Distance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas system...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Amirkabir University of Technology
2020-06-01
|
| Series: | AUT Journal of Electrical Engineering |
| Subjects: | |
| Online Access: | https://eej.aut.ac.ir/article_3663_7a9f44f7b7d3d7a19ae86fc232dbf9cc.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849431160043601920 |
|---|---|
| author | Nasrin Ravansalar Vahid Pourahmadi |
| author_facet | Nasrin Ravansalar Vahid Pourahmadi |
| author_sort | Nasrin Ravansalar |
| collection | DOAJ |
| description | Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consider a network with multiple groups of users as receivers and a transmitter that intends to send different messages to each group of users. There are also some eavesdroppers (Eavs) at known locations of the environment. The goal of this paper is to find the beamforming vectors that minimize the total transmitting power while keeping the signal level above a threshold at the exact locations of the legitimate receivers (both angle and range) and keeping it less than another threshold at eavesdropping points. We use frequency diverse arrays (FDA) at the transmitter; thus, the transmitter also needs to determine the frequency that each antenna element must use for data transmission. This condition makes the problem non-convex and so we propose an approximate solution for solving this optimization problem. Simulation results show the performance of the proposed scheme in a particular network setting. |
| format | Article |
| id | doaj-art-fb067b346c5d4a3b82d065271733f7f4 |
| institution | Kabale University |
| issn | 2588-2910 2588-2929 |
| language | English |
| publishDate | 2020-06-01 |
| publisher | Amirkabir University of Technology |
| record_format | Article |
| series | AUT Journal of Electrical Engineering |
| spelling | doaj-art-fb067b346c5d4a3b82d065271733f7f42025-08-20T03:27:43ZengAmirkabir University of TechnologyAUT Journal of Electrical Engineering2588-29102588-29292020-06-015219710610.22060/eej.2019.15573.52633663Distance-Aware Beamforming for Multiuser Secure Communication SystemsNasrin Ravansalar0Vahid Pourahmadi1Electrical Eng., Amirkabir university of TechnologyAmirkabir University of TechnologyTypical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consider a network with multiple groups of users as receivers and a transmitter that intends to send different messages to each group of users. There are also some eavesdroppers (Eavs) at known locations of the environment. The goal of this paper is to find the beamforming vectors that minimize the total transmitting power while keeping the signal level above a threshold at the exact locations of the legitimate receivers (both angle and range) and keeping it less than another threshold at eavesdropping points. We use frequency diverse arrays (FDA) at the transmitter; thus, the transmitter also needs to determine the frequency that each antenna element must use for data transmission. This condition makes the problem non-convex and so we propose an approximate solution for solving this optimization problem. Simulation results show the performance of the proposed scheme in a particular network setting.https://eej.aut.ac.ir/article_3663_7a9f44f7b7d3d7a19ae86fc232dbf9cc.pdfbeamformingoptimizationphysical layer security |
| spellingShingle | Nasrin Ravansalar Vahid Pourahmadi Distance-Aware Beamforming for Multiuser Secure Communication Systems AUT Journal of Electrical Engineering beamforming optimization physical layer security |
| title | Distance-Aware Beamforming for Multiuser Secure Communication Systems |
| title_full | Distance-Aware Beamforming for Multiuser Secure Communication Systems |
| title_fullStr | Distance-Aware Beamforming for Multiuser Secure Communication Systems |
| title_full_unstemmed | Distance-Aware Beamforming for Multiuser Secure Communication Systems |
| title_short | Distance-Aware Beamforming for Multiuser Secure Communication Systems |
| title_sort | distance aware beamforming for multiuser secure communication systems |
| topic | beamforming optimization physical layer security |
| url | https://eej.aut.ac.ir/article_3663_7a9f44f7b7d3d7a19ae86fc232dbf9cc.pdf |
| work_keys_str_mv | AT nasrinravansalar distanceawarebeamformingformultiusersecurecommunicationsystems AT vahidpourahmadi distanceawarebeamformingformultiusersecurecommunicationsystems |