Browse > Article
http://dx.doi.org/10.4218/etrij.2018-0145

Joint optimization of beamforming and power allocation for DAJ-based untrusted relay networks  

Yao, Rugui (School of Electronics and Information, Northwestern Polytechnical University)
Lu, Yanan (School of Electronics and Information, Northwestern Polytechnical University)
Mekkawy, Tamer (School of Electronics and Information, Northwestern Polytechnical University)
Xu, Fei (School of Electronics and Information, Northwestern Polytechnical University)
Zuo, Xiaoya (School of Electronics and Information, Northwestern Polytechnical University)
Publication Information
ETRI Journal / v.40, no.6, 2018 , pp. 714-725 More about this Journal
Abstract
Destination-assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ-based untrusted relay network with multiple antennas installed is presented. To increase the secrecy, a joint optimization of beamforming and power allocation at the source and destination is studied. A matched-filter precoder is introduced to maximize the cooperative jamming signal by directing cooperative jamming signals toward untrusted relays. Then, based on generalized singular-value decomposition (GSVD), a novel transmitted precoder for confidential signals is devised to align the signal into the subspace corresponding to the confidential transmission channel. To decouple the precoder design and optimal power allocation, an iterative algorithm is proposed to jointly optimize the above parameters. Numerical results validate the effectiveness of the proposed scheme. Compared with other schemes, the proposed scheme shows significant improvement in terms of security performance.
Keywords
destination-assisted jamming; optimal power allocation; physical layer security; secrecy rate; untrusted relay network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Fan et al., Secure multiuser communications in multiple amplify-and-forward relay networks, IEEE Trans. Commun. 62, (2014), no. 9, 3299-3310.   DOI
2 L. Fan et al., Secure multiple amplify-and-forward relaying with cochannel interference, IEEE J. Sel. Topics Signal Process. 10, (2016), no. 8, 1494-1505.   DOI
3 X. He and A. Yener, Two-hop secure communication using an untrusted relay: A case for cooperative jamming, IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LO, USA, Dec, 2008, pp. 1-5.
4 R. Yao et al., Optimised power allocation to maximise secure rate in energy harvesting relay network, Electron. Lett. 52, (2016), no. 22, 1879-1881.   DOI
5 Y. Oohama, Capacity theorems for relay channels with confidential messages, IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, 24-25, June 2007, pp. 926-930.
6 X. He and A. Yener, Cooperation with an untrusted relay: A secrecy perspective, IEEE Trans. Inform. Theory 56, (2010), no. 8, 3807-3827.   DOI
7 C. Wang, H. M. Wang, and X. G. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Trans. Wireless Commun. 14, (2015), no. 2, 589-605.   DOI
8 L. Sun et al., Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett. 19, (2015), no. 3, 463-466.   DOI
9 A. Kuhestani, A. Mohammadi, and M. Mohammadi, Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers, IEEE Trans. Inform. Forens. Security 13, (2018), no. 2, 341-355.   DOI
10 P. Xu, Z. Ding, and X. Dai, Achievable secrecy rates for relay-eavesdropper channel based on the application of noisy network coding, IEEE Trans. Inform. Forens. Security 13, (2018), no. 7 1736-1751.   DOI
11 H. M. Wang et al., Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, IEEE Trans. Inform. Forens. Security 8, (2013), no. 12, 2007-2020.   DOI
12 H. M. Wang, Q. Yin, and X. G. Xia, Distributed beamforming for physical-layer security of two-way relay networks, IEEE Trans. Signal Process. 60, (2012), no. 7, 3532-3545.   DOI
13 C. Jeong, I. M. Kim, and D. I. Kim, Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system, IEEE Trans. Signal Process. 60, (2012), no. 1, 310-325.   DOI
14 J. Mo et al., Secure beamforming for MIMO two-way communications with an untrusted relay, IEEE Trans. Signal Process. 62, (2014), no. 9, 2185-2199.   DOI
15 J. Xiong et al., Destination-aided cooperative jamming for dualhop amplify-and-forward MIMO untrusted relay systems, IEEE Trans. Veh. Technol. 65, (2016), no. 9, 7274-7284.   DOI
16 J. Huang and A. L. Swindlehurst, Joint transmit design and node selection for one-way and two-way untrusted relay channels, Asilomar Conf. Signals, Syst. Comput. (ASILOMAR 2013), Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
17 D. B. da Costa and S. Aissa, Beamforming in dual-hop fixed gain relaying systems, IEEE Int. Conf. Commun. (ICC), Dresden, Germany, 14-18, June 2009, pp. 1-5.
