Beamforming design of decode-and-forward cooperation for improving wireless physical layer security

Physical-layer-based security aims at ensuring the reliability of communication and preventing eavesdropping by taking advantage of the physical layer's characteristics rather than the data encryption in upper layer. Cooperation is a way to achieve this goal with many benefits for wireless communication. In particular, the cooperation scheme called decode-and-forward (DF) is discussed in this paper and our objective is to design the beamforming weight of each cooperating node which is one antenna equipped for maximum achievable secrecy rate. Considering that individual power constraint is more reasonable than total power constraint and to set noise power levels at the destination and the eavesdropper different is more practical than the same, we get the whole optimization problem which is unconvex. With the help of perfect global channel state information (CSI), the problem is solved through a way where convex optimization and one-dimensional search are combined together. And strict proofs are presented for this method. Then zero-forcing (ZF) based simplification and extension to cope with multi-antenna case are discussed. Numerical results show that the proposed design can significantly improve the security performance of wireless systems.

[1]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[2]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[3]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[4]  Ami Wiesel,et al.  Maximum likelihood estimation in linear models with a Gaussian model matrix , 2006, IEEE Signal Processing Letters.

[5]  ShamaiShlomo,et al.  A note on the secrecy capacity of the multiple-antenna wiretap channel , 2009 .

[6]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[7]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[9]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[12]  Masanobu Abe,et al.  Restaurant recommendation service using lifelogs , 2011 .

[13]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[14]  Masanobu Abe,et al.  Lifelog remote control for collecting operation logs needed for lifelog-based services , 2011 .

[15]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[16]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[17]  Steven P. Weber,et al.  Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security , 2010, ArXiv.

[18]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[19]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[20]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[21]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[22]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[23]  Changseok Bae,et al.  Lifelog Collection Using a Smartphone for Medical History Form , 2011 .

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[26]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.