Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hong Xing is active.

Publication


Featured researches published by Hong Xing.


IEEE Transactions on Vehicular Technology | 2016

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

Hong Xing; Liang Liu; Rui Zhang

Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication problem arises in the SWIPT system since the messages sent to information receivers (IRs) may be eavesdropped by energy receivers (ERs), which are presumed to receive energy from the same signals broadcast by the transmitter. To tackle this problem, we propose in this paper an artificial noise (AN) aided transmission scheme to facilitate the secrecy information transmission to IRs and yet meet the energy harvesting requirement for ERs, under the assumption that the AN can be cancelled at IRs but not at ERs. Specifically, the proposed scheme splits the power at the transmitter into two parts, to send the confidential message to the IR and an AN to interfere with the ER against eavesdropping, respectively. Under a simplified three-node wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to maximize the average secrecy information rate for the IR subject to a combination of average and peak power constraints at the transmitter as well as an average energy harvesting constraint at the ER. The formulated problem is shown to be non-convex, for which we propose an efficient algorithm by iteratively optimizing the transmit power allocations and power splitting ratios over fading channels. Finally, the performance of the proposed scheme is evaluated by simulations and compared against other heuristic schemes in terms of achievable (secrecy) rate-energy trade-off.


IEEE Transactions on Industrial Informatics | 2016

Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming

Haijun Zhang; Hong Xing; Arumugam Nallanathan; Victor C. M. Leung

We consider secure resource allocations for orthogonal frequency division multiple access (OFDMA) two-way relay wireless sensor networks (WSNs). The joint problem of subcarrier (SC) assignment, SC pairing and power allocations, is formulated under scenarios of using and not using cooperative jamming (CJ) to maximize the secrecy sum rate subject to limited power budget at the relay station (RS) and orthogonal SC allocation policies. The optimization problems are shown to be mixed integer programming and nonconvex. For the scenario without CJ, we propose an asymptotically optimal algorithm based on the dual decomposition method and a suboptimal algorithm with lower complexity. For the scenario with CJ, the resulting optimization problem is nonconvex, and we propose a heuristic algorithm based on alternating optimization. Finally, the proposed schemes are evaluated by simulations and compared with the existing schemes.


IEEE Transactions on Wireless Communications | 2016

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers

Zheng Chu; Hong Xing; Martin Johnston; Stéphane Y. Le Goff

This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network. First, we formulate the power minimization problem based on the assumption that the legitimate transmitter has perfect channel state information (CSI) of the legitimate user and the eavesdroppers, where this problem can be reformulated into a second-order cone program (SOCP). In addition, we provide a closed-form solution of transmit beamforming for the scenario of an eavesdropper. Next, we consider robust secrecy rate optimization problems by incorporating two probabilistic channel uncertainties with CSI feedback. By exploiting the Bernstein-type inequality and S-Procedure to convert the probabilistic secrecy rate constraint into the determined constraint, we formulate this secrecy rate optimization problem into a convex optimization framework. Furthermore, we provide analyses to show the optimal transmit covariance matrix is rank-one for the proposed schemes. Numerical results are provided to validate the performance of these two conservative approximation methods, where it is shown that the Bernstein-type inequality-based approach outperforms the S-Procedure approach in terms of the achievable secrecy rates.


IEEE Transactions on Signal Processing | 2015

To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying

Hong Xing; Kai-Kit Wong; Zheng Chu; Arumugam Nallanathan

Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals for improving the secrecy of the communications of the source to the destination. In particular, we investigate the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our goal is to maximize the achievable secrecy rate at the destination subject to the transmit power constraints of the AF relay and HJ helpers. In the case of perfect channel state information (CSI), the joint optimization of the artificial noise (AN) covariance for jamming and the AF beamforming matrix is presented as well as a suboptimal solution with lower complexity based on semidefinite relaxation (SDR) which is tight in this case. For the practical case where the CSI is imperfect at both the relay and the HJ helpers, we provide the formulation of the robust optimization for maximizing the worst-case secrecy rate. Using SDR techniques, a near-optimal robust scheme is proposed. Numerical results are provided to validate the effectiveness of the HJ protocol.This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our objective is to maximize the secrecy rate at the destination subject to the transmit power constraints of the AF relay and the HJ helpers. In the case of perfect channel state information (CSI), the joint optimization of the artificial noise (AN) covariance matrix for cooperative jamming and the AF beamforming matrix is studied using semidefinite relaxation (SDR) which is tight, while suboptimal solutions are also devised with lower complexity. For the imperfect CSI case, we provide the equivalent reformulation of the worst-case robust optimization to maximize the minimum achievable secrecy rate. Inspired by the optimal solution to the case of perfect CSI, a suboptimal robust scheme is proposed striking a good tradeoff between complexity and performance. Finally, numerical results for various settings are provided to evaluate the proposed schemes.


global communications conference | 2014

Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks

Hong Xing; Zheng Chu; Zhiguo Ding; Arumugam Nallanathan

The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.


global communications conference | 2012

Secure resource allocation for OFDMA two-way relay networks

Haijun Zhang; Hong Xing; Xiaoli Chu; Arumugam Nallanathan; Wei Zheng; Xiangming Wen

In this paper, we consider the problem of secure resource allocation in orthogonal frequency division multiple access (OFDMA) two-way relay networks. Multiple sources exchange information with the assistance of an amplify-and-forward (AF) relay node in the presence of an eavesdropper. The joint subcarrier allocation, subcarrier pairing and power allocation problem aims to maximize the secrecy capacity for legitimate sources subject to limited power budget and orthogonal subcarrier allocation constraints. The optimization problem is modeled as a mixed integer programming problem, and then solved in an asymptotically optimal manner based on the dual method. Moreover, a suboptimal algorithm is proposed to reduce the complexity. Simulations are conducted to evaluate the effectiveness of the proposed near optimal and suboptimal algorithms.


