Browse > Article
http://dx.doi.org/10.3837/tiis.2013.06.004

Secure Beamforming with Artificial Noise for Two-way Relay Networks  

Li, Dandan (School of Computer and Information Technology, Beijing Jiaotong University)
Xiong, Ke (State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University)
Du, Guanyao (School of Computer and Information Technology, Beijing Jiaotong University)
Qiu, Zhengding (School of Computer and Information Technology, Beijing Jiaotong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.6, 2013 , pp. 1418-1432 More about this Journal
Abstract
This paper studies the problem of secure information exchange between two sources via multiple relays in the presence of an eavesdropper. To this end, we propose a relay beamforming scheme, i.e., relay beamforming with artificial noise (RBwA), where the relay beamforming vector and the artificial noise vector are jointly designed to maintain the received signal-to-interference-ratio (SINR) at the two sources over a predefined Quality of Service (QoS) threshold while limiting the received SINR at the eavesdropper under a predefined secure threshold. For comparison, the relay beamforming without artificial noise (RBoA) is also considered. We formulate two optimization problems for the two schemes, where our goal is to seek the optimal beamforming vector to minimize the total power consumed by relay nodes such that the secrecy of the information exchange between the two sources can be protected. Since both optimization problems are nonconvex, we solve them by semidefinite program (SDP) relaxation theory. Simulation results show that, via beamforming design, physical layer secrecy of two-way relay networks can be greatly improved and our proposed RBwA outperforms the RBoA in terms of both low power consumption and low infeasibility rate.
Keywords
relay beamforming; artificial noise; two-way relay; physical layer secrecy; optimal design;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.   DOI   ScienceOn
2 A. Khisti, and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 2088-2104, 2010.
3 F. Oggier, and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4961-4972, 2011.   DOI   ScienceOn
4 L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 2613 - 2616, April 19-24, 2009.
5 J. Zhang, and M. C. Gursoy, "Collaborative relay beamforming for secure broadcasting," in Proc. of IEEE Wireless Communications and Networking Conf., pp. 1-6, April, 18-21, 2010.
6 L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor,, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2010.   DOI   ScienceOn
7 H. Wang, Q. Yin, and X. Xia, "Improving the physical-layer security of wireless two-way relaying via analog network coding," in Proc. of IEEE Global Telecommunications Conf., pp. 1-6, December 5-9, 2011.
8 W.-C. Liao, T.-H Chang, W.-K. Ma, and C.-Y. Chi, "Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink," in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing,, pp. 2562-2565, March 14-19, 2010.
9 W.-C. Liao, T.-H Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011.   DOI   ScienceOn
10 M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Transactions on Information Theory, vol.54, no. 6, pp. 2515-2534, June 2008.   DOI   ScienceOn
11 Z.-Q. Luo, W.-K. Ma, A. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20-34, 2010.
12 Y. Huang, and D. P. Palomar, "Rank-constrained separable semidefinite programming with applications to optimal beamforming," IEEE Transactions on Signal Processing, vol. 58, no. 2, pp. 664-678, 2010.   DOI   ScienceOn
13 M. Grant, and S. Boyd, CVX: MATLAB software for disciplined, Convex Programming, June 2009.