Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tong-Xing Zheng is active.

Publication


Featured researches published by Tong-Xing Zheng.


IEEE Transactions on Communications | 2015

Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers

Tong-Xing Zheng; Hui-Ming Wang; Jinhong Yuan; Donald F. Towsley; Moon Ho Lee

In this paper, we study the secure multi-antenna transmission with artificial noise (AN) under slow fading channels coexisting with randomly located eavesdroppers. We provide a comprehensive secrecy performance analysis and system design/optimization under a stochastic geometry framework. Specifically, we first evaluate the secrecy outage performance, and derive a closed-form expression for the optimal power allocation ratio of the information signal power to the total transmit power that minimizes the secrecy outage probability (SOP). Subject to a SOP constraint, we then propose a dynamic parameter transmission scheme (DPTS) and a static parameter transmission scheme (SPTS) to maximize secrecy throughput, and provide explicit solutions on the optimal transmission parameters, including the wiretap code rates, the on-off transmission threshold and the power allocation ratio. Our results give new insight into secure transmission designs. For example, secrecy rate is a concave function of the power allocation ratio in DPTS, and AN plays a significant role under SOP constraints and in dense eavesdropper scenarios. In SPTS, transmission probability is a concave function of the power allocation ratio, and secrecy throughput is a quasi-concave function of the secrecy rate. Numerical results are demonstrated to validate our theoretical analysis.


IEEE Transactions on Communications | 2016

Physical Layer Security in Heterogeneous Cellular Networks

Hui-Ming Wang; Tong-Xing Zheng; Jinhong Yuan; Donald F. Towsley; Moon Ho Lee

The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multitier HCN where base stations (BSs), authorized users, and eavesdroppers are all randomly located. We first propose an access threshold-based secrecy mobile association policy that associates each user with the BS providing the maximum truncated average received signal power beyond a threshold. Under the proposed policy, we investigate the connection probability and secrecy probability of a randomly located user and provide tractable expressions for the two metrics. Asymptotic analysis reveals that setting a larger access threshold increases the connection probability while decreases the secrecy probability. We further evaluate the network-wide secrecy throughput and the minimum secrecy throughput per user with both connection and secrecy probability constraints. We show that introducing a properly chosen access threshold significantly enhances the secrecy throughput performance of a HCN.


IEEE Transactions on Wireless Communications | 2015

Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading

Hui-Ming Wang; Tong-Xing Zheng; Xiang-Gen Xia

The artificial noise (AN) scheme is an efficient strategy for enhancing the secrecy rate of a multiple-input-single-output channel in the presence of a passive eavesdropper, whose channel state information is unavailable. Recently, a randomized beamforming scheme has been proposed for deteriorating the eavesdroppers bit-error-rate performance via corrupting its receiving signal by time-varying multiplicative noise. However, the secrecy rate of such a scheme has not been well addressed yet. In this paper, we name it the artificial fast fading (AFF) scheme and provide a comprehensive secrecy rate analysis for it. We show that with this scheme, the eavesdropper will face a noncoherent Ricean fading single-input-multiple-output channel. Although the closed-form secrecy rate is difficult to obtain, we derive an exact expression for the single-antenna-eavesdropper case and a lower bound for the multiantenna-eavesdropper case, both of which can be numerically calculated conveniently. Furthermore, we compare the AFF scheme with the AN scheme and show that their respective superiorities to each other depend on the number of antennas that the transmitter and the eavesdropper possessed, i.e., when the eavesdropper has more antennas than the transmitter does, the AFF scheme achieves a larger secrecy rate; otherwise, the AN scheme outperforms. Motivated by this observation, we propose a hybrid AN-AFF scheme and investigate the power allocation problem, which achieves better secrecy performance further.


IEEE Transactions on Communications | 2015

Outage Constrained Secrecy Throughput Maximization for DF Relay Networks

Tong-Xing Zheng; Hui-Ming Wang; Feng Liu; Moon Ho Lee

In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region, rate parameters of the wiretap codes and power allocation between the source and relay. We propose fixed transmission parameter scheme (FTPS) and variable transmission parameter scheme (VTPS), which are based on the CDI and instantaneous channel state information of the main channels, respectively. In both schemes, source and relay use the same codeword, and the eavesdropper can use maximum ratio combining (MRC) reception. To improve the secrecy throughput, we further propose VTPS-D1 and VTPS-D2 schemes, where the source and relay either use independent codewords with identical code rates, or different codebooks with different code rates so that the eavesdropper can only decode the two-hop signals individually rather than using MRC. We provide explicit results on the design for all proposed schemes. Numerical results and comparisons on the secrecy throughput of these schemes are presented to reveal their respective superiorities and give some insights into the choice of design scheme.


IEEE Transactions on Vehicular Technology | 2017

Energy-Efficient Transmission Design in Non-orthogonal Multiple Access

Yi Zhang; Hui-Ming Wang; Tong-Xing Zheng; Qian Yang

Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency in fifth-generation systems. In this correspondence, we study the benefit of NOMA in enhancing energy efficiency (EE) for a multiuser downlink transmission, wherein the EE is defined as the ratio of the achievable sum rate of the users to the total power consumption. Our goal is to maximize EE subject to a minimum required data rate for each user, which leads to a nonconvex fractional programming problem. To solve it, we first establish the feasible range of the transmitting power that is able to support each users data rate requirement. Then, we propose an EE-optimal power allocation strategy that maximizes EE. Our numerical results show that NOMA has superior EE performance in comparison with conventional orthogonal multiple access.


IEEE Transactions on Vehicular Technology | 2016

Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers

Tong-Xing Zheng; Hui-Ming Wang

In this paper, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information (CSI) in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under a target secrecy rate and for maximizing the secrecy rate under an SOP constraint, respectively. Moreover, we provide an interesting insight that channel estimation error affects the optimal power allocation strategy in opposite ways for the two given objectives. When the estimation error increases, more power should be allocated to the information signal if we aim to decrease the rate-constrained SOP, whereas more power should be allocated to the AN if we aim to increase the SOP-constrained secrecy rate.


IEEE Transactions on Wireless Communications | 2017

Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers

Tong-Xing Zheng; Hui-Ming Wang; Qian Yang; Moon Ho Lee

In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the physical-layer security of a two-tier decentralized wireless network with each tier deployed with a large number of pairs of a single-antenna transmitter and a multi-antenna receiver. In the underlying tier, the transmitter sends unclassified information and the receiver works in the half-duplex (HD) mode receiving the desired signal. In the overlaid tier, the transmitter delivers confidential information in the presence of randomly located eavesdroppers, and the receiver works in the FD mode radiating jamming signals to confuse eavesdroppers and receiving the desired signal simultaneously. We provide a comprehensive performance analysis and network design under a stochastic geometry framework. Specifically, we consider the scenarios where each FD receiver uses single- and multi-antenna jamming, and analyze the connection probability and the secrecy outage probability of a typical FD receiver by deriving accurate expressions and more tractable approximations for the two probabilities. We also determine the optimal deployment density of the FD-mode tier to maximize the network-wide secrecy throughput subject to constraints including the given dual probabilities and the network-wide throughput of the HD-mode tier. Numerical results are demonstrated to verify our theoretical findings, and show that the network-wide secrecy throughput is significantly improved by properly deploying the FD-mode tier.


IEEE Transactions on Wireless Communications | 2016

Impact of Artificial Noise on Cellular Networks: A Stochastic Geometry Approach

Hui-Ming Wang; Chao Wang; Tong-Xing Zheng; Tony Q. S. Quek

This paper studies the impact of artificial noise (AN) on the secrecy performance of a target cell in multi-cell cellular networks. Although AN turns out to be an efficient approach for securing a point-to-point/single-cell confidential transmission, it would increase the inter-cell interference in a multi-cell cellular network, which may degrade the network reliability and secrecy performance. For analyzing the average secrecy performance of the target cell which is of significant interest, we employ a hybrid cellular deployment model, where the target cell is a circle of fixed size, and the base stations outside the target cell are modeled as a homogeneous Poisson point process. We investigate the impact of AN on the reliability and security of users in the target cell in the presence of pilot contamination using a stochastic geometry approach. The analytical results of the average connection outage and the secrecy outage of its cellular user (CU) in the target cell are given, which facilitates the evaluation of the average secrecy throughput of a randomly chosen CU in the target cell. It shows that with an optimized power allocation between the desired signals and AN, the AN scheme is an efficient solution for securing the communications in a multi-cell cellular network.


IEEE Transactions on Wireless Communications | 2017

Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

Tong-Xing Zheng; Hui-Ming Wang; Jinhong Yuan; Zhu Han; Moon Ho Lee

This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter–receiver pairs and eavesdroppers. A hybrid full-duplex (FD)/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the FD mode sending jamming signals to confuse eavesdroppers upon their information receptions, and letting the other receivers work in the half-duplex mode just receiving their desired signals. The objective of this paper is to choose properly the fraction of FD receivers for achieving the optimal network security performance. Both accurate expressions and tractable approximations for the connection outage probability and the secrecy outage probability of an arbitrary legitimate link are derived, based on which the area secure link number, network-wide secrecy throughput, and network-wide secrecy energy efficiency are optimized, respectively. Various insights into the optimal fraction are further developed, and its closed-form expressions are also derived under perfect self-interference cancellation or in a dense network. It is concluded that the fraction of FD receivers triggers a non-trivial tradeoff between reliability and secrecy, and the proposed strategy can significantly enhance the network security performance.


IEEE Transactions on Communications | 2017

Multi-Antenna Transmission in Downlink Heterogeneous Cellular Networks Under A Threshold-Based Mobile Association Policy

Tong-Xing Zheng; Hui-Ming Wang; Moon Ho Lee

With the recent emergence of 5G era, heterogeneous cellular networks (HCNs) have invoked a popular research interest. In this paper, we provide a comprehensive analysis for multi-antenna transmissions in a multi-tier downlink HCN. We first propose a reliability-oriented threshold-based mobile association policy, where each user connects to the strongest base station from which this user can obtain the largest truncated long-term received power. Under our mobile association policy, we derive analytical expressions for the exact outage probability of an arbitrary randomly located user, along with computationally convenient lower and upper bounds. Asymptotic analysis on the outage probability shows that introducing a large access threshold into mobile association significantly decreases the outage probability. We further investigate the spectrum efficiency and the energy efficiency of the HCN. Our theoretic analysis and numerical validations show that both the spectrum and energy efficiencies can be improved by properly choosing the access threshold.

Collaboration


Dive into the Tong-Xing Zheng's collaboration.

Top Co-Authors

Avatar

Hui-Ming Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Pengcheng Mu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Qian Yang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Qinye Yin

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Yi Zhang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Moon Ho Lee

Chonbuk National University

View shared research outputs
Top Co-Authors

Avatar

Ying Ju

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Bo Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jinhong Yuan

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Hao Deng

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge