DOI QR코드

DOI QR Code

Joint optimization of beamforming and power allocation for DAJ-based untrusted relay networks

  • Yao, Rugui (School of Electronics and Information, Northwestern Polytechnical University) ;
  • Lu, Yanan (School of Electronics and Information, Northwestern Polytechnical University) ;
  • Mekkawy, Tamer (School of Electronics and Information, Northwestern Polytechnical University) ;
  • Xu, Fei (School of Electronics and Information, Northwestern Polytechnical University) ;
  • Zuo, Xiaoya (School of Electronics and Information, Northwestern Polytechnical University)
  • Received : 2018.03.23
  • Accepted : 2018.06.11
  • Published : 2018.12.06

Abstract

Destination-assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ-based untrusted relay network with multiple antennas installed is presented. To increase the secrecy, a joint optimization of beamforming and power allocation at the source and destination is studied. A matched-filter precoder is introduced to maximize the cooperative jamming signal by directing cooperative jamming signals toward untrusted relays. Then, based on generalized singular-value decomposition (GSVD), a novel transmitted precoder for confidential signals is devised to align the signal into the subspace corresponding to the confidential transmission channel. To decouple the precoder design and optimal power allocation, an iterative algorithm is proposed to jointly optimize the above parameters. Numerical results validate the effectiveness of the proposed scheme. Compared with other schemes, the proposed scheme shows significant improvement in terms of security performance.

