Beamforming with opportunistic relaying for wireless security

The authors present a beamforming scheme with opportunistic relaying (namely opportunistic beamforming) for wireless security under amplify-and-forward (AF) and decode-and-forward (DF) strategies. The relay selection is performed using the method of distributed timers, where all the relays use their timers to estimate own instantaneous channel gains and compete to access the wireless medium according to their own channel conditions. The performance of opportunistic beamforming scheme in terms of secure outage probability is analysed and the beamforming problem as a semidefinite programming problem with its optimisation framework is formulated. The results show that, in an opportunistic beamforming scheme, competition among cooperative relays offers diversity benefits in the direction of destination that enhances secrecy rate (i.e. minimises secure outage probability) and adhere to the ‘opportunistic’ cooperation rule giving priority to the ‘best’ available relay even when they are not chosen to transmit but rather chosen to cooperatively listen. Opportunistic beamforming scheme with DF strategy enhances secrecy rate than the beamforming with multiple DF relays while in the case of AF strategy, it provides significant improvement in the secrecy rate compared to the opportunistic relaying, the equal-power multiple-relay transmission and the single-relay transmission schemes.

[1]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[2]  Raviraj S. Adve,et al.  Symbol error rate of selection amplify-and-forward relay systems , 2006, IEEE Communications Letters.

[3]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secure Broadcasting , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[4]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[5]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[6]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[7]  Ho Van Khuong,et al.  General expression for pdf of a sum of independent exponential random variables , 2006, IEEE Commun. Lett..

[8]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[9]  Raghuraman Mudumbai,et al.  On the Feasibility of Distributed Beamforming in Wireless Networks , 2007, IEEE Transactions on Wireless Communications.

[10]  Zhi-Quan Luo,et al.  Distributed Beamforming for Relay Networks Based on Second-Order Statistics of the Channel State Information , 2008, IEEE Transactions on Signal Processing.

[11]  Mustafa Cenk Gursoy,et al.  Secure relay beamforming over cognitive radio channels , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[12]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[13]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[14]  Andrew Lippman,et al.  Intelligent antenna sharing in cooperative diversity wireless networks , 2005 .

[15]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[16]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[17]  Raviraj S. Adve,et al.  Beamforming with limited feedback in amplify-and-forward cooperative networks - [transactions letters] , 2008, IEEE Trans. Wirel. Commun..