DOI QR코드

DOI QR Code

Cooperative Decode-and-Forward Relaying for Secure Multicasting

  • Lee, Jong-Ho (Department of Electronic Engineering, Gachon University) ;
  • Sohn, Illsoo (Department of Electronic Engineering, Gachon University) ;
  • Song, Sungju (Department of Electronic Engineering, Myongji University) ;
  • Kim, Yong-Hwa (Department of Electronic Engineering, Myongji University)
  • Received : 2015.12.01
  • Accepted : 2016.05.16
  • Published : 2016.10.01

Abstract

In this paper, secure multicasting with the help of cooperative decode-and-forward relays is considered for the case in which a source securely sends a common message to multiple destinations in the presence of a single eavesdropper. We show that the secrecy rate maximization problem in the secure multicasting scenario under an overall power constraint can be solved using semidefinite programing with semidefinite relaxation and a bisection technique. Further, a suboptimal approach using zero-forcing beamforming and linear programming based power allocation is also proposed. Numerical results illustrate the secrecy rates achieved by the proposed schemes under secure multicasting scenarios.

Keywords

References

  1. A. Mukherjee et al., "Principles of Physical Layer Security in Multiuser Wireless Networks: a Survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, 2014, pp. 1550-1573. https://doi.org/10.1109/SURV.2014.012314.00178
  2. L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, Mar. 2010, pp. 1875-1888. https://doi.org/10.1109/TSP.2009.2038412
  3. G. Zheng, L. Choo, and K. Wong, "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, 2011, pp. 1317-1322. https://doi.org/10.1109/TSP.2010.2092774
  4. J. Li, A.P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, Oct. 2011, pp. 4985-4997. https://doi.org/10.1109/TSP.2011.2159598
  5. H.-M. Wang, F. Liu, and M. Yang, "Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems," IEEE Trans. Veh. Technol., vol. 64, no. 10, Oct. 2015, pp. 4893-4898. https://doi.org/10.1109/TVT.2014.2370754
  6. H.-M. Wang and X.-G. Xia, "Enhancing Wireless Secrecy via Cooperation: Signal Design and Optimization," IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 47-53. https://doi.org/10.1109/MCOM.2015.7355565
  7. H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Signal Process., vol. 60, no. 7, July 2012, pp. 3532-3545. https://doi.org/10.1109/TSP.2012.2191543
  8. A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469. https://doi.org/10.1109/TIT.2008.921861
  9. X. Wang, M. Tao, and Y. Xu, "Outage Analysis of Cooperative Secrecy Multicast Transmission," IEEE Wireless Commun. Lett., vol. 3, no. 2, Apr. 2014, pp. 161-164. https://doi.org/10.1109/WCL.2013.122113.130849
  10. Q. Li and W.-K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, Aug. 2011, pp. 3799-3812. https://doi.org/10.1109/TSP.2011.2146775
  11. N.D. Sidiropoulos, T.N. Davidson, and Z. Lou, "Transmit Beamforming for Physical-Layer Multicasting," IEEE Trans. Signal Process., vol. 54, no. 6, June 2006, pp. 2239-2251. https://doi.org/10.1109/TSP.2006.872578
  12. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, UK: Cambridge University Press, 2004.
  13. Y. Zou et al., "Relay-Selection Improves the Security-Reliability Trade-off in Cognitive Radio Systems," IEEE Trans. Commun., vol. 63, no. 1, Jan. 2015, pp. 215-228. https://doi.org/10.1109/TCOMM.2014.2377239
  14. O.O. Koyluoglu, C.E. Koksal, and H.E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, May 2012, pp. 3000-3015. https://doi.org/10.1109/TIT.2012.2184692
  15. H.-M. Wang et al., "Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, Jan. 2013, pp. 39-42. https://doi.org/10.1109/LSP.2012.2227725
  16. M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2515-2534. https://doi.org/10.1109/TIT.2008.921908
  17. A. Charnes and W.-W. Cooper, "Programming with Linear Fractional Functionals," Naval Res. Logist., vol. 9, 1962, pp. 181-186. https://doi.org/10.1002/nav.3800090303
  18. Z. Luo et al., "Semidefinite Relaxation of Quadratic Optimization Problems," IEEE Signal Process. Mag., vol. 27, no. 3, May 2010, pp. 20-34.
  19. J.F. Sturm, "Using SeDuMi 1.02, a Matlab Toolbox for Optimization over Symmetric Cones," Optimization Methods Softw., vol. 11, no. 1-4, 1999, pp. 625-653. https://doi.org/10.1080/10556789908805766
  20. J. Lofberg, "YALMIP: A Toolbox for Modeling and Optimization in MATLAB," Int. Symp. Comput. Aided Contr. Syst. Design, Taipei, Taiwan, Sept. 2-4, 2004, pp. 284-289.
  21. H. Wang et al., "Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, Dec. 2013, pp. 2007-2020. https://doi.org/10.1109/TIFS.2013.2287046