Sum Secrecy Rate Maximization for Relay-Aided Multiple-Source Multiple-Destination Networks

This paper studies a multiple-source multiple-destination network with the presence of multiple eavesdroppers, in which an amplify-and-forward (AF) relay is used to bridge the communication between the source–destination pairs to overcome the long-distance attenuation. Considering the physical-layer security issues, we aim to maximize the sum secrecy rate subject to the relay power constraint and the quality-of-service (QoS) requirements for legitimate user equipment. First, we propose an algorithm based on the monotonic optimization and the semidefinite programming (MO-SDP). Simulation results show that our proposed MO-SDP algorithm exhibits almost the same performance as the optimal solution. To alleviate the problem of high complexity associated with the MO-SDP algorithm, we then propose an alternative solution based on the null-space (NuS) relay precoding, the complexity of which is significantly reduced, and it yields a semiclosed-form expression for the solution. Moreover, the performance of the proposed NuS algorithm is evaluated via simulations, and the performance of the NuS algorithm and that of the MO-SDP algorithm are shown to converge at the high signal-to-noise ratio (SNR) region.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[3]  C. Helmberg Semidefinite Programming for Combinatorial Optimization , 2000 .

[4]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[5]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[6]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[8]  Derrick Wing Kwan Ng,et al.  Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[9]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[10]  Ali H. Sayed,et al.  Active Antenna Selection in Multiuser MIMO Communications , 2007, IEEE Transactions on Signal Processing.

[11]  Stephen P. Boyd,et al.  Semidefinite Programming , 1996, SIAM Rev..

[12]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[13]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[14]  Jin Yang,et al.  Evolved Universal Terrestrial Radio Access Network (EUTRAN) , 2017 .

[15]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[16]  Hui Yu,et al.  Secrecy capacity optimization in coordinated multi-point processing , 2013, 2013 IEEE International Conference on Communications (ICC).

[17]  Qi Zhang,et al.  Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks , 2014, IEEE Transactions on Vehicular Technology.

[18]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[19]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Jianhua Ge,et al.  Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.

[21]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[22]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[23]  Wen Chen,et al.  Polyblock Algorithm-Based Robust Beamforming for Downlink Multi-User Systems With Per-Antenna PowerConstraints , 2014, IEEE Transactions on Wireless Communications.

[24]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[25]  Ying Jun Zhang,et al.  Monotonic Optimization in Communication and Networking Systems , 2013, Found. Trends Netw..