Browse > Article
http://dx.doi.org/10.3837/tiis.2015.11.013

Robust Cooperative Relay Beamforming Design for Security  

Gong, Xiangwu (College of Communications Engineering, PLA University of Science and Technology)
Dong, Feihong (College of Communications Engineering, PLA University of Science and Technology)
Li, Hongjun (College of Communications Engineering, PLA University of Science and Technology)
Shao, Wei (College of Communications Engineering, PLA University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.11, 2015 , pp. 4483-4501 More about this Journal
Abstract
In this paper, we investigate a security transmission scheme at the physical layer for cooperative wireless relay networks in the presence of a passive eavesdropper. While the security scheme has been previously investigated with perfect channel state information(CSI) in the presence of a passive eavesdropper, this paper focuses on researching the robust cooperative relay beamforming mechanism for wireless relay networks which makes use of artificial noise (AN) to confuse the eavesdropper and increase its uncertainty about the source message. The transmit power used for AN is maximized to degrade the signal-to-interference-plus-noise-ratio (SINR) level at the eavesdropper, while satisfying the individual power constraint of each relay node and worst-case SINR constraint at the desired receiver under a bounded spherical region for the norm of the CSI error vector from the relays to the destination. Cooperative beamforming weight vector in the security scheme can be obtained by using S-Procedure and rank relaxation techniques. The benefit of the proposed scheme is showed in simulation results.
Keywords
Security transmission; cooperative beamforming; physical layer security; imperfect CSI; SINR;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. Article (CrossRef Link)   DOI
2 J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011. Article (CrossRef Link)   DOI
3 S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978. Article (CrossRef Link)   DOI
4 E. Tekin and A. Yener, “The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54 no. 6, pp. 2735-2751, June 2008. Article (CrossRef Link)   DOI
5 L. Dong, Z. Han, A. P. Petropulu, et al. “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 50, no. 3, pp. 1875-1888, Mar. 2010. Article (CrossRef Link)   DOI
6 R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012. Article (CrossRef Link)   DOI
7 A. Khisti, "Algorithms and architectures for multiuser, multi-terminal, and multilayer information-theoretic security," Ph.D. dissertation, MIT, 2008.
8 S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. Article (CrossRef Link)   DOI
9 A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011. Article (CrossRef Link)   DOI
10 M. Bloch, J. Barros, M. R. D. Rodrigues, et al., “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. Article (CrossRef Link)   DOI
11 Y. Liang, H. V. Poor and S. Shamai, “Secure Communication Over Fading Channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2491, June 2008. Article (CrossRef Link)   DOI
12 J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forens. Security, vol. 7, no. 1, pp. 310-320, Feb. 2012. Article (CrossRef Link)   DOI
13 T. Liu and S. Shamai, “A note on secrecy capacity of the multi-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009. Article (CrossRef Link)   DOI
14 A. Khisti and G. Wornell, “Secure transmission with multiple antennas II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010. Article (CrossRef Link)   DOI
15 A. Wyner. “The wire-tap channel,” Bell. Syst Tech. J, vol.54, no.8, pp.1355-1387, Jan 1975. Article (CrossRef Link)   DOI
16 I. Krikidis, J. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009. Article (CrossRef Link)   DOI
17 S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004. Article (CrossRef Link)
18 S. Zhang, "Quadratic maximization and semidefinite relaxation," Math. Program., ser. A, vol. 87, pp. 453-465, 2000. Article (CrossRef Link)   DOI
19 M. Shenouda and T. Davidson, “Convex conic formulations of robust downlink precoder designs with quality of service constraints,” IEEE J. Sel. Topics Signal Process, vol. 1, no. 4, pp. 714¨C724, Dec. 2007. Article(CrossRef Link)   DOI
20 A. Pascual-Iserte, D. Palomar, A. Perez-Neira, and M. Lagunas, “A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization,” IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346¨C360, Jan. 2006. Article(CrossRef Link)   DOI
21 Z. Q. Luo, W. K. Ma, A. C. So, Y. Ye and S. Zhang, “Semidefinite relaxation of quadratic optimization problems: from its practical deployments and scope of applicability to key theoretical results,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010. Article (CrossRef Link)   DOI
22 N. D. Sidiropoulos, T. N. Davidson and Z. Q. Luo, “Transmit beamforming for physical-layer multicasting,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 2239-2251, June 2006. Article (CrossRef Link)   DOI
23 Y. Zou, X. Wang, W. Shen, “Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks,” IEEE J. Sel. Topics Commun., vol. 31, no. 10, Oct. 2013. Article(CrossRef Link)
24 D. G. Luenberger and Y. Ye, Linear and nonlinear programming. Springer, 2006.
25 H. M. Wang, M. Luo and X. G. Xia, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Process. Letters, vol. 20, no. 1, pp. 39-42, Jan. 2013. Article (CrossRef Link)   DOI
26 H. Wang, M. Luo, Q. Yin, etc., “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks,” IEEE Trans. Information Forensics and Security, vol. 8, no.8, pp. 2007-2020, Oct. 2013. Article (CrossRef Link)   DOI
27 C. Wang, H. Wang, X. Xia. “Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,” IEEE Trans. Wireless Commun., vol. 14, no.2, pp. 589-605, Sep. 2014. Article (CrossRef Link)   DOI
28 C. Wang and H. Wang, “Robust Joint Beamforming and Jamming for secure AF networks: low-complexity design,” IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May, 2015. Article (CrossRef Link)   DOI
29 X. Gong, H. Long etc, "Robust AF Relay Beamforming for Security with MSE Constraint," accepted by IET Commun..
30 I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009. Article (CrossRef Link)   DOI
31 M. Pei, J. Wei, K.-K. Wong and X. Wang, “Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012. Article (CrossRef Link)   DOI