18 R. Yao et al., Secrecy rate-optimum energy splitting for an untrusted and energy harvesting relay network, IEEE Access 6, (2018), 19238-19246.   DOI
19 J. Zhang and M. C. Gursoy, Relay beamforming strategies for physical-layer security, Annu. Conf. Inform. Sci. Syst. (CISS), Princeton, NJ, USA, Mar. 2010, pp. 1-6.
20 X. Tang et al., Interference assisted secret communication, IEEE Trans. Infom., Theory 57 (2011), no. 5, May 2011, pp. 3153-3167.   DOI
21 S. A. A. Fakoorian and A. L. Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer, IEEE Trans. Signal Process. 59, (2011), no. 10, 5013-5022.   DOI
22 A. Kuhestani, A. Mohammadi, and P. L. Yeoh, Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer, IEEE Trans. Commun. 66, (2018), no. 6, 2671-2684.   DOI
23 D. S. Kalogerias et al., Mobile jammers for secrecy rate maximization in cooperative networks, IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Vancouver, Canada, May 2013, pp. 2901-2905.
24 L. Lv et al., Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation, IET Commun. 11, (2017), no. 3, 393-399.   DOI
25 A. Kuhestani and A. Mohammadi, Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study, IET Commun. 10, (2016), no. 1, 17-23.   DOI
26 W. W. Diab, N. Yousefi, and S. Powell, System and method for mirroring power over ethernet registers in a physical layer device over a single isolation boundary, U.S. Patent 8 428 248, April 23, 2013.
27 P. B. Bok et al., Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles, IEEE Veh. Technol. Conf. (VTC2014-Fall), Vancouver, Canada, Sept. 2014, pp. 1-6.
28 D. B. Rawat, R. Grodi, and C. Bajracharya, Enhancing connectivity for communication and control in unmanned aerial vehicle networks, IEEE Radio Wireless Symp. (RWS), San Diego, CA, USA, Jan. 2015, pp. 200-202.
29 H. Chu and P. Xu, Relay selection with feedback beamforming information for NLoS 60 GHz mm wave WLANs/WPANs, IEEE Int. Conf. Commun. (ICC), Sydney, Australia, June 2014, pp. 5514-5519.
30 T. Mekkawy et al., Joint beamforming alignment with suboptimal power allocation for a two-way untrusted relay network, IEEE Trans. Inform. Forens. Security 13, (2018), no. 10, 2464-2474.   DOI
31 R. Zhang et al., Optimal beamforming for two-way multi-antenna relay channel with analogue network coding, IEEE J. Sel. Areas Commun. 27, (2009), no. 5, 699-712.   DOI
32 T. Mekkawy et al., Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error, Wireless Opt. Commun. Conf. (WOCC), Newark, NJ, USA, Apr. 2017, pp. 1-5.
33 X. Chen et al., A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Sur. Tut. 19, (2017), no. 2, 1027-1053.   DOI
34 D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.: Cambridge Univ. Press, Sep. 2005.
35 H. M. Wang, F. Liu, and X. G. Xia, Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks, IEEE Trans. Infom. Forens. Security 9, (2014), no. 8, 1240-1250.   DOI
36 N. Ouyang et al., Destination assisted jamming and beamforming for improving the security of AF relay systems, IEEE Access 5, (2017), 4125-4131.   DOI
37 D. Senaratne and C. Tellambura, GSVD beamforming for twouser MIMO downlink channel, IEEE Trans. Veh. Technol. 62, (2013), no. 6, 2596-2606.   DOI
38 N. Yang et al., Safeguarding 5G wireless communication networks using physical layer security, IEEE Commun. Mag. 53, (2015), no. 4, 20-27.   DOI
39 A. Barenghi et al., Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proc. IEEE 100, (2012), no. 11, 3056-3076.   DOI
40 A. Mukherjee et al., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Sur. Tut. 16, (2014), no. 3, 1550-1573.   DOI
41 A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54, (1975), no. 8, 1355-1387.   DOI
42 S. Leung-Yan-Cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inform. Theory 24, (1978), no. 4, 451-456.   DOI
43 J. N. Laneman, D. N. C. Tse, and G. W. Wornell, Cooperative diversity in wireless networks: Efficient protocols and outage behavior, IEEE Trans. Inform. Theory 50, (2004), no. 12, 3062-3080.   DOI