Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming

Consider a two-way communication scenario where two single-antenna nodes, operating under full-duplex mode, exchange information to one another through the aid of a (full-duplex) multiantenna relay, and there is another single-antenna node who intends to eavesdrop. The relay employs artificial noise (AN) to interfere the eavesdropper's channel, and amplify-forward Alamouti-based rank-two beamforming to establish the two-way communication links of the legitimate nodes. Our problem is to optimize the rank-two beamformer and AN covariance for sum secrecy rate maximization (SSRM). This SSRM problem is nonconvex, and we develop an efficient solution approach using semidefinite relaxation (SDR) and minorization-maximization (MM). We prove that SDR is tight for the SSRM problem and, thus, introduces no loss. Also, we consider an inexact MM method where an approximate but computationally cheap MM solution update is used in place of the exact update in conventional MM. We show that this inexact MM method guarantees convergence to a stationary solution to the SSRM problem. The effectiveness of our proposed approach is further demonstrated by an energy-harvesting scenario extension, and by extensive simulation results.

[1]  Siavash M. Alamouti,et al.  A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..

[2]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Qi Zhang,et al.  Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications , 2015, IEEE Wireless Communications Letters.

[4]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[5]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[6]  Caijun Zhong,et al.  Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.

[7]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[8]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Caijun Zhong,et al.  Spatial-Modulation Based Wireless Information and Power Transfer with Full Duplex Relaying , 2018, 2018 IEEE International Conference on Communications (ICC).

[10]  Ying-Chang Liang,et al.  Optimal beamforming for two-way multi-antenna relay channel with analogue network coding , 2008, IEEE Journal on Selected Areas in Communications.

[11]  Yurii Nesterov,et al.  Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.

[12]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[13]  Gan Zheng,et al.  Joint Beamforming Optimization and Power Control for Full-Duplex MIMO Two-Way Relay Channel , 2014, IEEE Transactions on Signal Processing.

[14]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[15]  Rui Zhang,et al.  Full-Duplex Wireless-Powered Relay With Self-Energy Recycling , 2014, IEEE Wireless Communications Letters.

[16]  Hyungsik Ju,et al.  Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.

[17]  Derrick Wing Kwan Ng,et al.  Simultaneous wireless information and power transfer in modern communication systems , 2014, IEEE Communications Magazine.

[18]  D. Hunter,et al.  A Tutorial on MM Algorithms , 2004 .

[19]  Qi Zhang,et al.  Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications , 2016, IEEE Transactions on Vehicular Technology.

[20]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[21]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[22]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[23]  Qiang Li,et al.  Sum secrecy rate maximization for full-duplex two-way relay networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[24]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[25]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[26]  Sumei Sun,et al.  Full-Duplex Wireless-Powered Communication Network With Energy Causality , 2014, IEEE Transactions on Wireless Communications.

[27]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[28]  Dongkyu Kim,et al.  A Survey of In-Band Full-Duplex Transmission: From the Perspective of PHY and MAC Layers , 2015, IEEE Communications Surveys & Tutorials.

[29]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[30]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[31]  Anthony Man-Cho So,et al.  Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding , 2013, IEEE Transactions on Signal Processing.

[32]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[33]  Zhi-Quan Luo,et al.  A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization , 2012, SIAM J. Optim..

[34]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[35]  Gert R. G. Lanckriet,et al.  On the Convergence of the Concave-Convex Procedure , 2009, NIPS.