Ergodic Secrecy Capacity of Dual-Hop Multiple-Antenna AF Relaying Systems

This paper investigates the ergodic secrecy capacity (ESC) of multiple-antenna amplify-and-forward relay systems, where one eavesdropper can wiretap the relay. To reveal the capability of the multiple- antenna relay in improving the secrecy performance, we derive new tight closed-form lower bounds of the ESC for two secure transmission schemes: artificial noise aided precoding (ANP) and eigen-beamforming (EB). We also derive the lower bound of the ESC for ANP with a large antenna array at the relay, and investigate their corresponding asymptotic performance in the high and low SNR regimes. Based on the asymptotic analysis, we optimally allocate the power to the information signal and the artificial noise. Both the analysis and simulation results indicate that, in the moderate-to-high SNR regime, ANP achieves considerable performance gain over EB, while in the low SNR regime, EB outperforms ANP with equal power allocation. As SNR grows large, the ESC of EB approaches a constant only related to the number of relay antennas. Moreover, in the high SNR regime, it is optimal to allocate around half of total power to artificial noise for ANP.

[1]  Yongming Huang,et al.  Joint wireless information and energy transfer in massive distributed antenna systems , 2015, IEEE Communications Magazine.

[2]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[3]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[4]  Qi Xiong,et al.  Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information , 2014, IEEE Wireless Communications Letters.

[5]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[6]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[7]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[8]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[9]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[10]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[11]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[12]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[13]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[14]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[15]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[16]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.