Private Uplink Communication in C-RAN with Untrusted Radios

Authors

O. Taghizadeh, T. Yang, R. Mathar,

Abstract

        In this work, we study the uplink (UL) of a cloud radio access network (C-RAN), where the central processing unit (CU) utilizes remote radio units (RU)s belonging to the same operator, i.e., the trusted RUs, as well as the RUs belonging to other operators or private owners, i.e., the untrusted RUs. In order to preserve information privacy against the untrusted RUs, the trusted RUs are enabled with full-duplex (FD) capability and transmit a jamming signal towards the exotic RUs, while receiving and forwarding UL signal to the CU. Note that the transmitted jamming signal degrades the decoding capability at the untrusted RUs, however, it can be later subtracted from the UL communication as it is apriori known by the CU. An optimization problem is then formulated to maximize the sum uplink private information rate by jointly designing the fronthaul compression, as well as the information and jamming transmission strategies. Due to the intractability of the resulting mathematical problem, an iterative solution is proposed with convergence to a point satisfying the Karush-Kuhn-Tucker (KKT) optimality conditions. Numerical simulations illustrate a notable gain obtained via the proposed sharing mechanism under the consideration of information privacy.

BibTEX Reference Entry 

@article{TaYaMa20,
	author = {Omid Taghizadeh and Tianyu Yang and Rudolf Mathar},
	title = "Private Uplink Communication in C-RAN with Untrusted Radios",
	pages = "8034 - 8039",
	journal = "{IEEE} Transactions on Vehicular Technology",
	volume = "69",
	number = "7",
	doi = 10.1109/TVT.2020.2995603,
	month = May,
	year = 2020,
	hsb = RWTH-2021-08227,
	}

Downloads

 Download paper  Download bibtex-file

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights there in are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.