DOI QR코드

DOI QR Code

Robust Cooperative Relay Beamforming Design for Security

  • Gong, Xiangwu (College of Communications Engineering, PLA University of Science and Technology) ;
  • Dong, Feihong (College of Communications Engineering, PLA University of Science and Technology) ;
  • Li, Hongjun (College of Communications Engineering, PLA University of Science and Technology) ;
  • Shao, Wei (College of Communications Engineering, PLA University of Science and Technology)
  • Received : 2015.07.04
  • Accepted : 2015.09.16
  • Published : 2015.11.30

Abstract

In this paper, we investigate a security transmission scheme at the physical layer for cooperative wireless relay networks in the presence of a passive eavesdropper. While the security scheme has been previously investigated with perfect channel state information(CSI) in the presence of a passive eavesdropper, this paper focuses on researching the robust cooperative relay beamforming mechanism for wireless relay networks which makes use of artificial noise (AN) to confuse the eavesdropper and increase its uncertainty about the source message. The transmit power used for AN is maximized to degrade the signal-to-interference-plus-noise-ratio (SINR) level at the eavesdropper, while satisfying the individual power constraint of each relay node and worst-case SINR constraint at the desired receiver under a bounded spherical region for the norm of the CSI error vector from the relays to the destination. Cooperative beamforming weight vector in the security scheme can be obtained by using S-Procedure and rank relaxation techniques. The benefit of the proposed scheme is showed in simulation results.

Keywords

1. Introduction

Due to the broadcast nature of the wireless medium, information from source could be obtained by an eavesdropper, the issues of privacy and security in wireless networks have taken on an increasingly important role, especially in civil security and military applications. Recent information-theoretic research on secure communication has focused on enhancing security at the physical layer [1]-[5]. Physical layer security exploits the physical characteristics of the wireless channel to transmit information secretly which is different from the conventional encryption techniques. This problem was first researched by Wyner [6], who introduced the wiretap channel model to achieve information-theoretic security transmission. Wyner found that when an eavesdropper obtains a degraded version of the legitimate receiver’s observation, messages can be exchanged secretly at a non-zero rate between the source and the destination, while anything about the messages can not be learned by the eavesdropper.

The cooperative diversity mechanism makes use of the benefits of wireless relay network scalability in terms of cooperative resource sharing in which multiple diversity channels are created which results into higher transmission rates, increased throughout and coverage range, improvement in reliability and end-to-end performance and much more, while it can be vulnerable to eavesdropping attacks due to the additional transmission of the source message. Recently the physical layer security transmission for the cooperative relay communications has also been researched [7]-[9]. By making use of relay cooperation, wireless physical layer security can be enhanced greatly against eavesdropping attacks.

The difference between the channel capacity from source to destination (called legitimate link) and that from source to eavesdropper (called wiretap link) is defined as the achievable secrecy rate , and the maximal achievable secrecy rate is named as the secrecy capacity in [1] and [10]. At present, most work focuses on investigating the secrecy capacity at which a message can be sent secretly to intended destination while the eavesdropper cannot decode it from an information-theoretic perspective. In [11], the authors proposed the cooperative jamming and analyzed the secrecy capacity. In [12], the authors addressed secure communications of one source-destination pair with help of multiple cooperating relays in the presence of one or more eavesdroppers where the achievable secrecy rate was maximized subject to a transmit power constraint. In [13], the authors investigated the secure communication of this two-way relay scenario using physical layer security where they defined and then analyzed a source optimization problem to obtain the maximum secrecy rate. In these literatures, the CSI of the eavesdropper is known by the transmitter. Actually the eavesdropper is totally passive and even that whether there exists any eavesdropper can not be prior known in a real wiretap case. Under the condition of no eavesdropper’s CSI, we can not optimize the secrecy rate directly.

