Secure Communication for Two-Way Relay Networks with Imperfect CSI

This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rate of the eavesdropper to be upper-bounded. Due to the imperfect CSI, a robust optimization problem is summarized. A novel iterative algorithm is proposed, where the line search technique is applied, and the feasibility is preserved during iterations. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are optimally solved. The optimality property of the robust optimization problem is analyzed. Simulation results show that the proposed algorithm performs very close to the non-robust model with perfect CSI, in terms of the obtained relay transmit power; it~achieves higher secrecy rate compared to the existing work. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally.

[1]  Xiaoming Chen,et al.  On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI , 2016, IEEE Transactions on Vehicular Technology.

[2]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[3]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[4]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[5]  Khairi Ashour Hamdi,et al.  Improving Physical Layer Security of AF Relay Networks via Beam-Forming and Jamming , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[6]  Wenbo Wang,et al.  Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.

[7]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[8]  Jong-Ho Lee,et al.  Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[9]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[10]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[11]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[12]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[13]  Ya-Xiang Yuan,et al.  Optimization Theory and Methods: Nonlinear Programming , 2010 .

[14]  Yueming Cai,et al.  Robust secure switching transmission in multi-antenna relaying systems: cooperative jamming or decode-and-forward beamforming , 2016, IET Commun..

[15]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[16]  Jian Huang,et al.  QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty , 2013, IEEE Communications Letters.

[17]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[18]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[19]  Nicholas Kolokotronis,et al.  Improving physical layer security in DF relay networks via two-stage cooperative jamming , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).

[20]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[21]  Marius Pesavento,et al.  Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach , 2017, Entropy.

[22]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[23]  Eduard A. Jorswieck,et al.  Energy Efficiency in Secure Multi-Antenna Systems , 2015, ArXiv.

[24]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[25]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Keping Long,et al.  Robust relay beamforming for multiple-antenna amplify-and-forward relay system in the presence of eavesdropper , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[28]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[29]  Zhu Han,et al.  Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.

[30]  Hongbo Zhu,et al.  Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.

[31]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[32]  Stéphane Y. Le Goff,et al.  Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.

[33]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[34]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.