Recent studies show that millimeter wave (mmWave) communications can offer orders of magnitude, which increases in the cellular capacity. However, the secrecy performance of an mmWave cellular ...network has not been investigated so far. Leveraging the new path-loss and blockage models for mmWave channels, which are significantly different from the conventional microwave channel, this paper comprehensively studies the network-wide physical layer security performance of the downlink transmission in an mmWave cellular network under a stochastic geometry framework. We first study the secure connectivity probability and the average number of perfect communication links per unit area in a noise-limited mmWave network for both non-colluding and colluding eavesdroppers scenarios, respectively. Then, we evaluate the effect of the artificial noise (AN) on the secrecy performance, and derive the analysis result of average number of perfect communication links per unit area in an interference-limited mmWave network. Numerical results demonstrate the network-wide secrecy performance, and provide interesting insights into how the secrecy performance is influenced by various network parameters: antenna array pattern, base station intensity, and AN power allocation.
In this paper, we study power-efficient resource allocation for multicarrier non-orthogonal multiple access systems. The resource allocation algorithm design is formulated as a non-convex ...optimization problem which jointly designs the power allocation, rate allocation, user scheduling, and successive interference cancellation (SIC) decoding policy for minimizing the total transmit power. The proposed framework takes into account the imperfection of channel state information at transmitter and quality of service requirements of users. To facilitate the design of optimal SIC decoding policy on each subcarrier, we define a channel-to-noise ratio outage threshold. Subsequently, the considered non-convex optimization problem is recast as a generalized linear multiplicative programming problem, for which a globally optimal solution is obtained via employing the branch-and-bound approach. The optimal resource allocation policy serves as a system performance benchmark due to its high computational complexity. To strike a balance between system performance and computational complexity, we propose a suboptimal iterative resource allocation algorithm based on difference of convex programming. Simulation results demonstrate that the suboptimal scheme achieves a close-to-optimal performance. Also, both proposed schemes provide significant transmit power savings than that of conventional orthogonal multiple access schemes.
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security in a single-input ...single-output (SISO) NOMA system consisting of a transmitter, multiple legitimate users and an eavesdropper. The aim of this letter is to maximize the secrecy sum rate (SSR) of the NOMA system subject to the users' quality of service (QoS) requirements. We firstly identify the feasible region of the transmit power for satisfying all users' QoS requirements. Then we derive the closed-form expression of an optimal power allocation policy that maximizes the SSR. Numerical results are provided to show a significant SSR improvement by NOMA compared with conventional orthogonal multiple access (OMA).
In this article, we consider an intelligent reflecting surface (IRS) assisted Guassian multiple-input multiple-output (MIMO) wiretap channel (WTC), and focus on enhancing its secrecy rate. Due to ...MIMO setting, all the existing solutions for enhancing the secrecy rate over multiple-input single-output WTC completely fall to this work. Furthermore, all the existing studies are simply based on an ideal assumption that full channel state information (CSI) of eavesdropper (Ev) is available. Therefore, we propose numerical solutions to enhance the secrecy rate of this channel under both full and no Ev's CSI cases. For the full CSI case, we propose a barrier method and one-by-one (OBO) optimization combined alternating optimization (AO) algorithm to jointly optimize the transmit covariance R at transmitter (Tx) and phase shift coefficient Q at IRS. For the case of no Ev's CSI, we develop an artificial noise (AN) aided joint transmission scheme to enhance the secrecy rate. In this scheme, a bisection search (BS) and OBO optimization combined AO algorithm is proposed to jointly optimize R and Q. Such scheme is also applied to enhance the secrecy rate under a special scenario in which the direct link between Tx and receiver (Rx)/Ev is blocked due to obstacles. In particular, we propose a BS and minorization-maximization (MM) combined AO algorithm with slightly faster convergence to optimize R and Q for this scenario. Simulation results have validated the monotonic convergence of the proposed algorithms, and it is shown that the proposed algorithms for the IRS-assisted design achieve significantly larger secrecy rate than the other benchmark schemes under full CSI. When Ev's CSI is unknown, the secrecy performance of this channel also can be enhanced by the proposed AN aided scheme, and there is a trade-off between increasing the quality of service at Rx and enhancing the secrecy rate.
