© The Institution of Engineering and Technology
In a multi-user wireless network, physical layer security is an important issue, especially when some of the served users are malicious. As these users actively participate in the network, their channel state information can be estimated or feedback, although not perfectly known. With this channel uncertainty, the worst-case signal leakage to eavesdropping users’ needs to be managed. The authors propose a robust instantaneous relay design that improves the worst-case secrecy rate performance, and decompose the problem into two sub-problems: First, the achievable signal leakage or leakage-to-noise ratio region is studied. Second, for fixed signal leakage constraints, the achievable secrecy rate region is computed. To approach the non-convex optimisation problems, the authors propose to iteratively solve for the phases and magnitudes of the equivalent channel matrix, a function of the relay matrix. The numerical simulations illustrate that the proposed alternating optimisation algorithm achieves higher secrecy rates than those in a system without an instantaneous relay.
References
-
-
1)
-
7. Liang, Y., Poor, H.V., Shamai, S.: ‘Information theoretic security’ (Now Publishers Inc., 2009).
-
2)
-
36. Mohajer, S., Diggavi, S.N., Tse, D.N.C.: ‘Approximate capacity of a class of Gaussian relay-interference networks’. 2009 IEEE Int. Symp. Information Theory, June 2009, vol. 57, no. 5, pp. 31–35.
-
3)
-
28. Bassily, R., Ulukus, S.: ‘Secure communication in multiple relay networks through decode-and-forward strategies’, J. Commun. Netw., 2012, 14, (4), pp. 352–363 (doi: 10.1109/JCN.2012.6292242).
-
4)
-
8. Liu, R.-H., Trappe, W., (eds.): ‘Securing wireless communications at the physical layer’ (Springer, 2009).
-
5)
-
37. Berger, S., Wittneben, A.: ‘Cooperative distributed multiuser MMSE relaying in wireless ad-hoc networks’. Proc. Asilomar Conf. Signals, Systems and Computers, 2005, pp. 1072–1076.
-
6)
-
35. Jeong, C., Kim, I.-M.: ‘Optimal power allocation for secure multicarrier relay systems’, IEEE Trans. Signal Process., 2011, 59, (11), pp. 5428–5442 (doi: 10.1109/TSP.2011.2162956).
-
7)
-
51. Lalos, A.S., Rontogiannis, A.A., Berberidis, K.: ‘Channel estimation techniques in amplify and forward relay networks’. Proc. SPAWC, 2008.
-
8)
-
59. Waldspurger, I., D'Aspremont, A., Mallat, S.: ‘Phase recovery, MAXCUT and complex semidefinite programming’. , 2012, pp. 1–30.
-
9)
-
6. Lee, N., Jafar, S.A.: ‘Aligned interference neutralization and the degrees of freedom of the 2 user interference channel with instantaneous relay’. Submitted to IEEE Transactions on Information Theory, 2011, pp. 1–17. .
-
10)
-
9. Jeong, C., Kim, I.-M., Kim, D.I.: ‘Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system’, IEEE Trans. Signal Process., 2012, 60, (1), pp. 310–325 (doi: 10.1109/TSP.2011.2172433).
-
11)
-
61. So, A.M.-C., Zhang, J.-W., Ye, Y.-Y.: ‘On approximating complex quadratic optimization problems via semidefinite programming relaxations’, Math. Program., 2006, 110, (1), pp. 93–110 (doi: 10.1007/s10107-006-0064-6).
-
12)
-
9. Bloch, M., Barros, J.: ‘Physical-layer security: from information theory to security engineering’ (Cambridge University Press, 2011).
-
13)
-
34. Renna, F., Laurenti, N., Poor, H.V.: ‘Physical-layer secrecy for OFDM transmissions over fading channels’, IEEE Trans. Inf. Forensics Secur., 2012, 7, (4), pp. 1354–1367 (doi: 10.1109/TIFS.2012.2195491).
-
14)
-
55. Horn, R.A.: ‘Matrix analysis’ (Cambridge University Press, 1985).
-
15)
-
60. Zhang, S.-Z., Huang, Y.-W.: ‘Complex quadratic optimization and semidefinite programming’, SIAM J. Optim., 2004, pp. 1–17.
