Iterative algorithm for secrecy guarantee with null space beamforming in two-way relay networks

In this paper, we investigate a two-way relay networks consisted of two sources, multiple cooperative relays, and an eavesdropper. To guarantee the secure communication, a null space beamforming strategy is applied, where the relay beamforming vector is design to lie in the null space of the equivalent channel from two sources to the eavesdropper. Aiming to minimize the total transmit power under individual secrecy rate constraint at two sources, an alternating iteration method is proposed to calculate the relay beamforming vector as well as sources' transmit power. For relay beamforming vector optimization subproblem, two different approaches, semi-definite programming (SDP) relaxation and sequential quadratic programming (SQP) method, are proposed. Subproblem with two sources' transmit power optimization is formulated as a single variable problem and solved by Newton method with line search effectively. Through the numerical simulations, we verify the effectiveness of proposed algorithm. Moreover, with computational complexity analysis, we show that the SQP method has lower complexity than SDP, and further verify it in terms of executing time.

[1]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[2]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[3]  Shuguang Cui,et al.  Distributed beamforming for two-way relay networks with reciprocal channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[4]  Shahram Shahbazpanahi,et al.  Optimal Distributed Beamforming for Two-Way Relay Networks , 2010, IEEE Transactions on Signal Processing.

[5]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[6]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[7]  Xiang He,et al.  On the role of feedback in two-way secure communication , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[8]  Young-Il Kim,et al.  Design and Performance of Space–Time Precoder With Hybrid ARQ Transmission , 2009, IEEE Transactions on Vehicular Technology.

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  A. Lee Swindlehurst,et al.  Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[11]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[12]  Ya-Xiang Yuan,et al.  Fast algorithm for beamforming problems in distributed communication of relay networks , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Huiming Wang,et al.  Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[14]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Wenbo Wang,et al.  Multihop cellular networks toward LTE-advanced , 2009, IEEE Vehicular Technology Magazine.

[17]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[18]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.