The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Xinyu DA(4hit)

1-4hit
  • AN-Aided Transmission Design for Secure MIMO Cognitive Radio Network with SWIPT

    Xinyu DA  Lei NI  Hehao NIU  Hang HU  Shaohua YUE  Miao ZHANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:8
      Page(s):
    946-952

    In this work, we investigate a joint transmit beamforming and artificial noise (AN) covariance matrix design in a multiple-input multiple-output (MIMO) cognitive radio (CR) downlink network with simultaneous wireless information and power transfer (SWIPT), where the malicious energy receivers (ERs) may decode the desired information and hence can be treated as potential eavesdroppers (Eves). In order to improve the secure performance of the transmission, AN is embedded to the information-bearing signal, which acts as interference to the Eves and provides energy to all receivers. Specifically, this joint design is studied under a practical non-linear energy harvesting (EH) model, our aim is to maximize the secrecy rate at the SR subject to the transmit power budget, EH constraints and quality of service (QoS) requirement. The original problem is not convex and challenging to be solved. To circumvent its intractability, an equivalent reformulation of this secrecy rate maximization (SRM) problem is introduced, wherein the resulting problem is primal decomposable and thus can be handled by alternately solving two convex subproblems. Finally, numerical results are presented to verify the effectiveness of our proposed scheme.

  • Robust Beamforming and Power Splitting for Secure CR Network with Practical Energy Harvesting

    Lei NI  Xinyu DA  Hang HU  Miao ZHANG  Hehao NIU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/01/25
      Vol:
    E102-B No:8
      Page(s):
    1547-1553

    This paper introduces an energy-efficient transmit design for multiple-input single-output (MISO) energy-harvesting cognitive radio (CR) networks in the presence of external eavesdroppers (Eves). Due to the inherent characteristics of CR network with simultaneous wireless information and power transfer (SWIPT), Eves may illegitimately access the primary user (PU) bands, and the confidential message is prone to be intercepted in wireless communications. Assuming the channel state information (CSI) of the Eves is not perfectly known at the transmitter, our approach to guaranteeing secrecy is to maximize the secrecy energy efficiency (SEE) by jointly designing the robust beamforming and the power splitting (PS) ratio, under the constraints of total transmit power, harvested energy at secondary receiver (SR) and quality of service (QoS) requirement. Specifically, a non-linear energy harvesting (EH) model is adopted for the SR, which can accurately characterize the property of practical RF-EH circuits. To solve the formulated non-convex problem, we first employ fractional programming theory and penalty function to recast it as an easy-to-handle parametric problem, and then deal with the non-convexity by applying S-Procedure and constrained concave convex procedure (CCCP), which enables us to exploit the difference of concave functions (DC) programming to seek the maximum worst-case SEE. Finally, numerical results are presented to verify the performance of the proposed scheme.

  • BER Analysis of WFRFT-Based Systems with Order Offset

    Yuan LIANG  Xinyu DA  Ruiyang XU  Lei NI  Dong ZHAI  Yu PAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/07/25
      Vol:
    E102-B No:2
      Page(s):
    277-284

    We propose a novel bit error rate (BER) analysis model of weighted-type fractional Fourier transform (WFRFT)-based systems with WFRFT order offset Δα. By using the traditional BPSK BER analysis method, we deduce the equivalent signal noise ratio (SNR), model the interference in the channel as a Gaussian noise with non-zero mean, and provide a theoretical BER expression of the proposed system. Simulation results show that its theoretical BER performance well matches the empirical performance, which demonstrates that the theoretical BER analysis proposed in this paper is reliable.

  • Secure Communication Using Scramble Phase Assisting WFRFT

    Yuan LIANG  Xinyu DA  Ruiyang XU  Lei NI  Dong ZHAI  Yu PAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/10/03
      Vol:
    E102-B No:4
      Page(s):
    779-789

    In this paper, a scramble phase assisting weighted-type fractional Fourier transform (SPA-WFRFT) based system is proposed to guarantee the communication's security. The original transmitting signal is divided into two parts. The first part is modulated by WFRFT and subsequently makes up the constellation beguiling. The other part is used to generate the scramble phase and also to assist in the encryption of the WFRFT modulated signal dynamically. The novel constellation optimal model is built and solved through the genetic algorithm (GA) for the constellation beguiling. And the double pseudo scheme is implemented for the scramble phase generation. Theoretical analyses show that excellent security performances and high spectral efficiency can be attained. Final simulations are carried out to evaluate the performances of the SPA-WFRFT based system, and demonstrate that the proposed system can effectively degrade the unauthorized receivers' bit error rate (BER) performance while maintaining its own communication quality.