Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pin-Hsun Lin is active.

Publication


Featured researches published by Pin-Hsun Lin.


IEEE Transactions on Signal Processing | 2011

Joint Subcarrier Pairing and Power Allocation for OFDM Transmission With Decode-and-Forward Relaying

Chih-Ning Hsu; Hsuan-Jung Su; Pin-Hsun Lin

In this paper, a point-to-point orthogonal-frequency- division multiplexing (OFDM) system with a decode-and- forward (DF) relay is considered. The transmission consists of two hops. The source transmits in the first hop, and the relay transmits in the second hop. Each hop occupies one time slot. The relay is half-duplex, and capable of decoding the message on a particular subcarrier in one time slot, and re-encoding and forwarding it on a different subcarrier in the next time slot. Thus, each message is transmitted on a pair of subcarriers in two hops. It is assumed that the destination is capable of combining the signals from the source and the relay pertaining to the same message. The goal is to maximize the weighted sum rate of the system by jointly optimizing subcarrier pairing and power allocation on each subcarrier in each hop. The weighting of the rates is to take into account the fact that different subcarriers may carry signals for different services. Both total and individual power constraints for the source and the relay are investigated. For the situations where the relay does not transmit on some subcarriers because doing so does not improve the weighted sum rate, we further allow the source to transmit new messages on these idle subcarriers. To the best of our knowledge, such a joint optimization inclusive of the destination combining has not been discussed in the literature. The problem is first formulated as a mixed integer programming problem. It is then transformed to a convex optimization problem by continuous relaxation, and solved in the dual domain. Based on the optimization results, algorithms to achieve feasible solutions are also proposed. Simulation results show that the proposed algorithms almost achieve the optimal weighted sum rate and outperform the existing methods in various channel conditions.


IEEE Journal on Selected Areas in Communications | 2013

On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

Pin-Hsun Lin; Szu-Hsiang Lai; Shih-Chun Lin; Hsuan-Jung Su

In this paper we consider the secure transmission with multiple-input, single-output, single-antenna eavesdropper (MISOSE) in fast fading channels where the transmitter knows perfect legitimate channel state information but only the statistics of the eavesdroppers channel. For the MISOSE channels, the artificial noise assisted beamforming proposed by Goel and Negi is a promising technique, where the artificial noise is imposed on the null space of the legitimate channel to disrupt the eavesdroppers reception. Here we propose a generalized artificial noise scheme which allows the injection of the artificial noise to the legitimate channel. Although the generalized artificial noise may cause the leakage of artificial noise at the legitimate receiver, the secrecy rate can still be improved since the covariance matrix of it is more flexible than the heuristic one selected by Goel and Negi. To fully characterize the proposed scheme, we investigate the optimization of its secrecy rate. We first derive the conditions under which the beamformers of the message bearing signal and the generalized artificial noise being the same is optimal. Based on this choice, the complicated secrecy rate optimization problem over the covariance matrices of the message-bearing signal and the generalized artificial noise can be reduced to a much simpler power allocation problem. We also develop an efficient algorithm to solve this non-convex power allocation problem. Numerical results show that our generalized artificial noise scheme outperforms Goel and Negis heuristic selection, especially in the near eavesdropper settings. In particular, with the aid of the proposed scheme, the regime with non-zero secrecy rate is enlarged, which can significantly improve the connectivity of the network.


IEEE Transactions on Information Forensics and Security | 2013

On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT

Shih-Chun Lin; Pin-Hsun Lin

We consider the secure transmission in ergodic fast Rayleigh fading multiple-input single-output single-antenna-eavesdropper (MISOSE) wiretap channels. We assume that the statistics of both the legitimate and eavesdropper channels are the only available channel state information at the transmitter (CSIT). By introducing a new secrecy capacity upper bound, we prove that the secrecy capacity is achieved by the Gaussian input without prefixing. To attain this result, we form another MISOSE channel for upper-bounding by relaxing the equivocation constraint, and tighten the bound by carefully selecting correlations between the legitimate and eavesdropper channel gains. The resulting upper bound is tighter than the others in the literature which are based on modifying the correlation between the noises at the legitimate receiver and eavesdropper. Next, we fully characterize the secrecy capacity by showing that the optimal channel input covariance matrix is a scaled identity matrix. The key to solve such a stochastic optimization problem is by exploiting the completely monotone property of the secrecy capacity. Finally, we prove that with only statistical CSIT of both channels, the capacity will neither scale with signal-to-noise ratio (SNR) nor the number of antenna. Our numerical results also match these observations and further confirm that having the legitimate CSIT (realizations) is very beneficial to increase the secrecy capacity.