-
16)
-
21. Dong, L., Jafarkhani, H.: ‘Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper’. Proc. IEEE Int. Conf. Communications (ICC), 2011.
-
17)
-
23. Bassily, R., Ulukus, S.: ‘Deaf cooperation for secrecy with multiple antennas at the helper’, IEEE Trans. Inf. Forensics Secur., 2012, 7, (6), pp. 1855–1864 (doi: 10.1109/TIFS.2012.2215325).
-
18)
-
5. Cadambe, V.R., Jafar, S.A.: ‘Degrees of freedom of wireless networks with relays, feedback, co-operation and full duplex operation’, IEEE Trans. Inf. Theory, 2009, 55, (5), pp. 2334–2344 (doi: 10.1109/TIT.2009.2016061).
-
19)
-
48. Leung, K.K., Sung, C.-W., Khabbazian, M., Safari, M.A.: ‘Optimal phase control for equal-gain transmission in MIMO systems with scalar quantization: complexity and algorithms’, IEEE Trans. Inf. Theory, 2010, 56, (7), pp. 3343–3355 (doi: 10.1109/TIT.2010.2048457).
-
20)
-
45. Chalise, B.K., Vandendorpe, L.: ‘MIMO relay design for multipoint -to – multipoint communications with imperfect channel state information’, IEEE Trans. Signal Process., 2009, 57, (7), pp. 2785–2796 (doi: 10.1109/TSP.2009.2018610).
-
21)
-
28. Bassily, R., Ulukus, S.: ‘Secure communication in multiple relay networks through decode-and-forward strategies’, J. Commun. Netw., 2012, 14, (4), pp. 352–363.
-
22)
-
L. Lai ,
H. El Gamal
.
The relay-eavesdropper channel: cooperation for secrecy.
IEEE Trans. Inf. Theory
,
9 ,
4005 -
4019
-
23)
-
47. Liang, Y.-B., Kramer, G., Poor, V., Shamai, S.: ‘Compound wiretap channels’, EURASIP J. Wirel. Commun. Netw., 2009.
-
24)
-
54. Björnson, E., Jorswieck, E.A.: ‘Optimal resource allocation in coordinated multi-cell systems’, Found. Trends Commun. Inf. Theory, 2013, 9, (2–3), pp. 113–381 (doi: 10.1561/0100000069).
-
25)
-
27. Ng, D.W.-K., Lo, E.S., Schober, R.: ‘Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks’, IEEE Trans. Wirel. Commun., 2011, 10, (10), pp. 3528–3540 (doi: 10.1109/TWC.2011.082011.110538).
-
26)
-
4. El Gamal, A., Hassanpour, N., Mammen, J.: ‘Relay networks with delays’, IEEE Trans. Inf. Theory, 2007, 53, (10), pp. 3413–3431 (doi: 10.1109/TIT.2007.904838).
-
27)
-
3. El Gamal, A., Hassanpour, N.: ‘Relay-without-delay’. Proc. Int. Symp. Information Theory, 2005, pp. 1078–1080.
-
28)
-
S.A. Vorobyov ,
A.B. Gershman ,
Z.-Q. Luo
.
Robust adaptive beamforming using worst-case performance optimization: a solution to the signal mismatch problem.
IEEE Trans. Signal Process.
,
313 -
324
-
29)
-
40. Ho, Z.K.-M., Jorswieck, E., Gerbracht, S.: ‘Information leakage neutralization for the relay-assisted multi-carrier interference channel’. , 2013.
-
30)
-
43. Shahbazpanahi, S., Gershman, A.B., Luo, Z.-Q., Wong, K.M.: ‘Robust adaptive beamforming for general-rank signal models’, IEEE Trans. Inf. Theory, 2003, 51, (9), pp. 2257–2269.
-
31)
-
22. Huang, J., Swindlehurst, A.L.: ‘Cooperative jamming for secure communications in MIMO relay networks’, IEEE Trans. Signal Process., 2011, 59, (10), pp. 4871–4884 (doi: 10.1109/TSP.2011.2161295).
-
32)
-
A. De Maio ,
Y. Huang ,
M. Piezzo ,
S. Zhang ,
A. Farina
.
Design of optimized radar codes with a peak to average power ratio constraint.
