Robust Cooperative Relay Beamforming Design for Security |
Gong, Xiangwu
(College of Communications Engineering, PLA University of Science and Technology)
Dong, Feihong (College of Communications Engineering, PLA University of Science and Technology) Li, Hongjun (College of Communications Engineering, PLA University of Science and Technology) Shao, Wei (College of Communications Engineering, PLA University of Science and Technology) |
1 | G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. Article (CrossRef Link) DOI |
2 | J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011. Article (CrossRef Link) DOI |
3 | S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978. Article (CrossRef Link) DOI |
4 | E. Tekin and A. Yener, “The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54 no. 6, pp. 2735-2751, June 2008. Article (CrossRef Link) DOI |
5 | L. Dong, Z. Han, A. P. Petropulu, et al. “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 50, no. 3, pp. 1875-1888, Mar. 2010. Article (CrossRef Link) DOI |
6 | R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012. Article (CrossRef Link) DOI |
7 | A. Khisti, "Algorithms and architectures for multiuser, multi-terminal, and multilayer information-theoretic security," Ph.D. dissertation, MIT, 2008. |
8 | S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. Article (CrossRef Link) DOI |
9 | A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011. Article (CrossRef Link) DOI |
10 | M. Bloch, J. Barros, M. R. D. Rodrigues, et al., “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. Article (CrossRef Link) DOI |
11 | Y. Liang, H. V. Poor and S. Shamai, “Secure Communication Over Fading Channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2491, June 2008. Article (CrossRef Link) DOI |
12 | J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forens. Security, vol. 7, no. 1, pp. 310-320, Feb. 2012. Article (CrossRef Link) DOI |
13 | T. Liu and S. Shamai, “A note on secrecy capacity of the multi-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009. Article (CrossRef Link) DOI |
14 | A. Khisti and G. Wornell, “Secure transmission with multiple antennas II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010. Article (CrossRef Link) DOI |
15 | A. Wyner. “The wire-tap channel,” Bell. Syst Tech. J, vol.54, no.8, pp.1355-1387, Jan 1975. Article (CrossRef Link) DOI |
16 | I. Krikidis, J. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009. Article (CrossRef Link) DOI |
17 | S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, 2004. Article (CrossRef Link) |
18 | S. Zhang, "Quadratic maximization and semidefinite relaxation," Math. Program., ser. A, vol. 87, pp. 453-465, 2000. Article (CrossRef Link) DOI |
19 | M. Shenouda and T. Davidson, “Convex conic formulations of robust downlink precoder designs with quality of service constraints,” IEEE J. Sel. Topics Signal Process, vol. 1, no. 4, pp. 714¨C724, Dec. 2007. Article(CrossRef Link) DOI |
20 | A. Pascual-Iserte, D. Palomar, A. Perez-Neira, and M. Lagunas, “A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization,” IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346¨C360, Jan. 2006. Article(CrossRef Link) DOI |
21 | Z. Q. Luo, W. K. Ma, A. C. So, Y. Ye and S. Zhang, “Semidefinite relaxation of quadratic optimization problems: from its practical deployments and scope of applicability to key theoretical results,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010. Article (CrossRef Link) DOI |
22 | N. D. Sidiropoulos, T. N. Davidson and Z. Q. Luo, “Transmit beamforming for physical-layer multicasting,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 2239-2251, June 2006. Article (CrossRef Link) DOI |
23 | Y. Zou, X. Wang, W. Shen, “Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks,” IEEE J. Sel. Topics Commun., vol. 31, no. 10, Oct. 2013. Article(CrossRef Link) |
24 | D. G. Luenberger and Y. Ye, Linear and nonlinear programming. Springer, 2006. |
25 | H. M. Wang, M. Luo and X. G. Xia, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Process. Letters, vol. 20, no. 1, pp. 39-42, Jan. 2013. Article (CrossRef Link) DOI |
26 | H. Wang, M. Luo, Q. Yin, etc., “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks,” IEEE Trans. Information Forensics and Security, vol. 8, no.8, pp. 2007-2020, Oct. 2013. Article (CrossRef Link) DOI |
27 | C. Wang, H. Wang, X. Xia. “Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,” IEEE Trans. Wireless Commun., vol. 14, no.2, pp. 589-605, Sep. 2014. Article (CrossRef Link) DOI |
28 | C. Wang and H. Wang, “Robust Joint Beamforming and Jamming for secure AF networks: low-complexity design,” IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May, 2015. Article (CrossRef Link) DOI |
29 | X. Gong, H. Long etc, "Robust AF Relay Beamforming for Security with MSE Constraint," accepted by IET Commun.. |
30 | I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009. Article (CrossRef Link) DOI |
31 | M. Pei, J. Wei, K.-K. Wong and X. Wang, “Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012. Article (CrossRef Link) DOI |