Cargando…

Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security

Since the cloud radio access network (C-RAN) transmits information signals by jointly transmission, the multiple copies of information signals might be eavesdropped on. Therefore, this paper studies the resource allocation algorithm for secure energy optimization in a downlink C-RAN, via jointly des...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Yijia, Liu, Ruiying
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7516656/
https://www.ncbi.nlm.nih.gov/pubmed/33285997
http://dx.doi.org/10.3390/e22020223
Descripción
Sumario:Since the cloud radio access network (C-RAN) transmits information signals by jointly transmission, the multiple copies of information signals might be eavesdropped on. Therefore, this paper studies the resource allocation algorithm for secure energy optimization in a downlink C-RAN, via jointly designing base station (BS) mode, beamforming and artificial noise (AN) given imperfect channel state information (CSI) of information receivers (IRs) and eavesdrop receivers (ERs). The considered resource allocation design problem is formulated as a nonlinear programming problem of power minimization under the quality of service (QoS) for each IR, the power constraint for each BS, and the physical layer security (PLS) constraints for each ER. To solve this non-trivial problem, we first adopt smooth [Formula: see text]-norm approximation and propose a general iterative difference of convex (IDC) algorithm with provable convergence for a difference of convex programming problem. Then, a three-stage algorithm is proposed to solve the original problem, which firstly apply the iterative difference of convex programming with semi-definite relaxation (SDR) technique to provide a roughly (approximately) sparse solution, and then improve the sparsity of the solutions using a deflation based post processing method. The effectiveness of the proposed algorithm is validated with extensive simulations for power minimization in secure downlink C-RANs.