleigh Fading Additive Interference Channels,” IEEE Transaction Communications, 1998, Vol. 46, pp. 666-672.