|
|
Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network |
Lei Wei-jia Zuo Li-jie Jiang Xue Xie Xian-zhong |
Chongqing Key Laboratory of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China |
|
|
Abstract This paper investigates the relay transmission system in the presence of multiple collusion single-antenna eavesdroppers. A physical layer security scheme employing nullspace Artificial Noise (AN) and Amplify-and-Forward (AF) relay beamforming is designed. In the case that channel state information can not be accurately obtained, the weighted matrice of relay beamforming and the nullspace AN covariance are jointed optimized based on the Semi-Definite Programs (SDP), which can effectively reduce the amount of the information likely to be obtained by the multiple collusion eavesdroppers and significantly improve the security capacity of the system. It is an effective physical security transmission scheme with good robustness. Simulation results verify that the scheme has good performance.
|
Received: 10 December 2014
Published: 18 June 2015
|
|
Corresponding Authors:
Zuo Li-jie
E-mail: zuolijie1111@163.com
|
|
|
|
[1] |
Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715.
|
[2] |
Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.
|
[3] |
Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
|
[4] |
Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5.
|
[5] |
Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717.
|
[6] |
Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.
|
[7] |
Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506.
|
[8] |
Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networks—part II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147.
|
[9] |
Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446.
|
[10] |
Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343.
|
[11] |
Wang Chao and Wang Hui-ming. Robust joing beamforming and jamming for secure AF networks: low complexity design[OL]. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=6847741, 2015.
|
[12] |
Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56.
|
[13] |
Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487.
|
[14] |
Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162.
|
[15] |
Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655.
|
[16] |
Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34.
|
[17] |
Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
|
[18] |
Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9.
|
[19] |
Grant M and Boyd S. CVX: Matlab software for disciplined convex programming[OL]. http://cvxr.com/cvx/, 2013.
|
[20] |
Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216.
|
|
|
|