Browse > Article
http://dx.doi.org/10.3837/tiis.2018.06.009

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks  

Zhang, Bo (National Digital Switching System Engineering & Technological R&D Center)
Huang, Kai-zhi (National Digital Switching System Engineering & Technological R&D Center)
Chen, Ya-jun (National Digital Switching System Engineering & Technological R&D Center)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.6, 2018 , pp. 2595-2618 More about this Journal
Abstract
In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.
Keywords
Dense heterogeneous netwoks; physical layer security; cooperative jamming; non-convex optimization; Semidefinite Relaxation (SDR);
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhang H, Liu H, and Cheng J, "Downlink Energy Efficiency of Power Allocation and Wireless Backhaul Bandwidth Allocation in Heterogeneous Small Cell Networks," IEEE Transactions on Communications, to be published.
2 Wang H M, Zheng T X and Yuan J, "Physical layer security in heterogeneous cellular networks," IEEE Transactions on Communications, vol. 64, no. 3, pp. 1204-1219, March, 2016.   DOI
3 Wu H, Tao X and Li N, "Secrecy Outage Probability in Multi-RAT Heterogeneous Networks," IEEE Communications Letters, vol. 20, no. 1, pp. 53-56, January, 2016.   DOI
4 Zhong Zhi-hao, Luo Wen-yu, and Peng Jian-hua, "Secrecy Performasnce Analysis of Cooperative Transmisson and Cooperative jamming in K-tier Heterogeneous Cellular Networks," Science China: Information Science, vol. 1, pp. 004-011, January, 2016.
5 Xu M, Tao X and Yang F, "Enhancing Secured Coverage with CoMP Transmission in Heterogeneous Cellular Networks," IEEE Communications Letters, vol. 20, no. 11, pp. 2272-2275, November, 2016.   DOI
6 Liu Y, Chen H H and Wang L, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges," IEEE Transactions on Information Forensics and Security, vol. 19, no. 1, pp. 347-376, August, 2017.
7 Li B, Fei Z, Chu Z, "Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer," IEEE Systems Journal, to be published.
8 H. Zhang, S. Huang, and C. Jiang, "Energy Efficient User Association and Power Allocation in Millimeter Wave Based Ultra Dense Networks with Energy Harvesting Base Stations," IEEE Journal on Selected Areas in Communications, vol. 35, no. 9, pp. 1936-1947, September, 2017.   DOI
9 Li B, Fei Z and Chu Z, "Optimal Transmit Beamforming for Secure SWIPT in a Two-Tier HetNet," IEEE Communications Letters, vol. 21, no. 11, pp. 2476-2479, November, 2017.   DOI
10 Y Wang, Z Miao and L Jiao, "Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study," IEEE Access, vol. 4, no. 99, pp. 9082-9092, December, 2017.
11 LUO Z Q, MA W K and SO A C, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20-34, April, 2010.   DOI
12 S. Yang, T. Lv, and L. Hanzo, "Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM," IEEE Transactions on Vehicular Technology, vol. 62, no. 4, pp. 1667-1677, December, 2013.   DOI
13 BECK A, BEN-TAL A and TETRUASHVILI L, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," Journal of Global Optimization, vol. 47, no. 1, pp. 29-51, May, 2010.   DOI
14 Zhu F, Yao M, "Improving Physical Layer Security for CRNs Using SINR-Based Cooperative Beamforming," IEEE Transactions on Vehicular Technology, vol. 1, no. 1, pp. 1-7, March, 2016.
15 Zhang X N, Tan Z H and Xu S Y, "Utility maximization based on cross-layer design for multi-service in macro-femto heterogeneous networks," IEEE Transactions on Wireless Communication, vol. 12, pp. 5607-5620, November, 2013.   DOI
16 Li N, Tao X and Wu H, "Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, September, 2016.   DOI
17 Li N, Tao X and Xu J, "Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback," IEEE Communications Letters, vol. 18, no. 6, pp.969-972, June, 2014.   DOI
18 CHARNES A, COOPER W, "Programming with linear fractional functionals," Naval Research Logistics Quarterly, vol. 9, no. 3, pp. 181-186, March, 2010.
19 S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 640-649, May, 2011.   DOI
20 Zhang H, Xing H, and Cheng J, "Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming," IEEE Transactions on Industrial Informatics, vol. 12, no. 5, pp. 1714-1725, Octember, 2017.   DOI
21 Y Ren, T Lv and H Gao, "Secure Wireless Information and Power Transfer in Heterogeneous Networks," IEEE Access, vol. 5, no. 99, pp. 4967-4979, June, 2017.   DOI
22 Lv T, Gao H and Cao R, "Coordinated Secure Beamforming in K-User Interference Channel with Multiple Eavesdroppers," IEEE Wireless Communication Letters, vol. 5, no. 2, pp. 212-215, January, 2016.   DOI
23 Y.-S. Shiu, S.-Y and Chang.-H, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Communication, vol. 18, no. 2, pp. 66-74, April, 2011.   DOI
24 Zhang Li-jian, Jin Liang and Luo Wen-yu, "Secure coordinated beamforming for multiuser MISO interference channels," Journal on Communications, vol. 36, no. 11, pp. 41-51, November, 2015.
25 D. Lopez-Perez, "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Communication, vol. 18, no. 3, pp. 22-30, June, 2011.   DOI
26 WAJID I, ELDAR Y C and GERSHMAN A B, "Robust downlink beamforming for cognitive radio networks," in Proc. Of GLOBECOM'10, Florida, USA, pp. 1254-1258, December 6-10, 2010.
27 WAJID I, PESAVENTO M and ELDAR Y C, "Robust downlink beamforming with partial channel state information for conventional and cognitive radio networks," IEEE Transactions on Signal Processing, vol. 61, no. 14, pp. 3656-3670, May, 2013.   DOI
28 Ponukumati D, Gao F and Bode M, "Robust coordinated downlink beamforming for multicell-cognitive radio networks," in Proc. of IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 719-723, September 8-11, 2013.
29 Nasseri S, Le T A and Nakhai M R, "Robust and power efficient interference management in downlink multi-cell networks," in Proc. of IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1097-1101, September 8-11, 2013.
30 Z.-Q. Luo, W.-K. Ma and A. M.-C, ''Semidefinite relaxation of quadratic optimization problems,'' IEEE Signal Processing Magzine, vol. 27, no. 3, pp. 20-34, April, 2010.
31 Zhang L, Jin L, Luo W, ''Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints," Science China Information Sciences, vol. 59, no. 2, pp.1-13, January, 2016.
32 Li B, Fei Z, ''Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels," Science China Information Sciences, vol. 61, no. 2, pp. 1-12, February, 2018.   DOI
33 Zheng C, Zhu Z and Hussein J, "Robust Optimization for AN-Aided Transmission and Power Splitting for Secure MISO SWIPT System," IEEE Communications Letters, vol. 20, no. 8, pp. 1571-1574, August, 2016.   DOI
34 Zhong Zhi-hao, Peng Jian-hua and Luo Wen-yang, "A Tractable Approach to Analyzing the Physical-Layer Security in K-Tier Heterogeneous Cellular Networks," China Communications, vol. 12, no. 1, pp. 166-173, December, 2015.   DOI