Alternatively, a masked beamforming way [14] is adopted to enhance the security communication at the physical layer in this paper. It uses only the legitimate users’ CSI and the artificial noise(AN) is adopted to jam the eavesdropper [15]. This way has been used to achieve security transmission for multiple-input multiple-output(MIMO) downlink wiretap channels in [16], which adopted signal-to-interference-plusnoise-ratio(SINR) as the quality-of-service(QoS) metric.

In [17], a masked beamforming way was also proposed to improve the security at the physical layer for relay communications with no eavesdropper’s CSI. In [18], the authors proposed a hybrid cooperative beamforming and jamming scheme to enhance the physical layer security of a two-way relay network in the presence of a passive eavesdropper. However, they both assumed that the available CSI was perfect. If perfect CSI is available at the transmitter, then the AN can be made invisible to the intended receiver while degrading the potential eavesdropper’s channel. Obviously, it is not impossible in practice due to some factors such as quantization noise and channel mobility, etc. The inaccurate CSI for legitimate links can result in degrading to the intended user’s SINR because of interference leakage to the intended user.

In [19], the authors studied the cooperative transmission for securing a decode-and-forward (DF) two-hop network under the more practical assumption that only the channel distribution information (CDI) of the eavesdropper was known. In [20], the authors investigated the physical-layer security issue of an amplify-and-forward (AF) relay network and proposed a joint cooperative beamforming and cooperative jamming design that was robust to the imperfect CSI of the multiple multi-antenna eavesdroppers. However, it is known that the secrecy rate can not be optimized directly in the presence of a passive eavesdropper. In [21], the authors studied the robust AF relay beamforming security scheme in presence of a passive eavesdropper where CSI errors were modeled as Gaussian and average mean square error(MSE) constraint was considered focusing entirely on system performance. Different from [21], this study considers a norm-bounded error model and the worst-case SINR constraint placing the highest emphasis on fairness.

In this paper, we investigate the robust beamforming scheme for security in the cooperative wireless relay networks with one source, multiple relays, one legitimate user when a passive eavesdropper is present. In this system, all nodes are equipped with single antenna. Imperfection in the CSI is modeled using a norm-bounded error model. The transmit power of the AN which lies in the null space of legitimate channels is maximized to confuse the eavesdropper, while subject to worst-case SINR constraint at the intended user. In this paper, we also consider individual power constraint of each relay node, which is more practical. A robust algorithm using S-Procedure and rank relaxation techniques is proposed to solve the minimization problem of the total transmit power of the relays for the information-bearing signals subject to worst-case SINR constraint at the intended user and the individual power constraint of each relay, which is the same as maximization of the power of the AN. In addition, an upper bound of the the transmit power of the AN can be obtained by solving multiple second-order cone-programming(SOCP) problems. Simulations show that secrecy capacity in the robust beamforming scheme is improved compared with that obtained by a naive scheme where CSI errors are not considered.

The rest of this paper is organized as follows. In Section II, the system model is described. In Section III, CSI uncertainty is described and problem formulation is proposed. In Section IV, a robust beamforming design is proposed. In Section V, the simulation results are showed. We conclude the paper in Section VI.

The notation is adopted as follows: Boldface lower (upper) case letters represent vectors (matrices); Cn×m and Rn×m stand for spaces of n×m complex and real matrices, respectively; (•)T , (•)*, (•)H and (•)✝ indicate transpose, conjugate, conjugate transpose and Moore Penrose inverse, respectively; tr(•) and E(•) denote the trace operator and the expectation operator; A ≻ 0 means that A is positive definite; ǁaǁ represents the 2-norm of the vector a ; IM is the M×M identity matrix; diag (a1,⋯, aN) is an N sized diagonal matrix with a1,⋯, aN as its diagonal elements; log(•) denotes the base-2 logarithm.

 

2. SYSTEM MODEL

We consider a cooperative relay communications system model showed in Fig. 1. The system consists of one source node S , n relays {Ri, i = 1,⋯, n}, one destination node D and one passive eavesdropper E . Each of nodes is equipped with single antenna and the relays use the AF protocol. The main and wiretap links are represented by the solid and dash lines, respectively. In order to focus on the effect of cooperative relay beamforming with imperfect CSI, we assume that there are no direct links from the source to the destination and eavesdropper due to the large path loss and strong shadow fading, as assumed in [22] and [23]. The passive eavesdropper E attempts to wiretap the information received by the destination node D.

Fig. 1.System model

The signal xr = (xr,1,⋯, xr,n)H ∈ Cn×1 received by the relays is given by

where s is the signal with power P transmitted by the source and we normalize it to 1, i.e. E(|s|2)=1 , hsr = (hsr,1,⋯, hsr,1)H ∈ Cn×1 is channel gain from the source to relays whose elements are independent and identically distributed (i.i.d.) complex Gaussian variables, and nr∈Cn×1 is noise vector whose elements are i.i.d. complex Gaussian with zero mean and variances .

Because the passive eavesdropper only receives signal, its channel knowledge is completely unknown for the transmitters. We also cannot optimize secrecy rate to protect the intended information. An AN scheme is a possible way to realize security transmission [23]. This scheme makes an attempt to degrade the decode ability of the eavesdropper.

The signal yr = (yr,1,⋯, yr,n)H ∈ Cn×1 transmitted by the relays is given by

where W = diag (w1,⋯, wn) is beamforming weight matrix in which wi is the i th AF relay’s weight, nan∈Cn×1 is the artificial noise and is allocated. We also assume that the transmit power of the signal transmitted by the i th relay is constrained, i.e. E(|yr,i|2)≤Pi, i = 1,⋯, n.

The total transmit power of the relays for the information-bearing signals can be denoted as

where Rsr = diag (|hsr,1|2,⋯, |hsr,n|2) and W = (w1,⋯, wn)H.

The signal received by the destination is

where hrd = (hrd,1,⋯, hrd,n)H ∈ Cn×1 is channel gain from the relays to destination whose elements are i.i.d. complex Gaussian variables, and nd is additive noise that is complex Gaussian with zero mean and variance .

AN should not impact the legitimate links, so that it should lie in the null space of hrd , i.e. . We can obtain an nan=∏v, ∏ is an orthonormal basis of the null space of hrd and ∏H∏=I. Assuming that elements of v are i.i.d. Gaussian variables with zero mean and variances .

The signal received by the eavesdropper is

where he = (he,1,⋯, he,n)H ∈ Cn×1 is channel gain from the relays to the eavesdropper, and ne is additive noise that is complex Gaussian with zero mean and variance .

With perfect CSI, the AN can be made invisible to the intended receiver and the received SINR at the destination is expressed as

where , Rrd = diag (|hrd,1|2,⋯, |hrd,n|2).

The potential eavesdropper is confused by AN and the received SINR at the eavesdropper is expressed as

where , Re = diag (|he,1|2,⋯, |he,n|2).

To achieve the security transmission, the achievable maximum secrecy rate with perfect CSI can be expressed as

where a+ = max{0, a}.

 

3. CSI UNCERTAINTY AND PROBLEM FORMULATION

In [21], the authors considered Gaussian errors model and average MSE constraint focusing entirely on system performance. In this section, we provide a norm-bounded CSI error model and a security transmission scheme under the constraint of worst-case SINR placing the highest emphasis on fairness.

We can not obtain the eavesdropper’s CSI because it is a passive node. The secrecy rate in (8) may not be optimized to obtain the secrecy capacity directly. Observing (6), (7) and (8) we can note that we hope to decrease (7) as small as possible while increasing (6). So we may achieve security transmission by jamming the eavesdropper as large as possible. We consider to maximize the transmit power of the AN subject to the received SINR constraint of the destination and individual power constraint of each relay to jam the eavesdropper. This optimization problem is the same as those of minimizing the total transmit power of the relays for the information-bearing signals with SINR and individual power constraint of each relay. With perfect CSI, the optimization problem is given by

where is the required SINR threshold.

The problem in (9) has been solved in [17], where the authors convert this problem to an SOCP problem which can be solved optimally by interior methods. However, the authors in [17] only consider the security transmission scheme under the condition of perfect CSI.

In this paper, we focus on investigating the case where the CSI is known imperfectly at the source with its uncertainty. Different phenomena, e.g. estimation error, channel mobility, etc, can result in CSI uncertainty.

The channel gain hsr can be directly estimated from training at the source. At high training SINRs, it is reasonable to assume that hsr can be known nearly perfectly at the source. This is, however, not true for hrd , which, in practice, will have to be estimated by the relays and then fed back the source.

Channel uncertainty in hrd is modeled as

where hrd is the true channel gain, ĥrd = (hrd,1,⋯, hrd,n)H is the estimated channel gain, and erd = (erd,1,⋯, erd,n)H is the additive error vector. A norm-bounded CSI model is considered without any statistical knowledge, where it is assumed that

This error model has been adopted in [25] and [26] where it is called as the spherical error model. It is worth noting that the results of this paper can be easily extended to the case with an ellipsoidal error region.

With imperfect CSI, AN lies in the null space of the estimated channel hrd and the received SINR at the destination is rewritten as

where .

Therefore, the secrecy rate with CSI uncertainty can be denoted as

Obviously, we can note that the orthogonality between the intended signal and the AN will be lost due to the inaccurate CSI for legitimate links. We also find that the inaccurate CSI can result in degrading to the intended user’s SINR because of interference leakage to the intended user by comparing (6) with (12). However, if the transmitter has partial knowledge of the CSI error, it is possible that the received SINR target at the destination is achieved by adjusting power allocation for the information-bearing signals and AN.

Considering the CSI uncertainty, our aim is to minimize the total transmit power of the relays for the information-bearing signals with worst-case SINR constraint of the destination and the individual power constraint of each relay. The remaining power is used for AN to confuse the eavesdropper. Mathematically, the problem can be written as

The worst-case SINR constraint in (14) can be rewritten as , where f(erd) is given by (15).

We can know from [27] that the minimum of f(erd) is mathematically intractable due to that both the signal and self-interference contain the uncertainty. The minimum of f(erd) is very difficult to solve.

 

4. ROBUST AF RELAY BEAMFORMING SCHEME

In this section, we first provide an upper bound and a lower bound for the problem in (14). The lower bound is generally not achievable, so a scheme is also proposed to obtain the robust beamforming weight vector w.

4.1 A Lower Bound of (14)

To obtain a lower bound for the problem in (14), a box region is considered. The box region is defined as

ZR is a subset of S and the beamforming scheme based on ZR will be a lower bound.

We define can be achieved.

Lemma 1: The problem in (14) is lower bounded by solving the problem in (17) which is a convex power minimization problem.

where . The proof of Lemma 1 is given in Appendix A.

4.2 An Upper Bound of (14)

Using the Csuchy-Schwarz inequality and the triangle inequality, we can obtain (18) and (19).

So we can obtain a lower bound of SINRLI, which is given by in (20).

An upper bound of (14) can be obtained by solving the following problem.

From [17], we know that the problem in (21) can be transformed into an SOCP problem which can be solved optimally. This method is straightforward but the lower bound is too loose to obtain a reasonable solution.

4.3 Robust Beamforming Design

The lower bound is not available in general, so we propose a robust beamforming scheme to obtain the beamforming weight vector.

Using the fact ║erd║2≤nρ2, we can obtain

where .

We can reformulate the problem in (14) as

The worst-case SINR constraint in (23) can be reformulated as

where .

Using S-Procedure [27] which is given in Appendix B, the problem in (24) can be equivalently rewritten as (25).

By applying the fact tr (AB) = tr (BA) and the problem in (23) is reformulated as

where Wr=wwH.

The difficult constraint in (26) is the rank constraint rank(Wr)=1 which is nonconvex. Thus, we may drop it to obtain the following relaxed version of (26).

The problem in (27) is a semidefinite programming (SDP) problem which is convex and can be optimally solved using interior methods. The problem in (27) has n+1 constraints and the dimension of Wr is n×n, so the complexity to solve it is at least [27], where ε is a solution accuracy.

The important question is whether the solution to the problem in (27) is of rank one. If Wr is rank one, then we can obtain wopt by using standard matrix decomposition and this solution is globally optimal. If it is not rank one, a randomization method in Table I can be applied to convert a global optimal solution Wr to (27) into a feasible solution w to (23). Different randomization methods have been researched in the literature [28]-[30]. The one we choose is Table I. If the feasible solution w does not subject to some constraints in (23), we can map it to a "nearby" feasible solution of (23) [28].

Table 1.Randomization Technique for Semidefinite Relaxation Approach

After w is obtained, the transmit power of the each relay for the information-bearing signals can be given by Ps,i = [wwH]i,i[T]i,i, and AN consumes the remaining power. The transmit power of AN can be given by .

We can get by solving the following optimization problem.

where .

We define , the problem in (28) is rewritten as

Obviously, the problem in (29) is a linear programming problem which is convex, thus it can be easily solved to obtain the optimal solution [31].

 

5. SIMULATION RESULTS

In this section, we present simulation results to analyze the performance of the robust beamforming design for the cooperative wireless relay networks aiming to enhance secrecy transmission at the physical layer. We evaluate the performance of the proposed schemes in the Rayleigh flat-fading channels. In all simulations, we assume that the channel coefficients consist of complex zero-mean Gaussian random vectors with unit variance. For simplicity, we assume that all the noise power is the same for both the destination and the eavesdropper: . To analyze the performance, we assume that the power constraint of the each relay Pi, i=1,⋯, n is equal. We set the number of the relays n = 3. We assume that the CSI errors are uniformly distributed in S . To evaluate the performance of the proposed system design, we perform 1000 independent trails to get the average results. Four schemes are provided in simulation results: a) the proposed robust beamforming design in Section IV-C, b) the lower bound in Section IV-A, c) the upper bound in Section IV-B, d) the naive scheme in which the estimated CSI is treated as the perfect channels, e) the scheme with perfect CSI proposed by [17] .

Fig. 2 provides the expected transmit power for information-bearing signals results for different desired SINRs with the CSI error bound ρ2=0.01. In the figure, a) is labled as “Proposed design” , b) is labled as “Lower bound” and c) is labled as “Upper bound”. The results show the proposed robust beamforming design achieves nearly the same expected transmit power for information-bearing signals as the lower bound. The difference between the proposed robust beamforming design and the lower is less than 1 dB. It is because that the lower is not achievable.

Fig. 2.Transmit power for information-bearing signals versus desired SINR at the destination

Fig. 3 shows the expected transmit power for information-bearing signals results for different number of relays with the CSI error bound ρ2=0.01 using the methods a) b) and c). The curves show the proposed design achieves nearly the same expected transmit power for information-bearing signals as the lower bound. The results also show that the transmitted power decreases as the number of relays increases. This is because that the more relay nodes provide the power gain. Though the transmit power can be saved by increasing the number of relays, the complexity and the weight of will increase as the number of relays increases. Therefore, the optimal number of relays should be balanced by taking into account all these views.

Fig. 3.Transmit power for information-bearing signals versus the number of relays

In Fig. 4, the curves show that the values of the received worst-case SINR in the legitimate link and in the wiretap link versus the SINR requirement on desired destination with the CSI error bound ρ2=0.01. In the figure, the methods a), d) and e) are respectively labeled as “robust”, “naive” and “perfect”. The receiving destination is labled as “Destination” and the eavesdropper is labled as “Eve”. In “naive” scheme, the knowledge of CSI errors is not used and the estimated CSI is treated as the perfect channels. We notice that even if the channels are perturbed small, the SINR for the legitimate user is greatly degraded in the “naive” scheme. In contrast, the legitimate user can achieve the SINR requirements and the received SINR at the eavesdropper is degraded in the “robust” scheme. We also notice that the SINR of the eavesdropper in the “robust” scheme is lower than that in the “perfect” scheme. It is because that the transmit power for information-bearing signal is increased because of interference caused by the imperfect CSI, which results in the remaining power used for the AN reducing. It is shown that the received SINR at the eavesdropper increases with desired SINR at the destination increasing. It is understanding because the transmit power used for the AN decreases.

Fig. 4.Received worst-case SINR versus desired SINR at destination

Fig. 5 shows the secrecy capacity for the different received SINR targets at the destination under the condition of perfect and imperfect CSI with the CSI error bound ρ2=0.01. In the figure, the methods a), d) and e) are respectively labeled as "robust", "naive" and "perfect". The case where CSI is perfect is shown, obviously the best secrecy capacity is obtained. When CSI is perfect, the AN can be made invisible to the desired destination while degrading the potential eavesdropper’s channel. We also notice that the “robust” scheme provide nonzero secrecy capacity for all the desired SINRs. In the “naive” scheme, the secrecy capacity is reduced to zero due to that the received SINR at tha eavesdropper is always greater than that at the destination. Obviously, the robust beamforming scheme can recover a fraction of the SINR lost.

Fig. 5.Secrecy rate versus desired SINR

In Fig. 6, the impact of the magnitude of the CSI error bound on SINR performance in the robust beamforming scheme is illustrated. In the figure, the method a) is labeled as “robust”. The receiving destination is labled as “Destination” and the eavesdropper is labled as “Eve”. We notice that the destination can achieve the desired received SINR. It is also shown that the received SINR at the eavesdropper increases with the CSI error bound increasing and the gap between the destination and the eavesdropper in the robust scheme decreases.

Fig. 6.Received worst-case SINR for destination and eavesdropper versus CSI error bound ρ2

The expected transmit power for information-bearing signals results against the CSI error bound, ρ2, are provided in Fig. 7. Results reveal that as expected, the transmit power for information-bearing signals increases as the error bound increases.

Fig. 7.Transmit power for information-bearing signals versus CSI error bound ρ2

 

6. CONCLUSIONS

The security transmission scheme is presented for the cooperative wireless relay networks in the presence of a passive eavesdropper. Placing the highest emphasis on fairness, the robust cooperative relay beamforming for physical layer security is designed to maximize the transmit power of the AN to confuse the passive eavesdropper, while achieving worst-case SINR constraint at the legitimate user and the power constraint of each relay node. This problem can be solved by using S-Procedure and rank relaxation techniques. Simulation results show that the uncertainty of the CSI can greatly affect the SINR at the legitimate user. The robust beamforming scheme proposed by the paper can recover a fraction of the SINR lost in the perfect CSI.

References

  1. M. Bloch, J. Barros, M. R. D. Rodrigues, et al., “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. Article (CrossRef Link) https://doi.org/10.1109/TIT.2008.921908
  2. Y. Liang, H. V. Poor and S. Shamai, “Secure Communication Over Fading Channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2491, June 2008. Article (CrossRef Link) https://doi.org/10.1109/TIT.2008.921678
  3. J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forens. Security, vol. 7, no. 1, pp. 310-320, Feb. 2012. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2011.2166386
  4. T. Liu and S. Shamai, “A note on secrecy capacity of the multi-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009. Article (CrossRef Link) https://doi.org/10.1109/TIT.2009.2018322
  5. A. Khisti and G. Wornell, “Secure transmission with multiple antennas II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010. Article (CrossRef Link) https://doi.org/10.1109/TIT.2010.2068852
  6. A. Wyner. “The wire-tap channel,” Bell. Syst Tech. J, vol.54, no.8, pp.1355-1387, Jan 1975. Article (CrossRef Link) https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  7. I. Krikidis, J. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009. Article (CrossRef Link) https://doi.org/10.1109/TWC.2009.090323
  8. G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. Article (CrossRef Link) https://doi.org/10.1109/TSP.2010.2092774
  9. J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011. Article (CrossRef Link) https://doi.org/10.1109/TSP.2011.2161295
  10. S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978. Article (CrossRef Link) https://doi.org/10.1109/TIT.1978.1055917
  11. E. Tekin and A. Yener, “The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54 no. 6, pp. 2735-2751, June 2008. Article (CrossRef Link) https://doi.org/10.1109/TIT.2008.921680
  12. L. Dong, Z. Han, A. P. Petropulu, et al. “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 50, no. 3, pp. 1875-1888, Mar. 2010. Article (CrossRef Link) https://doi.org/10.1109/TSP.2009.2038412
  13. R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012. Article (CrossRef Link) https://doi.org/10.1109/TVT.2012.2209692
  14. A. Khisti, "Algorithms and architectures for multiuser, multi-terminal, and multilayer information-theoretic security," Ph.D. dissertation, MIT, 2008.
  15. S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. Article (CrossRef Link) https://doi.org/10.1109/TWC.2008.060848
  16. A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011. Article (CrossRef Link) https://doi.org/10.1109/TSP.2010.2078810
  17. H. M. Wang, M. Luo and X. G. Xia, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Process. Letters, vol. 20, no. 1, pp. 39-42, Jan. 2013. Article (CrossRef Link) https://doi.org/10.1109/LSP.2012.2227725
  18. H. Wang, M. Luo, Q. Yin, etc., “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks,” IEEE Trans. Information Forensics and Security, vol. 8, no.8, pp. 2007-2020, Oct. 2013. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2013.2287046
  19. C. Wang, H. Wang, X. Xia. “Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,” IEEE Trans. Wireless Commun., vol. 14, no.2, pp. 589-605, Sep. 2014. Article (CrossRef Link) https://doi.org/10.1109/TWC.2014.2354635
  20. C. Wang and H. Wang, “Robust Joint Beamforming and Jamming for secure AF networks: low-complexity design,” IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May, 2015. Article (CrossRef Link) https://doi.org/10.1109/TVT.2014.2334640
  21. X. Gong, H. Long etc, "Robust AF Relay Beamforming for Security with MSE Constraint," accepted by IET Commun..
  22. Y. Zou, X. Wang, W. Shen, “Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks,” IEEE J. Sel. Topics Commun., vol. 31, no. 10, Oct. 2013. Article(CrossRef Link)
  23. I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009. Article (CrossRef Link) https://doi.org/10.1109/TWC.2009.090323
  24. M. Pei, J. Wei, K.-K. Wong and X. Wang, “Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012. Article (CrossRef Link) https://doi.org/10.1109/TWC.2012.070912.110789
  25. M. Shenouda and T. Davidson, “Convex conic formulations of robust downlink precoder designs with quality of service constraints,” IEEE J. Sel. Topics Signal Process, vol. 1, no. 4, pp. 714¨C724, Dec. 2007. Article(CrossRef Link) https://doi.org/10.1109/JSTSP.2007.910623
  26. A. Pascual-Iserte, D. Palomar, A. Perez-Neira, and M. Lagunas, “A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization,” IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346¨C360, Jan. 2006. Article(CrossRef Link) https://doi.org/10.1109/TSP.2005.861084
  27. S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004. Article (CrossRef Link)
  28. Z. Q. Luo, W. K. Ma, A. C. So, Y. Ye and S. Zhang, “Semidefinite relaxation of quadratic optimization problems: from its practical deployments and scope of applicability to key theoretical results,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010. Article (CrossRef Link) https://doi.org/10.1109/MSP.2010.936019
  29. N. D. Sidiropoulos, T. N. Davidson and Z. Q. Luo, “Transmit beamforming for physical-layer multicasting,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 2239-2251, June 2006. Article (CrossRef Link) https://doi.org/10.1109/TSP.2006.872578
  30. S. Zhang, "Quadratic maximization and semidefinite relaxation," Math. Program., ser. A, vol. 87, pp. 453-465, 2000. Article (CrossRef Link) https://doi.org/10.1007/s101070050006
  31. D. G. Luenberger and Y. Ye, Linear and nonlinear programming. Springer, 2006.