IEEE Transactions on Wireless Communications | 2016

Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks

Hong Xing; Kai-Kit Wong; Arumugam Nallanathan; Rui Zhang

This paper studies secrecy transmission with the aid of a group of wireless energy harvesting-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. The source node in the network does simultaneous wireless information and power transfer with each relay employing a power splitting receiver in the first phase; each relay further divides its harvested power for forwarding the received signal and generating artificial noise for jamming the eavesdroppers in the second transmission phase. In the centralized case with global channel state information (CSI), we provide the closed-form expressions for the optimal and/or suboptimal AF-relay beamforming vectors to maximize the achievable secrecy rate subject to individual power constraints of the relays, using the technique of semidefinite relaxation (SDR), which is proved to be tight. A fully distributed algorithm utilizing only local CSI at each relay is also proposed as a performance benchmark. Simulation results validate the effectiveness of the proposed multi-AF relaying with CJ over other suboptimal designs.


IEEE Access | 2017

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

Kanapathippillai Cumanan; Hong Xing; Peng Xu; Gan Zheng; Xuchu Dai; Arumugam Nallanathan; Zhiguo Ding; George K. Karagiannidis

Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation-based jamming whilst the centralized and game theoretic-based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches and the associated research challenges are also briefly outlined.


vehicular technology conference | 2015

Some Initial Results and Observations from a Series of Trials within the Ofcom TV White Spaces Pilot

Oliver Holland; Shuyu Ping; Nishanth Sastry; Pravir Chawdhry; Jean Marc Chareau; James Bishop; Hong Xing; Suleyman Taskafa; Adnan Aijaz; Michele Bavaro; Philippe Viaud; Tiziano Pinato; Emanuele Anguili; Mohammad Reza Akhavan; Julie A. McCann; Yue Gao; Zhijin Qin; Qianyun Zhang; Raymond Knopp; Florian Kaltenberger; Dominique Nussbaum; Rogério Dionísio; José Carlos Ribeiro; Paulo Marques; Juhani Hallio; Mikko Jakobsson; Jani Auranen; Reijo Ekman; Heikki Kokkinen; Jarkko Paavola

TV White Spaces (TVWS) technology allows wireless devices to opportunistically use locally-available TV channels enabled by a geolocation database. The UK regulator Ofcom has initiated a pilot of TVWS technology in the UK. This paper concerns a large- scale series of trials under that pilot. The purposes are to test aspects of white space technology, including the white space device and geolocation database interactions, the validity of the channel availability/powers calculations by the database and associated interference effects on primary services, and the performances of the white space devices, among others. An additional key purpose is to perform research investigations such as on aggregation of TVWS resources with conventional resources and also aggregation solely within TVWS, secondary coexistence issues and means to mitigate such issues, and primary coexistence issues under challenging deployment geometries, among others. This paper provides an update on the trials, giving an overview of their objectives and characteristics, some aspects that have been covered, and some early results and observations.


IEEE Transactions on Wireless Communications | 2017

Optimizing DF Cognitive Radio Networks With Full-Duplex-Enabled Energy Access Points

Hong Xing; Xin Kang; Kai-Kit Wong; Arumugam Nallanathan

With the recent advances in radio frequency (RF) energy harvesting (EH) technologies, wireless powered cooperative cognitive radio network (CCRN) has drawn an upsurge of interest for improving the spectrum utilization with incentive to motivate joint information and energy cooperation between the primary and secondary systems. Dedicated energy beamforming is aimed at remedying the low efficiency of wireless power transfer, which nevertheless arouses out-of-band EH phases and thus low cooperation efficiency. To address this issue, in this paper, we consider a novel CCRN aided by full-duplex (FD)-enabled energy access points (EAPs) that can cooperate to wireless charge the secondary transmitter while concurrently receiving primary transmitter’s signal in the first transmission phase, and to perform decode-and-forward relaying in the second transmission phase. We investigate a weighted sum-rate maximization problem subject to transmitting power constraints as well as a total cost constraint using successive convex approximation techniques. A zero-forcing-based suboptimal scheme that requires only local channel state information for the EAPs to obtain their optimum receiving beamforming is also derived. Various tradeoffs between the weighted sum-rate and other system parameters are provided in numerical results to corroborate the effectiveness of the proposed solutions against the benchmark ones.

Collaboration


Dive into the Hong Xing's collaboration.

Top Co-Authors

Avatar

Arumugam Nallanathan

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Kai-Kit Wong

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhiguo Ding

University of Manchester

View shared research outputs
Top Co-Authors

Avatar

Liang Liu

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Rui Zhang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Haijun Zhang

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Yuanwei Liu

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Xin Kang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

George K. Karagiannidis

Aristotle University of Thessaloniki

View shared research outputs
Researchain Logo
Decentralizing Knowledge