Journal ArticleDOI
Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks
TLDR
A penalty function method incorporating the rank-1 constraint into the objective function is proposed and an efficient iterative algorithm to solve the so-obtained problem, which is a convex SDP problem, thus it can be efficiently solved using the interior point method.Abstract:
In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security of a single-antenna-equipped two-way relay network in the presence of an eavesdropper. The basic idea is that in both cooperative transmission phases, some intermediate nodes help to relay signals to the legitimate destination adopting distributed beamforming, while the remaining nodes jam the eavesdropper, simultaneously, which takes the data transmissions in both phases under protection. Two different schemes are proposed, with and without the instantaneous channel state information of the eavesdropper, respectively, and both are subjected to the more practical individual power constraint of each cooperative node. Under the general channel model, it is shown that both problems can be transformed into a semi-definite programming (SDP) problem with an additional rank-1 constraint. A current state of the art technique for handling such a problem is the semi-definite relaxation (SDR) and randomization techniques. In this paper, however, we propose a penalty function method incorporating the rank-1 constraint into the objective function. Although the so-obtained problem is not convex, we develop an efficient iterative algorithm to solve it. Each iteration is a convex SDP problem, thus it can be efficiently solved using the interior point method. When the channels are reciprocal such as in TDD mode, we show that the problems become second-order convex cone programming ones. Numerical evaluation results are provided and analyzed to show the properties and efficiency of the proposed hybrid security scheme, and also demonstrate that our optimization algorithms outperform the SDR technique.read more
Citations
More filters
Journal ArticleDOI
A Survey on Multiple-Antenna Techniques for Physical Layer Security
TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Journal ArticleDOI
Improving physical-layer security in wireless communications using diversity techniques
TL;DR: It is shown that as the number of relays increases, both the secrecy capacity and intercept probability of cooperative relay transmission improve significantly, implying there is an advantage in exploiting cooperative diversity to improve physical-layer security against eavesdropping attacks.
Journal ArticleDOI
Physical Layer Security in Heterogeneous Cellular Networks
TL;DR: In this article, an access threshold-based secrecy mobile association policy was proposed to associate each user with the BS providing the maximum truncated average received signal power beyond a threshold, and the connection probability and secrecy probability of a randomly located user were investigated.
Journal ArticleDOI
Enhancing wireless secrecy via cooperation: signal design and optimization
Hui-Ming Wang,Xiang-Gen Xia +1 more
TL;DR: An overview of the recent research on enhancing wireless transmission secrecy via cooperation is provided and a signal processing perspective is taken and focus on the secrecy signal design and optimization techniques to increase secrecy performance.
Journal ArticleDOI
A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions
Ang Li,Danilo Spano,Jevgenij Krivochiza,Stavros Domouchtsidis,Christos G. Tsinos,Christos Masouros,Symeon Chatzinotas,Yonghui Li,Branka Vucetic,Bjorn Ottersten +9 more
TL;DR: The definition of constructive interference (CI) is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed.
References
More filters
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Broadcast channels with confidential messages
Imre Csiszár,János Körner +1 more
TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI
Semidefinite Relaxation of Quadratic Optimization Problems
TL;DR: This article has provided general, comprehensive coverage of the SDR technique, from its practical deployments and scope of applicability to key theoretical results, and showcased several representative applications, namely MIMO detection, B¿ shimming in MRI, and sensor network localization.
Journal ArticleDOI
The Gaussian wire-tap channel
TL;DR: Wyner's results for discrete memoryless wire-tap channels are extended and it is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels.