Secure transmission in multiuser peer-to-peer relay network with finite alphabet input

This study considers linear precoding for secure transmission in a multiuser peer-to-peer relay network with finite alphabet input. Under the assumption that the global channel-state-information is available, the achievable secrecy rate is derived. However, the computational complexity to evaluate the achievable secrecy rate grows exponentially with respect to the number of pair users. To reduce the computational complexity caused by the multiuser interference, an accurate approximation of the achievable secrecy rate is derived. Based on Karush–Kuhn–Tucker analysis, necessary conditions for the optimal precoder which maximises the approximated achievable secrecy rate are presented. In light of this, an iterative gradient method is developed to find the optimal precoder. Numerical examples demonstrate that the proposed scheme achieves significant gains in terms of the secrecy rate over schemes designed for Gaussian input.

[1]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.

[3]  Zhi Ding,et al.  Globally Optimal Linear Precoders for Finite Alphabet Signals Over Complex Vector Gaussian Channels , 2011, IEEE Transactions on Signal Processing.

[4]  Zhi Ding,et al.  On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input , 2011, IEEE Communications Letters.

[5]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[6]  Mingxi Wang,et al.  Linear Precoding for MIMO Multiple Access Channels with Finite Discrete Inputs , 2011, IEEE Transactions on Wireless Communications.

[7]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[8]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[9]  Zhi Ding,et al.  Cooperative Multi-Cell MIMO Downlink Precoding With Finite-Alphabet Inputs , 2015, IEEE Trans. Commun..

[10]  Derrick Wing Kwan Ng,et al.  Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[11]  Hang Long,et al.  Secure communication design for multi-user peer-to-peer wireless relay networks , 2016, IET Commun..

[12]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[13]  Yahong Rosa Zheng,et al.  On the Mutual Information and Power Allocation for Vector Gaussian Channels with Finite Discrete Inputs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[14]  Yong Cheng,et al.  Joint Optimization of Source Power Allocation and Distributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks , 2012, IEEE Transactions on Signal Processing.

[15]  Björn E. Ottersten,et al.  Using simple relays to improve physical-layer security , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  Yueming Cai,et al.  Increasing secrecy capacity via joint design of cooperative beamforming and jamming , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[20]  Yang Li,et al.  3D channel model in 3GPP , 2015, IEEE Communications Magazine.

[21]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[22]  Zhi Ding,et al.  Linear Precoding for MIMO Broadcast Channels With Finite-Alphabet Constraints , 2012, IEEE Transactions on Wireless Communications.

[23]  Xuelong Li,et al.  Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective , 2016, IEEE Network.

[24]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[25]  Saeed Gazor,et al.  Multiple Peer-to-Peer Communications Using a Network of Relays , 2009, IEEE Transactions on Signal Processing.

[26]  Ananthanarayanan Chockalingam,et al.  Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.

[27]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[28]  Are Hjørungnes,et al.  Complex-Valued Matrix Differentiation: Techniques and Key Results , 2007, IEEE Transactions on Signal Processing.