DOI QR코드

DOI QR Code

Secure Beamforming with Artificial Noise for Two-way Relay Networks

  • Li, Dandan (School of Computer and Information Technology, Beijing Jiaotong University) ;
  • Xiong, Ke (State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University) ;
  • Du, Guanyao (School of Computer and Information Technology, Beijing Jiaotong University) ;
  • Qiu, Zhengding (School of Computer and Information Technology, Beijing Jiaotong University)
  • 투고 : 2012.07.19
  • 심사 : 2013.05.22
  • 발행 : 2013.06.30

초록

This paper studies the problem of secure information exchange between two sources via multiple relays in the presence of an eavesdropper. To this end, we propose a relay beamforming scheme, i.e., relay beamforming with artificial noise (RBwA), where the relay beamforming vector and the artificial noise vector are jointly designed to maintain the received signal-to-interference-ratio (SINR) at the two sources over a predefined Quality of Service (QoS) threshold while limiting the received SINR at the eavesdropper under a predefined secure threshold. For comparison, the relay beamforming without artificial noise (RBoA) is also considered. We formulate two optimization problems for the two schemes, where our goal is to seek the optimal beamforming vector to minimize the total power consumed by relay nodes such that the secrecy of the information exchange between the two sources can be protected. Since both optimization problems are nonconvex, we solve them by semidefinite program (SDP) relaxation theory. Simulation results show that, via beamforming design, physical layer secrecy of two-way relay networks can be greatly improved and our proposed RBwA outperforms the RBoA in terms of both low power consumption and low infeasibility rate.

키워드

참고문헌

  1. A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  2. A. Khisti, and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 2088-2104, 2010.
  3. F. Oggier, and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4961-4972, 2011. https://doi.org/10.1109/TIT.2011.2158487
  4. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 2613 - 2616, April 19-24, 2009.
  5. J. Zhang, and M. C. Gursoy, "Collaborative relay beamforming for secure broadcasting," in Proc. of IEEE Wireless Communications and Networking Conf., pp. 1-6, April, 18-21, 2010.
  6. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor,, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2010. https://doi.org/10.1109/TSP.2009.2038412
  7. H. Wang, Q. Yin, and X. Xia, "Improving the physical-layer security of wireless two-way relaying via analog network coding," in Proc. of IEEE Global Telecommunications Conf., pp. 1-6, December 5-9, 2011.
  8. W.-C. Liao, T.-H Chang, W.-K. Ma, and C.-Y. Chi, "Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink," in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing,, pp. 2562-2565, March 14-19, 2010.
  9. W.-C. Liao, T.-H Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011. https://doi.org/10.1109/TSP.2010.2094610
  10. M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Transactions on Information Theory, vol.54, no. 6, pp. 2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908
  11. Z.-Q. Luo, W.-K. Ma, A. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20-34, 2010.
  12. Y. Huang, and D. P. Palomar, "Rank-constrained separable semidefinite programming with applications to optimal beamforming," IEEE Transactions on Signal Processing, vol. 58, no. 2, pp. 664-678, 2010. https://doi.org/10.1109/TSP.2009.2031732
  13. M. Grant, and S. Boyd, CVX: MATLAB software for disciplined, Convex Programming, June 2009.

피인용 문헌

  1. Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks vol.2013, pp.None, 2013, https://doi.org/10.1155/2013/306423