To guarantee the secrecy of downlink confidential information sent to marcocell user when there were multiple colluding eavesdroppers in dense heterogenous networks, a cooperative secrecy beamforming scheme resistant to multi-eavesdroppers is proposed in the paper. The transmission rate of confidential information is improved and eavesdroppers are jammed by jointly optimizing the beamforming vectors at macrocell base station and femtocell base stations. To obtain the optimal beamforming vectors, the problem of maximizing the secrecy rate is modeled under the limitations of quality of service and base station power. The secrecy rate maximization problem is non-convex. Due to the intractability, this problem is recast into a series of SemiDefinite Programs (SDP) using the SemiDefinite Relaxation (SDR) technique and the Lagrange duality. Simulation results validate the efficacy and the secrecy of the proposed scheme.
HAIDER F, GAO X, YOU X H, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014.6736752.
[2]
HU R Q and QIAN Y. An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems[J]. IEEE Communications Magazine, 2014, 52(5): 94-101. doi: 10.1109/MCOM.2014.6815898.
[3]
SONG K, JI B, HUANG Y, et al. Performance analysis of antenna selection in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2015, 63(10): 2520-2532. doi: 10.1109/TSP.2015.2414904.
SONG Kang, WEI Lei, JI Baofeng, et al. Outage performance for heterogeneous cellular networks with interference cancellation[J]. Journal of Electronics & Information Technology, 2015, 38(2): 255-261. doi: 10.11999/ JEIT150532.
ZHONG Zhihao, LUO Wenyu, PENG Jianhua, et al. Secrecy performasnce analysis of cooperative transmisson and cooperative jamming in K-tier heterogeneous cellular networks[J]. Scientia Sinica Informations, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
[6]
SAMDANIS K, TALEB T, and SCHMID S. Traffic? offload? enhancements for eUTRANn[J]. IEEE Communications Surveys & Tutorials, 2012, 14(3): 884-896. doi: 10.1109/SURV. 2011.072711.00168.
[7]
WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j.1538- 7305. 1975.tb02040.x.
[8]
GOEL S and NEGI R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, 2005, 3: 1501-1506. doi: 10.1109/ MILCOM.2005.1605889.
[9]
PINTO P C, BARROS J, and WIN M Z. Secure communication in stochastic wireless networksPart II: Maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. doi: 10.1109/TIFS.2011. 2165947.
[10]
PINTO P C, BARROS J, and WIN M Z. Wireless physical-layer security: The case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, 2009: 2442-2446. doi: 10.1109/ISIT.2009.5206050.
LEI Weijia, ZUO Lijie, JIANG Xue, et al. Physical layer security resistant to multi-eavesdroppers with inaccurate channel state information in relay network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579.
[12]
L? T, GAO H, CAO R, et al. Coordinated secure beamforming in K-User interference channel with multiple eavesdroppers[J]. IEEE Wireless Communication Letters, 2016, 5(2): 212-215. doi: 10.1109/LWC.2016.2519905.
[13]
NGUYEN Van-Dinh, DUONG Trung Q, DUONG Octavia A, et al. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2609-2623. doi: 10.1109/TIFS.2016.2594131.
[14]
LUO Z Q, MA W K, SO A C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010. 936019.
[15]
YANG S, LV T, and HANZO L. Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM[J]. IEEE Transactions on Vehicular Technology, 2013, 62(4): 1667-1677. doi: 10.1109/TVT.2012.2235190.
[16]
CHARNES A and COOPER W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
[17]
BOYD S and VANDENBERGHE L. Convex Optimization[M]. Cambridge, U.K.: Cambridge University Press, 2004: 121-180.
ZHANG Lijian, JIN Liang, and LUO Wen-yu. Secure coordinated beamforming for multiuser MISO interference channels[J]. Journal on Communications, 2015, 36(11): 41-51. doi: 10.11959/j.issn.1000-436x.2015198.
[19]
Lü T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
[20]
LOPEZ-PEREZ D, GUVENC I, DELAROCHE G, et al. Enhanced intercell interference coordination challenges in heterogeneous networks[J]. IEEE Wireless Communications, 2011, 18(3): 22-30. doi: 10.1109/MWC.2011.5876497.
[21]
SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. doi: 10.1109/MWC. 2011.5751298.
[22]
FAKOORIAN S A A and SWINDLEHURS A L T. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649. doi: 10.1109/TIFS.2011.2156788.