Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks

In this paper, a green communication scheme based on physical layer security is addressed considering the energy and secrecy constraints. This scheme maximizes the secure Energy Efficiency (EE) of the network by power allocation subject to the maximum power constraint of each node and the target secrecy rate constraint of the network. Furthermore, an iterative algorithm for power allocation is developed based on fractional programming, dual decomposition, and Difference of Convex functions (DC) programming. It is verified by simulations that the proposed algorithm can lead to a significant gain of secure EE yet with some loss of secrecy rate compared with secrecy rate maximization. This is because that there is an inherent tradeoff between EE and secrecy. However, the achievable secrecy rate of the proposed scheme is still superior over that of total transmission power minimization.

[1]  Wei Chen,et al.  CAO-SIR: Channel Aware Ordered Successive Relaying , 2014, IEEE Transactions on Wireless Communications.

[2]  Manfred Morari,et al.  Computational Complexity Certification for Real-Time MPC With Input Constraints Based on the Fast Gradient Method , 2012, IEEE Transactions on Automatic Control.

[3]  Huaiyu Dai,et al.  Delay optimal scheduling for energy harvesting based communications , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[4]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[5]  Tho Le-Ngoc,et al.  Joint Subchannel Assignment and Power Allocation for OFDMA Femtocell Networks , 2014, IEEE Transactions on Wireless Communications.

[6]  Costas N. Georghiades,et al.  Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.

[7]  Zhigang Cao,et al.  Buffer-Aware Network Coding for Wireless Networks , 2012, IEEE/ACM Transactions on Networking.

[8]  H. Vincent Poor,et al.  An information theoretic framework for energy efficient secrecy , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Sennur Ulukus,et al.  Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[10]  Zhigang Cao,et al.  A Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks , 2008, IEEE Transactions on Wireless Communications.

[11]  Werner Dinkelbach On Nonlinear Fractional Programming , 1967 .

[12]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[13]  Le Thi Hoai An,et al.  The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems , 2005, Ann. Oper. Res..

[14]  Zhigang Cao,et al.  Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming: A Structured Matrix-Geometric Method , 2012, IEEE Transactions on Mobile Computing.

[15]  Zhigang Cao,et al.  A Utility Maximization Framework for Fair and Efficient Multicasting in Multicarrier Wireless Cellular Networks , 2013, IEEE/ACM Transactions on Networking.

[16]  Farshad Lahouti,et al.  Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.

[17]  Daniel Pérez Palomar,et al.  A tutorial on decomposition methods for network utility maximization , 2006, IEEE Journal on Selected Areas in Communications.

[18]  Zhigang Cao,et al.  Cooperative Beamforming for Cognitive Radio Networks: A Cross-Layer Design , 2012, IEEE Transactions on Communications.

[19]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.