Keywords

References

  1. A. Barenghi et al., Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proc. IEEE 100, (2012), no. 11, 3056-3076. https://doi.org/10.1109/JPROC.2012.2188769
  2. A. Mukherjee et al., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Sur. Tut. 16, (2014), no. 3, 1550-1573. https://doi.org/10.1109/SURV.2014.012314.00178
  3. N. Yang et al., Safeguarding 5G wireless communication networks using physical layer security, IEEE Commun. Mag. 53, (2015), no. 4, 20-27. https://doi.org/10.1109/MCOM.2015.7081071
  4. A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54, (1975), no. 8, 1355-1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  5. S. Leung-Yan-Cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inform. Theory 24, (1978), no. 4, 451-456. https://doi.org/10.1109/TIT.1978.1055917
  6. J. N. Laneman, D. N. C. Tse, and G. W. Wornell, Cooperative diversity in wireless networks: Efficient protocols and outage behavior, IEEE Trans. Inform. Theory 50, (2004), no. 12, 3062-3080. https://doi.org/10.1109/TIT.2004.838089
  7. P. Xu, Z. Ding, and X. Dai, Achievable secrecy rates for relay-eavesdropper channel based on the application of noisy network coding, IEEE Trans. Inform. Forens. Security 13, (2018), no. 7 1736-1751. https://doi.org/10.1109/TIFS.2018.2805601
  8. L. Fan et al., Secure multiuser communications in multiple amplify-and-forward relay networks, IEEE Trans. Commun. 62, (2014), no. 9, 3299-3310. https://doi.org/10.1109/TCOMM.2014.2345763
  9. L. Fan et al., Secure multiple amplify-and-forward relaying with cochannel interference, IEEE J. Sel. Topics Signal Process. 10, (2016), no. 8, 1494-1505. https://doi.org/10.1109/JSTSP.2016.2607692
  10. X. He and A. Yener, Two-hop secure communication using an untrusted relay: A case for cooperative jamming, IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LO, USA, Dec, 2008, pp. 1-5.
  11. R. Yao et al., Optimised power allocation to maximise secure rate in energy harvesting relay network, Electron. Lett. 52, (2016), no. 22, 1879-1881. https://doi.org/10.1049/el.2016.3201
  12. Y. Oohama, Capacity theorems for relay channels with confidential messages, IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, 24-25, June 2007, pp. 926-930.
  13. X. He and A. Yener, Cooperation with an untrusted relay: A secrecy perspective, IEEE Trans. Inform. Theory 56, (2010), no. 8, 3807-3827. https://doi.org/10.1109/TIT.2010.2050958
  14. C. Wang, H. M. Wang, and X. G. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Trans. Wireless Commun. 14, (2015), no. 2, 589-605. https://doi.org/10.1109/TWC.2014.2354635
  15. L. Sun et al., Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett. 19, (2015), no. 3, 463-466. https://doi.org/10.1109/LCOMM.2014.2385095
  16. A. Kuhestani, A. Mohammadi, and M. Mohammadi, Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers, IEEE Trans. Inform. Forens. Security 13, (2018), no. 2, 341-355. https://doi.org/10.1109/TIFS.2017.2750102
  17. H. M. Wang et al., Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, IEEE Trans. Inform. Forens. Security 8, (2013), no. 12, 2007-2020. https://doi.org/10.1109/TIFS.2013.2287046
  18. H. M. Wang, Q. Yin, and X. G. Xia, Distributed beamforming for physical-layer security of two-way relay networks, IEEE Trans. Signal Process. 60, (2012), no. 7, 3532-3545. https://doi.org/10.1109/TSP.2012.2191543
  19. C. Jeong, I. M. Kim, and D. I. Kim, Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system, IEEE Trans. Signal Process. 60, (2012), no. 1, 310-325. https://doi.org/10.1109/TSP.2011.2172433
  20. J. Mo et al., Secure beamforming for MIMO two-way communications with an untrusted relay, IEEE Trans. Signal Process. 62, (2014), no. 9, 2185-2199. https://doi.org/10.1109/TSP.2014.2307276
  21. J. Xiong et al., Destination-aided cooperative jamming for dualhop amplify-and-forward MIMO untrusted relay systems, IEEE Trans. Veh. Technol. 65, (2016), no. 9, 7274-7284. https://doi.org/10.1109/TVT.2015.2490099
  22. J. Huang and A. L. Swindlehurst, Joint transmit design and node selection for one-way and two-way untrusted relay channels, Asilomar Conf. Signals, Syst. Comput. (ASILOMAR 2013), Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
  23. D. B. da Costa and S. Aissa, Beamforming in dual-hop fixed gain relaying systems, IEEE Int. Conf. Commun. (ICC), Dresden, Germany, 14-18, June 2009, pp. 1-5.
  24. J. Zhang and M. C. Gursoy, Relay beamforming strategies for physical-layer security, Annu. Conf. Inform. Sci. Syst. (CISS), Princeton, NJ, USA, Mar. 2010, pp. 1-6.
  25. X. Tang et al., Interference assisted secret communication, IEEE Trans. Infom., Theory 57 (2011), no. 5, May 2011, pp. 3153-3167. https://doi.org/10.1109/TIT.2011.2121450
  26. R. Yao et al., Secrecy rate-optimum energy splitting for an untrusted and energy harvesting relay network, IEEE Access 6, (2018), 19238-19246. https://doi.org/10.1109/ACCESS.2018.2819639
  27. A. Kuhestani, A. Mohammadi, and P. L. Yeoh, Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer, IEEE Trans. Commun. 66, (2018), no. 6, 2671-2684. https://doi.org/10.1109/TCOMM.2018.2802951
  28. D. S. Kalogerias et al., Mobile jammers for secrecy rate maximization in cooperative networks, IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Vancouver, Canada, May 2013, pp. 2901-2905.
  29. L. Lv et al., Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation, IET Commun. 11, (2017), no. 3, 393-399. https://doi.org/10.1049/iet-com.2016.0355
  30. S. A. A. Fakoorian and A. L. Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer, IEEE Trans. Signal Process. 59, (2011), no. 10, 5013-5022. https://doi.org/10.1109/TSP.2011.2161298
  31. A. Kuhestani and A. Mohammadi, Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study, IET Commun. 10, (2016), no. 1, 17-23. https://doi.org/10.1049/iet-com.2015.0078
  32. P. B. Bok et al., Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles, IEEE Veh. Technol. Conf. (VTC2014-Fall), Vancouver, Canada, Sept. 2014, pp. 1-6.
  33. D. B. Rawat, R. Grodi, and C. Bajracharya, Enhancing connectivity for communication and control in unmanned aerial vehicle networks, IEEE Radio Wireless Symp. (RWS), San Diego, CA, USA, Jan. 2015, pp. 200-202.
  34. H. Chu and P. Xu, Relay selection with feedback beamforming information for NLoS 60 GHz mm wave WLANs/WPANs, IEEE Int. Conf. Commun. (ICC), Sydney, Australia, June 2014, pp. 5514-5519.
  35. W. W. Diab, N. Yousefi, and S. Powell, System and method for mirroring power over ethernet registers in a physical layer device over a single isolation boundary, U.S. Patent 8 428 248, April 23, 2013.
  36. T. Mekkawy et al., Joint beamforming alignment with suboptimal power allocation for a two-way untrusted relay network, IEEE Trans. Inform. Forens. Security 13, (2018), no. 10, 2464-2474. https://doi.org/10.1109/TIFS.2018.2819132
  37. R. Zhang et al., Optimal beamforming for two-way multi-antenna relay channel with analogue network coding, IEEE J. Sel. Areas Commun. 27, (2009), no. 5, 699-712. https://doi.org/10.1109/JSAC.2009.090611
  38. T. Mekkawy et al., Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error, Wireless Opt. Commun. Conf. (WOCC), Newark, NJ, USA, Apr. 2017, pp. 1-5.
  39. X. Chen et al., A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Sur. Tut. 19, (2017), no. 2, 1027-1053. https://doi.org/10.1109/COMST.2016.2633387
  40. H. M. Wang, F. Liu, and X. G. Xia, Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks, IEEE Trans. Infom. Forens. Security 9, (2014), no. 8, 1240-1250. https://doi.org/10.1109/TIFS.2014.2327480
  41. N. Ouyang et al., Destination assisted jamming and beamforming for improving the security of AF relay systems, IEEE Access 5, (2017), 4125-4131. https://doi.org/10.1109/ACCESS.2017.2682838
  42. D. Senaratne and C. Tellambura, GSVD beamforming for twouser MIMO downlink channel, IEEE Trans. Veh. Technol. 62, (2013), no. 6, 2596-2606. https://doi.org/10.1109/TVT.2013.2241091
  43. D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.: Cambridge Univ. Press, Sep. 2005.