Secure MIMO Relaying Network: An Artificial Noise Aided Robust Design Approach

Owing to the vulnerability of relay-assisted and device-to-device (D2D) communications, improving wireless security from a physical layer signal processing perspective is attracting increasing interest. Hence we address the problem of secure transmission in a relay-assisted network, where a pair of legitimate user equipments (UEs) communicate with the aid of a multiple-input multiple output (MIMO) relay in the presence of multiple eavesdroppers (eves). Assuming imperfect knowledge of the eves' channels, we jointly optimize the power of the source UE, the amplify-and-forward (AF) relaying matrix and the covariance of the artificial noise (AN) transmitted by the relay, in order to maximize the received signal-to-interference-plus-noise ratio (SINR) at the destination, while imposing a set of robust secrecy constraints. To tackle the resultant nonconvex optimization problem, a globally optimal solution based on a bi-level optimization framework is proposed, but with high complexity. Then a low-complexity sub-optimal method relying on a new penalized difference-of-convex (DC) algorithmic framework is proposed, which is specifically designed for non-convex semidefinite programs (SDPs). We show how this penalized DC framework can be invoked for solving our robust secure relaying problem with proven convergence. Our extensive simulation results show that both proposed solutions are capable of ensuring the secrecy of the relay-aided transmission and significantly improve the robustness towards the eves' channel uncertainties as compared to the non-robust counterparts. It is also demonstrated the penalized DC-based method advocated yields a performance close to the globally optimal solution.

[1]  Yue Rong,et al.  Robust Design for Linear Non-Regenerative MIMO Relays With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Tiejun Lv,et al.  Robust Beamforming and Jamming for Secure AF Relay Networks with Multiple Eavesdroppers , 2014, 2014 IEEE Military Communications Conference.

[4]  Ananthanarayanan Chockalingam,et al.  Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI , 2013, 2013 IEEE International Conference on Communications (ICC).

[5]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[6]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[7]  R. Horst,et al.  DC Programming: Overview , 1999 .

[8]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[9]  Claude E. Shannon,et al.  A Mathematical Theory of Communications , 1948 .

[10]  Chengwen Xing,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Robust Joint Design of Linear Relay Precoder and Destination Equalizer for Dual-Hop Amplify-and , 2009 .

[11]  Lajos Hanzo,et al.  MIMO AF relaying security: Robust transceiver design in the presence of multiple eavesdroppers , 2015, 2015 IEEE International Conference on Communications (ICC).

[12]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[13]  Daniel Pérez Palomar,et al.  A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization , 2006, IEEE Transactions on Signal Processing.

[14]  Gert R. G. Lanckriet,et al.  On the Convergence of the Concave-Convex Procedure , 2009, NIPS.

[15]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[16]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[17]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[18]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[19]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[20]  R. M. A. P. Rajatheva,et al.  Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying , 2014, IEEE Communications Letters.

[21]  Yue Rong,et al.  A Unified Framework for Optimizing Linear Nonregenerative Multicarrier MIMO Relay Communication Systems , 2009, IEEE Transactions on Signal Processing.

[22]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[23]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[24]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[25]  Lajos Hanzo,et al.  Joint Optimization of Transceiver Matrices for MIMO-Aided Multiuser AF Relay Networks: Improving the QoS in the Presence of CSI Errors , 2016, IEEE Transactions on Vehicular Technology.

[26]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[27]  Jian Huang,et al.  QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty , 2013, IEEE Communications Letters.

[28]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[29]  Xu Xiong Information-theoretical security secret key agreement protocol , 2008 .

[30]  L. Grippo,et al.  Exact penalty functions in constrained optimization , 1989 .

[31]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[32]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[33]  Stephen P. Boyd,et al.  Applications of second-order cone programming , 1998 .

[34]  Stephen P. Boyd,et al.  Semidefinite Programming , 1996, SIAM Rev..

[35]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[36]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[37]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[38]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[39]  Jon W. Tolle,et al.  Exact penalty functions in nonlinear programming , 1973, Math. Program..