Reconfigurable Intelligent Surface (RIS) draws great attentions in academic and industry due to its passive and low power consumption nature, and has currently been used in physical layer security to ...enhance the secure transmission. However, due to the existence of "double fading" effect on the reflecting channel link between transmitter and user, RIS helps achieve limited secrecy performance gain compared with the case without RIS. In this correspondence, we propose a novel active RIS design to enhance the secure wireless transmission, where the reflecting elements in RIS not only adjust the phase shift but also amplify the amplitude of signals. To solve the non-convex secrecy rate optimization based on this design, an efficient alternating optimization algorithm is proposed to jointly optimize the beamformer at transmitter and reflecting coefficient matrix at RIS. Simulation results show that with the aid of active RIS design, the impact of "double fading" effect can be effectively relieved, resulting in a significantly higher secrecy performance gain compared with existing solutions with passive RIS and without RIS design.
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security ...and covert communication problems for a pair of terrestrial nodes against UAV surveillance are considered in this paper. To overcome the information leakage and increase the transmission reliability, a multi-hop relaying strategy is deployed. We aim to optimize the throughput by carefully designing the parameters of the multi-hop network, including the coding rates, transmit power, and required number of hops. In the secure transmission scenario, the expressions of the connection probability and secrecy outage probability of an end-to-end path are derived and the closed-form expressions of the optimal transmit power, transmission and secrecy rates under a fixed number of hops are obtained. In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically. Simulation shows the impact of network settings on the transmission performance. The trade-off between secrecy/covertness and efficiency of the multi-hop transmission is discussed which leads to the existence of the optimal number of hops.
Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency in fifth-generation systems. In this correspondence, we study the benefit of NOMA ...in enhancing energy efficiency (EE) for a multiuser downlink transmission, wherein the EE is defined as the ratio of the achievable sum rate of the users to the total power consumption. Our goal is to maximize EE subject to a minimum required data rate for each user, which leads to a nonconvex fractional programming problem. To solve it, we first establish the feasible range of the transmitting power that is able to support each user's data rate requirement. Then, we propose an EE-optimal power allocation strategy that maximizes EE. Our numerical results show that NOMA has superior EE performance in comparison with conventional orthogonal multiple access.
In this letter, improving the security of an intelligent reflecting surface (IRS) assisted multiple-input single-output (MISO) communication system is studied. Different from the ideal assumption in ...existing literatures that full eavesdropper's (Eve's) channel state information (CSI) is available, we consider a more practical scenario without Eve's CSI. To enhance the security of this system given a total transmit power at transmitter (Alice), we propose a joint beamforming and jamming approach, in which a minimum transmit power is firstly optimized at Alice so as to meet the quality of service (QoS) at legitimate user (Bob), and then artificial noise (AN) is emitted to jam the eavesdropper by using the residual power at Alice. Two efficient algorithms exploiting oblique manifold (OM) and minorization-maximization (MM) algorithms, respectively, are developed for solving the resulting non-convex optimization problem. Simulation results have been provided to validate the performance and convergence of the proposed algorithms.
One long‐standing issue in directed C−H functionalization is that either nitrogen or sulfur atoms present in heterocyclic substrates may bind preferentially to a transition‐metal catalyst rather than ...to the desired directing group. This competitive binding has largely hindered the application of C−H functionalization in late‐stage heterocycle drug discovery. Reported here is the use of an oxazoline‐based directing group capable of overriding the poisoning effect of a wide range of heterocycle substrates. The potential use of this directing group in pharmaceutical drug discovery is illustrated by diversification of Telmisartan (an antagonist for the angiotensin II receptor) through copper‐mediated C−H amination, hydroxylation, thiolation, arylation, and trifluoromethylation.
Override switch: A bidentate oxazoline‐based directing group (DG) allows copper‐mediated C−H amination, hydroxylation, thiolation, arylation, alkynylation, and trifluoromethylation. The directing group overrides the directing/poisoning effects of heterocyclic moieties.
In applications of the Internet of Things (IoT), the use of short packets is expected to meet the stringent latency requirement in ultra-reliable low-latency communications; however, the incurred ...security issues and the impact of finite blocklength coding on the physical-layer security are not well understood. This paper investigates the performance of secure short-packet communications in a mission-critical IoT system with an external multi-antenna eavesdropper. An analytical framework is proposed to approximate the average achievable secrecy throughput of the system with finite blocklength coding. To gain more insight, a simple case with a single-antenna access point (AP) is considered first, in which the secrecy throughput is approximated in a closed form. Based on that result, the optimal blocklengths to maximize the secrecy throughput with and without the reliability and latency constraints, respectively, are derived. For the case with a multi-antenna AP, following the proposed analytical framework, closed-form approximations for the secrecy throughput are obtained under both beamforming and artificial-noise-aided transmission schemes. The numerical results verify the accuracy of the proposed approximations and illustrate the impact of the system parameters on the tradeoff between transmission latency and reliability under a secrecy constraint.