Initial point for enhancing DC Programming and DCA in Physical Layer Security
DOI:
https://doi.org/10.54654/isj.v3i17.916Keywords:
Physical layer security, DC programming and DCA, decode-and-forwardTóm tắt
Abstract— Physical layer security (PLS) is to enable confidential data transmission through wireless communication systems in the presence of illegitimate receivers, without basing on higher-layer encryption. The goal of PLS is to make use of the properties of the physical to enable critical aspects of secure communication. PLS's additional strength is that it is based on information-theoretic security, which assumes no limit on the opponent's computational power and is thus inherently quantum-resistant. In general, PLS problems are non-convex programming and thus hard to deal with. One approach to handling these problems is based on DC programming and DCA, in which finding a good initial point of DCA scheme is still a complicated, challenging and open problem. This paper proposal some good initial points for the PLS problem DCA-DF scheme on Decode-and-Forward relaying wireless networks.
Downloads
References
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
A. D. Wyner, “The Wire-Tap Channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975, doi: 10.1002/j.1538-7305.1975.tb02040.x
Tuan, N.N., Son, D.V.: DC programming and DCA for Enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. In: Le, N.-T., Van Do, T., Nguyen, N.T., Thi, H.A.L. (eds.) ICCSAMA 2017. AISC (Advances in Intelligent Systems and Computing), vol. 629, pp. 23–33. Springer, Cham. 2018.
Nhu Tuan Nguyen, Decode-and-Forward vs. Amplify-and-Forward Scheme in Physical Layer Security for Wireless Relay Beamforming Networks. Journal of Science and Technology on Information Security. ISSN 2615-9570, Vol. 10, No. 2, pp. 9-17, 2019.
F. Jameel, S. Wyne, G. Kaddoum, and T. Q. Duong, “A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security,” IEEE Commun. Surv. Tutor., vol. 21, no. 3, pp. 2734–2771, 2019, doi: 10.1109/COMST.2018.2865607.
D. Wang, B. Bai, W. Zhao, and Z. Han, “A Survey of Optimization Approaches for Wireless Physical Layer Security,” ArXiv190107955 Cs Math, Jan. 2019.
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving Wireless Physical Layer Security via Cooperating Relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010, doi: 10.1109/TSP.2009.2038412.
Thuy, T.T., Tuan, N.N., An, L.T.H., Gély, A.: DC programming and DCA for enhancing physical layer security via relay beamforming strategies. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9622, pp. 640–650. Springer, Heidelberg (2016).
Le Thi, H.A., Pham, D.T.: The DC (Difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann. Oper. Res. 133, 23–46 (2005).
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).