Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Maximising the minimum achievable secrecy rate of two-way relay networks using the null space beamforming method

This study concerns maximising the minimum achievable secrecy rate (ASR) of a two-way relay network in the presence of an eavesdropper, in which two nodes aim to exchange messages in two hops, using a multi-antenna relay. Throughout the first hop, the two nodes simultaneously transmit their messages to the relay. In the second hop, the relay broadcasts a combination of the received information to the users such that the transmitted signal lies in the null space of the eavesdropper's channel; this is called null space beamforming (NSBF). The best NSBF matrix for maximising the minimum ASR is studied, showing that the problem is not convex in general. To address this issue, the problem is divided into three sub-problems: a close-to-optimal solution is derived by using the semi-definite relaxation technique. Simulation results demonstrate the superiority of the proposed method w.r.t. the most well-known method addressed in the literature.

References

    1. 1)
      • 4. Lai, L., Gamal, H.E.: ‘The relay eavesdropper channel: cooperation for secrecy’, IEEE Trans. Inf. Theory, 2008, 54, (9), pp. 40054019.
    2. 2)
      • 1. Wyner, A.D.: ‘The wiretap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 13551387.
    3. 3)
      • 11. Wang, H.-M., Luo, M., Yin, Q., et al: ‘Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (12), pp. 20072020.
    4. 4)
      • 17. Charnes, A., Cooper, W.W.: ‘Programming with linear fractional functionals’, Nav. Res. Logist. Q, 1962, 9, (3–4), pp. 181186.
    5. 5)
      • 14. Huang, J., Swindlehurst, A.L.: ‘Cooperative jamming for secure communications in MIMO relay networks’, IEEE Trans. Signal Process., 2011, 59, (10), pp. 48714884.
    6. 6)
      • 6. Jindal, A., Kundu, C., Bose, R.: ‘Secrecy outage of dual-hop AF relay system with relay selection without eavesdropper's CSI’, IEEE Commun. Lett., 2014, 18, (10), pp. 17591762.
    7. 7)
      • 16. Grant, M., Boyd, S.: ‘CVX: MATLAB software for disciplined convex programming’, September 2010. Available at http://cvxr.com/cvx.
    8. 8)
      • 2. Sendonaris, A., Erkip, E., Aazhang, B.: ‘User cooperation diversity – part I: system description’, IEEE Trans. Commun., 2003, 51, (11), pp. 19271938.
    9. 9)
      • 18. Luo, Z.-Q., Ma, W.-K., So, A.M.-C., et al: ‘Semidefinite relaxation of quadratic optimization problems’, IEEE Signal Process. Mag., 2010, 27, (3), pp. 2034.
    10. 10)
      • 13. Wang, H.-M., Liu, F., Xia, X.-G.: ‘Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (8), pp. 12401250.
    11. 11)
      • 10. Yang, Y., Sun, C., Zhao, H., et al: ‘Algorithms for secrecy guarantee with null space beamforming in two-way relay networks’, IEEE Trans. Signal Process., 2014, 62, (8), pp. 21112126.
    12. 12)
      • 9. Wang, H.-M., Yin, Q., Xia, X.-G.: ‘Distributed beamforming for physical-layer security of two-way relay networks’, IEEE Trans. Signal Process., 2012, 60, (7), pp. 35323545.
    13. 13)
      • 15. Tekin, E., Yener, A.: ‘The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming’, IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 27352751.
    14. 14)
      • 12. Li, Q., Yang, Y., Ma, W.-K., et al: ‘Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks’, IEEE Trans. Signal Process., 2015, 63, (1), pp. 206220.
    15. 15)
      • 7. Rankov, B., Wittneben, A.: ‘Spectral efficient protocols for half-duplex fading relay channels networks’, IEEE J. Sel. Areas Commun., 2007, 25, (2), pp. 379389.
    16. 16)
      • 8. Popovski, P., Yomo, H.: ‘Wireless network coding by amplify-and-forward for bi-directional traffic flows’, IEEE Commun. Lett., 2007, 11, (1), pp. 1618.
    17. 17)
      • 5. Zou, Y., Wang, X., Shen, W.: ‘Optimal relay selection for physical-layer security in cooperative wireless networks’, IEEE J. Sel. Areas Commun., 2013, 31, (10), pp. 20992111.
    18. 18)
      • 3. Khajehnouri, N., Sayed, A.H.: ‘Distributed MMSE relay strategies for wireless sensor networks’, IEEE Trans. Signal Process., 2007, 55, (7), pp. 33363348.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2016.0470
Loading

Related content

content/journals/10.1049/iet-com.2016.0470
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address