IEEE Trans. Signal Process.
,
6 ,
2683 -
2697
-
33)
-
62. Luo, Z.-Q., Ma, W.-K., So, A.M.-C., Ye, Y., Zhang, S.: ‘Semidefinite relaxation of quadratic optimization problems’, IEEE Signal Process. Mag., 2010, 27, (3), pp. 20–34 (doi: 10.1109/MSP.2010.936019).
-
34)
-
3. Shiu, Y.-S., Chang, S.Y., Wu, H.-C., Huang, S.C.-H., Chen, H.-H.: ‘Physical layer security in wireless networks: a tutorial’, IEEE Wirel. Commun., 2011, 18, (2), pp. 66–74 (doi: 10.1109/MWC.2011.5751298).
-
35)
-
17. Park, S.-H., Park, K.-H., Ko, Y.-C., Alouini, M.-S.: ‘Alternate transmission relaying based on interference alignment in 3-relay half-duplex MIMO systems’, IEEE J. Sel. Areas Commun., 2012, 30, (8), pp. 1383–1389 (doi: 10.1109/JSAC.2012.120908).
-
36)
-
18. Truong, K.T., Satori, P., Heath, R.W.: ‘Cooperative algorithms for MIMO amplify-and-forward relay networks’, IEEE Trans. Signal Process., 2013, 61, (5), pp. 1272–1287 (doi: 10.1109/TSP.2012.2236832).
-
37)
-
52. Mochaourab, R., Jorswieck, E.: ‘Robust beamforming in interference channels with imperfect transmitter channel information’, IEEE Trans. Signal Process., 2012, 92, (10), pp. 2509–2518 (doi: 10.1016/j.sigpro.2012.03.014).
-
38)
-
50. Mohammed, S.K., Larsson, E.G.: ‘Per-antenna constant envelope precoding for large multi-user MIMO systems’. , 2012, vol. 1, pp. 1–27.
-
39)
-
46. Zheng, G., Wong, K.-K., Ng, T.-S.: ‘Robust linear MIMO in the downlink: a worst-case optimization with ellipsoidal uncertainty regions’, EURASIP J. Adv. Signal Process., 2008, 2008 (doi: 10.1155/2008/609028).
-
40)
-
7. Liang, Y., Poor, H.V., Shamai, S.: ‘Information theoretic security’ (Now Publishers Inc., 2009).
-
41)
-
L. Dong ,
Z. Han ,
A. Petropulu ,
H. Poor
.
Improving wireless physical layer security via cooperating relays.
IEEE Trans. Signal Process.
,
3 ,
1875 -
1888
-
42)
-
43)
-
49. Tsai, S.H.: ‘Equal gain transmission with antenna selection in MIMO communications’, IEEE Trans. Wirel. Commun., 2011, 10, (5), pp. 1470–1479 (doi: 10.1109/TWC.2011.030411.100410).
-
44)
-
53. Wang, J., Bengtsson, M., Ottersten, B., Palomar, D.P.: ‘Robust MIMO precoding for several classes of channel uncertainty’, IEEE Trans. Signal Process., 2013, 61, (12), pp. 3056–3070 (doi: 10.1109/TSP.2013.2258016).
-
45)
-
13. He, X., Yener, A.: ‘Cooperation with an untrusted relay: a secrecy perspective’, IEEE Trans. Inf. Theory, 2010, 56, (8), pp. 3807–3827 (doi: 10.1109/TIT.2010.2050958).
-
46)
-
1. Seidel, E.: ‘Initial thoughts on LTE advanced for 3GPP release 10’. LTE World Summit, Berlin, 2009.
-
47)
-
41. Gerbracht, S., Jorswieck, E.A., Zheng, G., Ottersten, B.: ‘Non-regenerative two-hop wiretap channels using interference neutralization’. Proc. IEEE Int. Workshop on Information Forensics and Security (WIFS), 2012.
-
48)
-
36. Mohajer, S., Diggavi, S.N., Tse, D.N.C.: ‘Approximate capacity of a class of Gaussian relay-interference networks’. 2009 IEEE Int. Symp. Information Theory, June 2009, vol. 57, no. 5, pp. 31–35.
-
49)
-
12. Ho, Z.K.-M., Jorswieck, E., Gerbracht, S.: ‘Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel’. Proc. ICASSP, 2013.
-
50)
-
15. Wang, X., Wang, K., Zhang, X.-D.: ‘Secure relay beamforming with imperfect channel side information’, IEEE Trans. Veh. Technol., 2013, 62, (5), pp. 2140–2155 (doi: 10.1109/TVT.2012.2230657).
-
51)
-
56. Luo, Z.-Q., Luo, X.-D., Kisialiou, M.: ‘An efficient quasi-maximum likelihood decoder for PSK signals’. Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), 2003, no. 1, pp. 561–564.
-
52)
-
24. Vishwakarma, S., Chockalingam, A.: ‘Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI’. Proc. IEEE Int. Conf. Communications (ICC), 2013, pp. 1640–1645.
-
53)
-
39. Ho, Z.K.-M., Jorswieck, E.: ‘Instantaneous relaying: optimal strategies and interference neutralization’, IEEE Trans. Signal Process., 2012, 60, (12), pp. 6655–6668 (doi: 10.1109/TSP.2012.2210709).
-
54)
-
33. Wang, X.-W., Tao, M.-X., Mo, J.-H., Xu, Y.-Y.: ‘Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks’, IEEE Trans. Inf. Forensics Secur., 2011, 6, (3), pp. 693–702 (doi: 10.1109/TIFS.2011.2159206).
-
55)
-
11. Poor, H.V.: ‘Information and inference in the wireless physical layer’, IEEE Trans. Wirel. Commun., 2012, 19, (1), pp. 40–47 (doi: 10.1109/MWC.2012.6155875).
-
56)
-
B. Rankov ,
A. Wittneben
.
spectral efficient protocols for half-duplex fading relay channels.
IEEE J. Sel. Areas Commun.
,
2 ,
379 -
389
-
57)
-
13. Hwang, J., Lee, K.-J., Sung, H., Lee, I.: ‘Block diagonalization approach for amplify-and-forward relay systems in MIMO multi-user channels’. IEEE Int. Symp. on Peronal, Indoor and Mobile Radio Communications (PIMRC), 2009, pp. 3149–3153.
-
58)
-
16. Mourani, B., Motahari, S.A., Khandani, A.K.: ‘Relay-aided interference alignment for the quasi-static interference channel’. Proc. IEEE Int. Symp. Information Theory (ISIT), 2010, pp. 405–409.
-
59)
-
20. Zheng, G., Choo, L.C., Wong, K.K.: ‘Optimal cooperative jamming to enhance physical layer security using relays’, IEEE Trans. Signal Process., 2011, 59, (3), pp. 1317–1322 (doi: 10.1109/TSP.2010.2092774).
-
60)
-
30. Khodakarami, H., Lahouti, F.: ‘Link adaptation for fixed relaying with untrusted relays: transmission strategy design and performance analysis’. Proc. Int. Conf. Telecommunications, 2011, pp. 309–314.
-
61)
-
58. Nabar, R., Choi, J.: ‘Generalized co-phasing for multiple transmit and receive antennas’, IEEE Trans. Wirel. Commun., 2009, 8, (4), pp. 1649–1654 (doi: 10.1109/T-WC.2008.071438).
-
62)
-
A. Pascual-Iserte ,
D.P. Palomar ,
A.I. Perez-Neira ,
M.A. Lagunas
.
A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization.
IEEE Trans. Signal Process.
,
1 ,
346 -
360
-
63)
-
14. Zhang, J.-S., Roemer, F., Haardt, M.: ‘Relay assisted physical resource sharing: projection based separation of multiple operators (ProBaSeMO) for two-way relaying with MIMO amplify and forward relays’, IEEE Trans. Signal Process., 2012, 60, (9), pp. 4834–4848 (doi: 10.1109/TSP.2012.2200888).
-
64)
-
32. Jorswieck, A., Wolf, A.: ‘Resource allocation for the wire-tap multi-carrier broadcast channel’. Proc. 2008 Int. Conf. Telecommunications, June 2008, pp. 1–6.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2013.0617
Related content
content/journals/10.1049/iet-com.2013.0617
pub_keyword,iet_inspecKeyword,pub_concept
6
6