Browse > Article
http://dx.doi.org/10.4218/etrij.16.0115.1029

Cooperative Decode-and-Forward Relaying for Secure Multicasting  

Lee, Jong-Ho (Department of Electronic Engineering, Gachon University)
Sohn, Illsoo (Department of Electronic Engineering, Gachon University)
Song, Sungju (Department of Electronic Engineering, Myongji University)
Kim, Yong-Hwa (Department of Electronic Engineering, Myongji University)
Publication Information
ETRI Journal / v.38, no.5, 2016 , pp. 934-940 More about this Journal
Abstract
In this paper, secure multicasting with the help of cooperative decode-and-forward relays is considered for the case in which a source securely sends a common message to multiple destinations in the presence of a single eavesdropper. We show that the secrecy rate maximization problem in the secure multicasting scenario under an overall power constraint can be solved using semidefinite programing with semidefinite relaxation and a bisection technique. Further, a suboptimal approach using zero-forcing beamforming and linear programming based power allocation is also proposed. Numerical results illustrate the secrecy rates achieved by the proposed schemes under secure multicasting scenarios.
Keywords
Physical layer security; multicasting; node cooperation; semidefinite programming;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Mukherjee et al., "Principles of Physical Layer Security in Multiuser Wireless Networks: a Survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, 2014, pp. 1550-1573.   DOI
2 L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, Mar. 2010, pp. 1875-1888.   DOI
3 G. Zheng, L. Choo, and K. Wong, "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, 2011, pp. 1317-1322.   DOI
4 J. Li, A.P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, Oct. 2011, pp. 4985-4997.   DOI
5 H.-M. Wang, F. Liu, and M. Yang, "Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems," IEEE Trans. Veh. Technol., vol. 64, no. 10, Oct. 2015, pp. 4893-4898.   DOI
6 X. Wang, M. Tao, and Y. Xu, "Outage Analysis of Cooperative Secrecy Multicast Transmission," IEEE Wireless Commun. Lett., vol. 3, no. 2, Apr. 2014, pp. 161-164.   DOI
7 H.-M. Wang and X.-G. Xia, "Enhancing Wireless Secrecy via Cooperation: Signal Design and Optimization," IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 47-53.   DOI
8 H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Signal Process., vol. 60, no. 7, July 2012, pp. 3532-3545.   DOI
9 A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469.   DOI
10 Q. Li and W.-K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, Aug. 2011, pp. 3799-3812.   DOI
11 N.D. Sidiropoulos, T.N. Davidson, and Z. Lou, "Transmit Beamforming for Physical-Layer Multicasting," IEEE Trans. Signal Process., vol. 54, no. 6, June 2006, pp. 2239-2251.   DOI
12 S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, UK: Cambridge University Press, 2004.
13 Y. Zou et al., "Relay-Selection Improves the Security-Reliability Trade-off in Cognitive Radio Systems," IEEE Trans. Commun., vol. 63, no. 1, Jan. 2015, pp. 215-228.   DOI
14 O.O. Koyluoglu, C.E. Koksal, and H.E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, May 2012, pp. 3000-3015.   DOI
15 Z. Luo et al., "Semidefinite Relaxation of Quadratic Optimization Problems," IEEE Signal Process. Mag., vol. 27, no. 3, May 2010, pp. 20-34.
16 H.-M. Wang et al., "Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, Jan. 2013, pp. 39-42.   DOI
17 M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2515-2534.   DOI
18 A. Charnes and W.-W. Cooper, "Programming with Linear Fractional Functionals," Naval Res. Logist., vol. 9, 1962, pp. 181-186.   DOI
19 J.F. Sturm, "Using SeDuMi 1.02, a Matlab Toolbox for Optimization over Symmetric Cones," Optimization Methods Softw., vol. 11, no. 1-4, 1999, pp. 625-653.   DOI
20 J. Lofberg, "YALMIP: A Toolbox for Modeling and Optimization in MATLAB," Int. Symp. Comput. Aided Contr. Syst. Design, Taipei, Taiwan, Sept. 2-4, 2004, pp. 284-289.
21 H. Wang et al., "Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, Dec. 2013, pp. 2007-2020.   DOI