DOI QR코드

DOI QR Code

Achievable Rate of Beamforming Dual-hop Multi-antenna Relay Network in the Presence of a Jammer

  • Feng, Guiguo (State Key Laboratory of Integrated Services Networks (ISN), Xidian University) ;
  • Guo, Wangmei (State Key Laboratory of Integrated Services Networks (ISN), Xidian University) ;
  • Gao, Jingliang (State Key Laboratory of Integrated Services Networks (ISN), Xidian University)
  • 투고 : 2016.12.12
  • 심사 : 2017.04.25
  • 발행 : 2017.08.31

초록

This paper studies a multi-antenna wireless relay network in the presence of a jammer. In this network, the source node transmits signals to the destination node through a multi-antenna relay node which adopts the amplify-and-forward scheme, and the jammer attempts to inject additive signals on all antennas of the relay node. With the linear beamforming scheme at the relay node, this network can be modeled as an equivalent Gaussian arbitrarily varying channel (GAVC). Based on this observation, we deduce the mathematical closed-forms of the capacities for two special cases and the suboptimal achievable rate for the general case, respectively. To reduce complexity, we further propose an optimal structure of the beamforming matrix. In addition, we present a second order cone programming (SOCP)-based algorithm to efficiently compute the optimal beamforming matrix so as to maximize the transmission rate between the source and the destination when the perfect channel state information (CSI) is available. Our numerical simulations show significant improvements of our propose scheme over other baseline ones.

키워드

참고문헌

  1. T. Cover and A. Gamal, "Capacity theorems for the relay channel," IEEE Trans. Inform. Theory, vol. 25, no. 5, pp. 572-584, Sept. 1979. https://doi.org/10.1109/TIT.1979.1056084
  2. Y. Jing and B. Hassibi, "Distributed space-time coding in wireless relay networks," IEEE Trans. Wireless Commun., vol. 5, no. 12, pp. 3524-3536, Dec. 2006. https://doi.org/10.1109/TWC.2006.256975
  3. P. U. Sripathi and J. S. Lehnert, "A throughput scaling law for a class of wireless relay networks," in Proc. of 38th Annual Asilomar Conference on Signals, Systems and Computers 2004.
  4. J. Laneman and G. Wornell, "Distributed space time block coded protocols for exploiting cooperative diversity in wireless networks," IEEE Trans. Inform. Theory, vol. 49, no. 10, pp. 2415-2425, Oct. 2003. https://doi.org/10.1109/TIT.2003.817829
  5. J. Laneman, D. Tse, and G. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004. https://doi.org/10.1109/TIT.2004.838089
  6. K. Azarian, H.E. Gamal, and P. Schniter, "On the Achievable Diversity-Multiplexing Tradeoff in Half-Duplex Cooperative Channels," IEEE Trans. Inform. Theory, vol. 51, no. 12, pp. 4152-4172, Dec. 2005. https://doi.org/10.1109/TIT.2005.858920
  7. S. Borade, L. Zheng, and R. Gallager, "Amplify-and-forward in wireless relay networks: Rate, diversity and network size," IEEE Trans. Inform. Theory, vol. 53, no. 10, pp. 3302 - 3318, Oct. 2007. https://doi.org/10.1109/TIT.2007.904774
  8. F. Gao, T. cui and A. Nallanathan, "On Channel Estimation and Optimal Training Design for Amplify and Forward Relay Networks," IEEE Transactions on Wireless Communications vol. 7, no. 5, pp. 1907- 1916, May 2008. https://doi.org/10.1109/TWC.2008.070118
  9. F. Gao, R. Zhang and Y-C. Liang, "Optimal Channel Estimation and Training Design for Two-Way Relay Networks," IEEE Transactions on Wireless Communications, pp. 3024-3033 vol. 57, no. 10, Oct. 2009. https://doi.org/10.1109/TCOMM.2009.10.080169
  10. T. Cui, F. Gao, T. Ho and A. Nallanathan, "Distributed Space-Time Coding for Two-Way Wireless Relay Networks," IEEE Trans. Signal Process, pp.658-671, vol. 57, Issue: 2, Feb. 2009. https://doi.org/10.1109/TSP.2008.2009025
  11. Tang, X., and Hua, Y, "Optimal design of non-regenerative mimo wireless relays," IEEE Trans. Wireless Commun., 6, (4), pp. 1398-1407, 2007. https://doi.org/10.1109/TWC.2007.348336
  12. I. Mari'c, A. Goldsmith, and M. M′edard, "Multihop analog network coding via amplify-and-forward: the high SNR regime," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 793 - 803, Feb., 2012. https://doi.org/10.1109/TIT.2011.2173721
  13. Kun Wang , Li Yuan, Toshiaki Miyazhaki, Song Guo and Yanfei Sun "Anti-Eavesdropping with Selfish Jamming in Wireless Networks: A Bertrand Game," This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2016.2639827, IEEE Transactions on Vehicular Technology.
  14. R. A. Poisel, "Modern Communications Jamming Principles and Techniques," Boston, MA, USA: Artech House, 2003.
  15. Q. Liu, M. Li, X. Kong, and N. Zhao, "Disrupting MIMO communications with optimal jamming signal design," IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5313-5325, Oct. 2015. https://doi.org/10.1109/TWC.2015.2436385
  16. D. C. Schleher, "Electronic Warfare in the Information Age," Boston, MA, USA: Artech House, 1999.
  17. Cheng, Y., and Pesavento, M., "Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks," in Proc. of IEEE Trans. Signal Process, pp. 2962-2973, 60, (6), 2012.
  18. Csisza, I., and Narayan, P., "Capacity of the Gaussian arbitrarily varying channel," in Proc. of IEEE Trans. Inf. Theory, pp: 18-26, 37, (1), 1991.
  19. M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, "Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems," in Proc. of 12th Int. Symp. WIOPT, Hammamet, Tunisia, pp. 247-254, May 2014.
  20. X. He, H. Dai, and P. Ning, "Dynamic adaptive anti-jamming via controlled mobility," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4374-4388, Aug. 2014. https://doi.org/10.1109/TWC.2014.2320973
  21. Nan. Zhao, Jing Guo, F. Richard Yu, Ming Li and Victor C. M. Leung, "Antijamming Schemes for Interference-Alignment-Based Wireless Networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp.1271-1283, Feb. 2017. https://doi.org/10.1109/TVT.2016.2557819
  22. Jing Guo, Nan Zhao, F. Richard Yu, Xin Liu and and Victor C. M. Leung, "Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks," IEEE Transactions on Wireless Communications, pp. 1267-1280, vol. 16, no. 2, Feb. 2017. https://doi.org/10.1109/TWC.2016.2643658
  23. S. A. Jafar, "Blind interference alignment," IEEE J. Sel. Topics Signal Process., vol. 6, no. 3, pp. 216-227, Jun. 2012. https://doi.org/10.1109/JSTSP.2012.2187877
  24. Jing, Y., and Jafarkhani, H., "Network beamforming using relays with perfect channel information," in Proc. of IEEE Trans. Inf. Theory, pp. 2499-2517, 55, (6), 2009. https://doi.org/10.1109/TIT.2009.2018175
  25. Boyd, S., and Vandenberghe, L., "Convex optimization," Cambridge university press, 2004.
  26. Grant, M., and Boyd, S., "CVX Users' Guide for CVX ver. 1.21," http://cvxr.com/ Apr. 2011.
  27. Horn, R. A. and C. A. Johnson, "Matrix Analysis," pp. 176-180, Cambridge University Press, 1985.