IEEE Communications Magazine | 2015

To avoid or not to avoid CSI leakage in physical layer secret communication systems

Ta-Yuan Liu; Pin-Hsun Lin; Shih-Chun Lin; Y.-W. Peter Hong; Eduard A. Jorswieck

Physical layer secrecy has attracted much attention in recent years due to its ability to ensure communication secrecy with the use of channel coding and signal processing techniques (and without the explicit use of secret keys) in the physical layer. It serves as a promising technique for highly dynamic or ad hoc systems such as device-to-device and machine-type communication systems. However, the achievable secrecy performance depends highly on the level of CSI at the transmitter, the receiver, and the eavesdropper. In this article, we discuss how different levels of CSI resulting from conventional and unconventional ways of performing training and channel feedback may affect the confidentiality in terms of the information-theoretic (perfect) secrecy rate. The conventional approach refers to the emission of pilot signals from the transmitter and explicit channel feedback from the receiver. This approach is backward compatible with existing systems and allows the receiver to obtain accurate knowledge of the CSI, but may suffer from CSI leakage toward the eavesdropper. Unconventional approaches capitalize on reverse training to prevent CSI leakage and are shown to achieve significant improvements over conventional schemes in certain cases. For example, in a system with four transmit antennas and a single antenna at both the receiver and the eavesdropper, a secrecy rate gain of approximately 0.8 b/channel use at transmit SNR of 16 dB is observed over the full CSI case by providing CSI only to the transmitter (but not the receiver and the eavesdropper).


IEEE Journal of Selected Topics in Signal Processing | 2016

Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI

Alessio Zappone; Pin-Hsun Lin; Eduard A. Jorswieck

The problem of energy-efficient resource allocation in multiple-antenna wiretap channels is investigated, wherein a malicious user tries to eavesdrop the communication between two legitimate users. The use of artificial noise (AN) in combination with different statistical channel state information scenarios at the legitimate transmitter is considered. Unlike most previous related papers, the goal of the resource allocation is to maximize the amount of bits which can be reliably and confidentially transmitted per Joule of consumed energy. This leads to the maximization of the ratio between the system secrecy capacity and consumed power, a metric which we label secrecy energy efficiency (SEE). The resulting nonconvex maximization problems are tackled by means of the fractional programing and sequential convex optimization tools. The resulting algorithm monotonically increases the objective value, and upon convergence, yields a first-order optimal solution of the problem with a polynomial complexity. Moreover, the impact of using the AN technique on the energy consumption due to digital signal processing operations is explicitly accounted for, providing insight as to when AN is beneficial from an energy-efficient perspective, too. Numerical results show the merits of the proposed algorithms, also showing that AN does not always improve the system SEE, depending on the digital signal processor used to compute the resource allocation.


IEEE Transactions on Information Forensics and Security | 2016

On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter

Pin-Hsun Lin; Eduard A. Jorswieck

In this paper, we investigate the ergodic secrecy capacity of the fast fading Gaussian wiretap channel when only the statistics of the channel state information are known at the transmitter. We derive conditions for the existence of degradedness and a positive ergodic secrecy capacity under the usual stochastic order, the convex order, and the increasing convex order between the legitimate and eavesdropper channels. For more general orders, we prove the secrecy capacity of layered erasure wiretap channels and propose a layered signaling for the achievable scheme, and we derive an upper bound on the capacity for fast fading Gaussian wiretap channels. Finally, the numerical results show that under Nakagami-m fast fading channels, the proposed layered signaling outperforms the Gaussian codebook in several cases. In particular, in certain cases, the Gaussian codebook can achieve only a zero secrecy rate, whereas the proposed scheme achieves positive secrecy rates. Therefore, the connectivity of wireless networks can be significantly improved by the proposed scheme.


international workshop on signal processing advances in wireless communications | 2015

Secrecy and energy efficiency in MIMO-ME systems

Alessio Zappone; Pin-Hsun Lin; Eduard A. Jorswieck

The problem of resource allocation for energy-efficient secure communications in multiple input multiple output multiple-antenna eavesdropper (MIMO-ME) systems is investigated. Unlike most papers dealing with physical layer security, in this paper the goal of the resource allocation process is not only to maximize the secrecy capacity, but also the system secrecy energy efficiency (SEE), defined as the ratio between the secrecy capacity and the total consumed power and thus measured in bit/Joule, which represents the amount of information bits that can be reliably and securely transmitted per Joule of consumed energy. The energy-efficient resource allocation problem is studied considering both perfect and statistical channel state information (CSI) as to the channel from the legitimate transmitter to the eavesdropper.


IEEE Transactions on Wireless Communications | 2012

Improved Transmission Strategies for Cognitive Radio Under the Coexistence Constraint

Pin-Hsun Lin; Shih-Chun Lin; Hsuan-Jung Su; Yao-Win Peter Hong

We consider the interference-mitigation based cognitive radio where the primary and secondary users can coexist at the same time and frequency bands, under the constraint that the rate of the primary user (PU) must remain the same with a single-user decoder. To meet such a coexistence constraint, the relaying from the secondary user (SU) can help the PU’s transmission under the interfere nce from the SU. However, the relayed signal in the known dirty paper coding (DPC) based scheme is interfered by the SU’s signal, and is not “clean”. In this paper, under the half-duplex constraints, we propose two new transmission schemes aided by the clean relaying from the SU’s transmitter and receiver without interference from th e SU. We name them as the clean transmitter relaying (CT) and clean transmitter-receiver relaying (CTR) aided cognitive radio, respectively. The rate and multiplexing gain performances of CT and CTR in fading channels with various availabilities of the channel state information at the transmitters (CSIT) are studied. Our CT generalizes the celebrated DPC based scheme proposed previously. With full CSIT, the multiplexing gain of the CTR is proved to be better (or no less) than that of the previous DPC based schemes. This is because the silent period for decoding the PU’s messages for the DPC may not be necessary in the CTR. With only the statistics of CSIT, we further prove that the CTR outperforms the rate performance of the previous scheme in fast Rayleigh fading channels. The numerical examples also show that in a large class of channels, the proposed CT and CTR provide significant rate ga ins over the previous scheme with small complexity penalties.


international conference on communications | 2015

Auction based spectrum sharing for hybrid access in macro-femtocell networks under QoS requirements

Fei Shen; Dongnan Li; Pin-Hsun Lin; Eduard A. Jorswieck

This paper studies the spectrum sharing framework for motivating the hybrid access in the two-tier macro-femtocell networks. The power allocation of each user equipment (UE) is subject to its quality-of-service (QoS) requirement as a function of the signal-to-interference plus noise ratio (SINR). The macro base station (MBS) offloads the macro UEs (MUEs) to the femto access points (FAPs) in order to improve the energy efficiency of the entire system since certain MUEs are closer to the FAP(s) than to the MBS. When multiple femtocells exist in the network, auction mechanism is appropriate to establish the hybrid access. Each FAP bids for serving extra MUEs while the MBS acts as the auctioneer. In order to reduce the overhead of the information exchange, we assume that the FAPs decide their bids independently of each other by maximizing their own utilities. After receiving the bids, the MBS searches the winner FAP(s) and optimizes the number of offloaded MUEs. The compensation fee based on the bid is paid by the MBS to the winner FAP(s) for serving the additional MUEs. Numerical results show that the lowest bidder wins the auction. The proposed auction for motivating the hybrid access in the two-tier macro-femtocell network results in a win-win solution since both utilities of the MBS and FAPs are maximized.


personal, indoor and mobile radio communications | 2011

On optimal artificial-noise assisted secure beamforming for the fading eavesdropper channel

Szu-Hsiang Lai; Pin-Hsun Lin; Shih-Chun Lin; Hsuan-Jung Su

We consider secure transmission in fading channels with only the statistics of the eavesdroppers channel state information known at the transmitter. We optimize the celebrated artificial-noise (AN) assisted beamforming, which was studied by Goel and Negi using heuristically selected AN and beamforming directions. We find that Goel and Negis AN selection is strictly sub-optimal. On the contrary, one may inject AN to the beam direction of the message to improve the secrecy rate performance. We prove that for a multiple-input, single-output, single-antenna-eavesdropper system, the optimal transmission scheme is a beamformer which is aligned to the direction of the legitimate channel. We then prove that, for the part of the AN in the null space of the legitimate channel, uniform power allocation is optimal. We also provide the necessary condition for the proposed AN selection to be optimal. Simulation results show that our AN selection outperforms Goel and Negis, especially when the legitimate users channel quality is poor. In particular, when AN assisted beamforming is applied, the region with non-zero secrecy rate is enlarged, which can significantly improve the connectivity of secure networks.

Collaboration


Dive into the Pin-Hsun Lin's collaboration.

Top Co-Authors

Avatar

Eduard A. Jorswieck

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Hsuan-Jung Su

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Shih-Chun Lin

National Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Alessio Zappone

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Rafael F. Schaefer

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Carsten Rudolf Janda

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Szu-Hsiang Lai

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Mikael Skoglund

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ragnar Thobaben

Royal Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge