DOI QR코드

DOI QR Code

Cooperative Beamformer Design for Improving Physical Layer Security in Multi-Hop Decode-and-Forward Relay Networks

  • Lee, Han-Byul (School of Electrical Engineering and Computer Science, Seoul National University) ;
  • Lee, Jong-Ho (Department of Electronic Engineering, Gachon University) ;
  • Kim, Seong-Cheol (School of Electrical Engineering and Computer Science, Seoul National University)
  • Received : 2015.09.04
  • Accepted : 2015.11.22
  • Published : 2016.01.31

Abstract

In this paper, we consider secure communications in multi-hop relaying systems, where multiple decode-and-forward (DF) relays are located at each individual hop and perform cooperative beamforming to improve physical layer security. In order to determine the cooperative relay beamformer at each hop, we propose an iterative beamformer update scheme using semidefinite relaxation and bisection techniques. Numerical results are presented to verify the secrecy rate performance of the proposed scheme.

Keywords

Acknowledgement

Grant : 무선 MIMO Ad-hoc 네트워크를 위한 게임 이론 기반의 제한적 피드백 분산 빔포밍 기술 개발

References

  1. A. Mukherjee, S. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: a survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014. Article (CrossRef Link) https://doi.org/10.1109/SURV.2014.012314.00178
  2. A. D. Wyner, “The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. Article (CrossRef Link) https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, March 2010. Article (CrossRef Link) https://doi.org/10.1109/TSP.2009.2038412
  4. G. Zheng, L. Choo, and K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317-1322, March 2011. Article (CrossRef Link) https://doi.org/10.1109/TSP.2010.2092774
  5. J. Li, A. P. Petropulu, and S. Weber, “On cooperative relaying schemes for wireless physical layer security," IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4985-4997, October 2011. Article (CrossRef Link) https://doi.org/10.1109/TSP.2011.2159598
  6. H. Wang, Q. Yin, and X. Xia, “Distributed beamforming for physical-layer security of two-way relay networks," IEEE Transactions on Signal Processing, vol. 60, no. 7, pp. 3532-3545, July 2012. Article (CrossRef Link) https://doi.org/10.1109/TSP.2012.2191543
  7. H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2007-2020, December 2013. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2013.2287046
  8. M. Lin, J. Ge, Y. Yang, and Y. Ji, “Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks," IEEE Communications Letters, vol. 18, no. 2, pp. 380-383, February 2014. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.121713.132262
  9. Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliability analysis of opportunistic relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, July 2014. Article (CrossRef Link) https://doi.org/10.1109/TVT.2013.2292903
  10. H.-M. Wang, F. Liu, and M. Yang, “Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems," IEEE Transactions on Vehicular Technology, vol. 64, no. 10, pp. 4893-4898, October 2015. Article (CrossRef Link) https://doi.org/10.1109/TVT.2014.2370754
  11. N. D. Sidiropoulos, T. N. Davidson, and Z. Lou, “Transmit beamforming for physical-layer multicasting," IEEE Transactions on Signal Processing, vol. 54, no. 6, pp. 2239-2251, June 2006. Article (CrossRef Link) https://doi.org/10.1109/TSP.2006.872578
  12. V. Havary-Nassab, S. Shahbazpanahi, A. Grami, and Z. Luo, “Distributed beamforming for relay networks based on second-order statistics of the channel state information," IEEE Transactions on Signal Processing, vol. 56, no. 9, pp. 4306-4316, September 2008. Article (CrossRef Link) https://doi.org/10.1109/TSP.2008.925945
  13. Z. Luo, W. Ma, A. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20-34, May 2010. Article (CrossRef Link) https://doi.org/10.1109/MSP.2010.936019
  14. Y. Zou, J. Zhu, X. Wang, and V. C. M. Leung, “Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, January-February 2015. Article (CrossRef Link) https://doi.org/10.1109/MNET.2015.7018202
  15. M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. Article (CrossRef Link) https://doi.org/10.1109/TIT.2008.921908
  16. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, UK: Cambridge Univ. Press, 2004. Article (CrossRef Link)
  17. J. F. Sturm, “Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones," Optimization Methods and Software, vol. 11-12, pp. 625-653, 1999. Article (CrossRef Link) https://doi.org/10.1080/10556789908805766
  18. J. Lofberg, "YALMIP: A toolbox for modeling and optimization in MATLAB," in Proc. of IEEE International Symposium on Computer Aided Control Systems Design, pp.284-289, September 2004. Article (CrossRef Link)