Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications

In the present study, the authors investigate robust secrecy rate optimisation problems for a multiple-inputsingle-output secrecy channel with multiple device-to-device (D2D) communications. The D2D communication nodes access this secrecy channel by sharing the same spectrum, and help to improve the secrecy communications by confusing the eavesdroppers. In return, the legitimate transmitter ensures that the D2D communication nodes achieve their required rates. In addition, it is assumed that the legitimate transmitter has imperfect channel state information of different nodes. For this secrecy network, the authors solve two robust secrecy rate optimisation problems: (a) robust power minimisation problem, subject to the probability based secrecy rate and the D2D transmission rate constraints; (b) robust secrecy rate maximisation problem with the transmit power, the probabilistic based secrecy rate and the D2D transmission rate constraints. Owing to the non-convexity of robust beamforming design based on two statistical channel uncertainty models, the authors present two conservative approximation approaches based on 'Bernsteintype' inequality and 'S-Procedure' to solve these robust optimisation problems. Simulation results are provided to validate the performance of these two conservative approximation methods, where it is shown that 'Bernstein-type' inequality based approach outperforms the 'S-Procedure' approach in terms of achievable secrecy rates.

[1]  Haibo Wang,et al.  Distance-constrained resource-sharing criteria for device-to-device communications underlaying cellular networks , 2012 .

[2]  Wenbo Wang,et al.  Interference Constrained D2D Communication with Relay Underlaying Cellular Networks , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).

[3]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[5]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[6]  Xiaoying Gan,et al.  Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[7]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[8]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[9]  Sungsoo Park,et al.  Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[10]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[11]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[12]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[13]  Björn E. Ottersten,et al.  Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.

[14]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[15]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[16]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[17]  Shuguang Cui,et al.  On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Kin K. Leung,et al.  Impact of Imperfect Channel State Information on Bi-Directional Communications With Relay Selection , 2011, IEEE Transactions on Signal Processing.

[19]  Tung-Sang Ng,et al.  Energy-efficient multiuser SIMO: achieving probabilistic robustness with gaussian channel uncertainty , 2009, IEEE Transactions on Communications.

[20]  Qiang Li,et al.  A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.

[21]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[22]  K. Cumanan,et al.  Robust interference control techniques for cognitive radios using worst-case performance optimization , 2008, 2008 International Symposium on Information Theory and Its Applications.

[23]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[24]  K. Cumanan,et al.  A Robust Beamforming Based Interference Control Technique and its Performance for Cognitive Radios , 2008, 2008 International Symposium on Communications and Information Technologies.

[25]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[26]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[27]  Lingyang Song,et al.  Resource Management for Device-to-Device Underlay Communication , 2013, SpringerBriefs in Computer Science.

[28]  Sungsoo Park,et al.  Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[29]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[30]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.