Optimal Power Allocation for Secure Multicarrier Relay Systems

We study power allocation for secrecy rate maximization in a multicarrier decode-and-forward relay system, where an eavesdropper exists. We consider three transmission modes: in no communication, the source and the relay do not transmit at all; in direct communication, the source broadcasts signals during the first time slot and the relay does not forward any signal during the second time slot; in relay communication, the source broadcasts signals during the first time slot and the relay forwards the reencoded signals to the destination during the second time slot. Determining the transmission strategy adaptively on each subcarrier, the optimal source power and the optimal relay power over all subcarriers are derived to maximize the sum secrecy rate under a total system power constraint. In addition, a suboptimal power allocation scheme is proposed to substantially reduce the computational complexity. It is shown that the proposed suboptimal solution is asymptotically optimal in the limit as the number of subcarriers goes to infinity. Extensive numerical results are presented for various scenarios. In particular, the performance of the suboptimal scheme is very close to that of the optimal scheme even if the number of subcarriers is moderately small.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[3]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[4]  Zhu Han,et al.  Improve physical layer security in cooperative wireless network using distributed auction games , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[6]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[7]  Ali N. Akansu,et al.  Orthogonal transmultiplexers in communication: a review , 1998, IEEE Trans. Signal Process..

[8]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[9]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[10]  Athina P. Petropulu,et al.  Secrecy rate optimization under cooperation with perfect channel state information , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[11]  John M. Cioffi,et al.  A practical discrete multitone transceiver loading algorithm for data transmission over spectrally shaped channels , 1995, IEEE Trans. Commun..

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Qinghe Du,et al.  Adaptive Multicast with Power and Rate Control Over Fading Channels in Mobile Wireless Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[14]  Jian Wang,et al.  Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[15]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[16]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[17]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[20]  Wu Tong,et al.  Power Allocation and Subcarrier Pairing Algorithm for Regenerative OFDM Relay System , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[21]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[22]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[23]  Hua Zhang,et al.  Orthogonal Frequency Division Multiplexing for Wireless Communications , 2004 .

[24]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[25]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[26]  John M. Cioffi,et al.  Joint Tx-Rx beamforming design for multicarrier MIMO channels: a unified framework for convex optimization , 2003, IEEE Trans. Signal Process..

[27]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[28]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[29]  Luc Vandendorpe,et al.  Power Allocation for OFDM Transmission with DF Relaying , 2008, 2008 IEEE International Conference on Communications.

[30]  J.A.C. Bingham,et al.  Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.

[31]  Elza Erkip,et al.  User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..