scispace - formally typeset
Journal ArticleDOI

Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks

TLDR
A penalty function method incorporating the rank-1 constraint into the objective function is proposed and an efficient iterative algorithm to solve the so-obtained problem, which is a convex SDP problem, thus it can be efficiently solved using the interior point method.
Abstract
In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security of a single-antenna-equipped two-way relay network in the presence of an eavesdropper. The basic idea is that in both cooperative transmission phases, some intermediate nodes help to relay signals to the legitimate destination adopting distributed beamforming, while the remaining nodes jam the eavesdropper, simultaneously, which takes the data transmissions in both phases under protection. Two different schemes are proposed, with and without the instantaneous channel state information of the eavesdropper, respectively, and both are subjected to the more practical individual power constraint of each cooperative node. Under the general channel model, it is shown that both problems can be transformed into a semi-definite programming (SDP) problem with an additional rank-1 constraint. A current state of the art technique for handling such a problem is the semi-definite relaxation (SDR) and randomization techniques. In this paper, however, we propose a penalty function method incorporating the rank-1 constraint into the objective function. Although the so-obtained problem is not convex, we develop an efficient iterative algorithm to solve it. Each iteration is a convex SDP problem, thus it can be efficiently solved using the interior point method. When the channels are reciprocal such as in TDD mode, we show that the problems become second-order convex cone programming ones. Numerical evaluation results are provided and analyzed to show the properties and efficiency of the proposed hybrid security scheme, and also demonstrate that our optimization algorithms outperform the SDR technique.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Multiple-Antenna Techniques for Physical Layer Security

TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Journal ArticleDOI

Improving physical-layer security in wireless communications using diversity techniques

TL;DR: It is shown that as the number of relays increases, both the secrecy capacity and intercept probability of cooperative relay transmission improve significantly, implying there is an advantage in exploiting cooperative diversity to improve physical-layer security against eavesdropping attacks.
Journal ArticleDOI

Physical Layer Security in Heterogeneous Cellular Networks

TL;DR: In this article, an access threshold-based secrecy mobile association policy was proposed to associate each user with the BS providing the maximum truncated average received signal power beyond a threshold, and the connection probability and secrecy probability of a randomly located user were investigated.
Journal ArticleDOI

Enhancing wireless secrecy via cooperation: signal design and optimization

TL;DR: An overview of the recent research on enhancing wireless transmission secrecy via cooperation is provided and a signal processing perspective is taken and focus on the secrecy signal design and optimization techniques to increase secrecy performance.
Journal ArticleDOI

A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

TL;DR: The definition of constructive interference (CI) is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Broadcast channels with confidential messages

TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI

Semidefinite Relaxation of Quadratic Optimization Problems

TL;DR: This article has provided general, comprehensive coverage of the SDR technique, from its practical deployments and scope of applicability to key theoretical results, and showcased several representative applications, namely MIMO detection, B¿ shimming in MRI, and sensor network localization.
Journal ArticleDOI

The Gaussian wire-tap channel

TL;DR: Wyner's results for discrete memoryless wire-tap channels are extended and it is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels.
Related Papers (5)