Physical-Layer Security in Energy Efficient Blind Interference Alignment Networks

Research output: Contribution to journalArticle (Academic Journal)


Future communication networks will require veryhigh capacity, enhanced security and energy efficiency. Physical-layer security has emerged as a complimentary solution tocryptography to hinder eavesdropping, and more recently, in-terference management schemes have been investigated as a wayto secure the physical layer. Blind Interference Alignment (BIA)is an interference management scheme that can achieve optimalDegrees of Freedom (DoF), with no Channel State Informationat the transmitters (CSIT), thus reducing network’s overhead.Wireless energy transfer has also been researched in conjunctionwith state-of-the-art transmission methods.Our contribution is the development of a BIA network thatincorporates both physical-layer security and wireless energytransfer. BIA manages interference via appropriate messagescheduling (during a certain number of time slots) which furtherallows nodes to harvest energy from interference. Legitimatejammers, with no CSIT, are also incorporated into our model toenhance security by transmitting artificial noise. We examine thesecurity performance of the system when eavesdroppers have orhave not access to the beamforming vectors of the users. Underthe assumption that eavesdroppers do not have knowledge ofthe beamforming vectors we demonstrate that eavesdropping isinfeasible. Finally, we show that, when eavesdroppers can retrieve the beamforming vectors, the secrecy rate of the network can still be held at a higher level, depending on the correlation of the wiretap and the legitimate channel, and we examine the trade-off relationship between secrecy rate and DoF.
Original languageEnglish
Number of pages10
JournalIEEE Journal of Selected Topics in Signal Processing
Publication statusSubmitted - 2016

Fingerprint Dive into the research topics of 'Physical-Layer Security in Energy Efficient Blind Interference Alignment Networks'. Together they form a unique fingerprint.

Cite this