Optimal power allocation for secure communications in large-scale MIMO relaying systems

Jian Chen, Xiaoming Chen, Xiumin Wang, Lei Lei

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications. In order to solve the challenging issue of short-distance interception in secure communications, the benefit of large-scale MIMO (LS-MIMO) relaying techniques is exploited to improve the secrecy performance significantly, even in the case without eavesdropper channel state information (CSI). The focus of this paper is on the analysis and design of optimal power allocation for the relay, so as to maximize the secrecy outage capacity. We reveal the condition that the secrecy outage capacity is positive, prove that there is one and only one optimal power, and present an optimal power allocation scheme. Moreover, the asymptotic characteristics of the secrecy outage capacity is carried out to provide some clear insights for secrecy performance optimization. Finally, simulation results validate the effectiveness of the proposed scheme.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Communications, ICC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1801-1806
Number of pages6
ISBN (Electronic)9781467364324
DOIs
Publication statusPublished - 9 Sept 2015
Externally publishedYes
EventIEEE International Conference on Communications, ICC 2015 - London, United Kingdom
Duration: 8 Jun 201512 Jun 2015

Publication series

NameIEEE International Conference on Communications
Volume2015-September
ISSN (Print)1550-3607

Conference

ConferenceIEEE International Conference on Communications, ICC 2015
Country/TerritoryUnited Kingdom
CityLondon
Period8/06/1512/06/15

Fingerprint

Dive into the research topics of 'Optimal power allocation for secure communications in large-scale MIMO relaying systems'. Together they form a unique fingerprint.

Cite this