Robust Relay Beamforming Against Jamming Attack

In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using the Kalman filtering approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a quadratically constrained quadratic program. Simulation results show the efficient performance of the proposed method for different destruction powers of the jammer by achieving the Cramér–Rao lower bound.

[1]  Zhi-Quan Luo,et al.  Robust adaptive beamforming for general-rank signal models , 2003, IEEE Trans. Signal Process..

[2]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[3]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[4]  Björn E. Ottersten,et al.  Collaborative-Relay Beamforming With Perfect CSI: Optimum and Distributed Implementation , 2009, IEEE Signal Processing Letters.

[5]  Dongfeng Yuan,et al.  Secrecy rate analysis for jamming assisted relay communications systems , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Huiming Wang,et al.  Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI , 2015, IEEE Signal Processing Letters.

[7]  Zhen Li,et al.  Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[8]  Dongfeng Yuan,et al.  Joint Beamforming and Time Switching Design for Secrecy Rate Maximization in Wireless-Powered FD Relay Systems , 2018, IEEE Transactions on Vehicular Technology.

[9]  Mahmoud Ahmadian-Attari,et al.  Outage Based Robust Relay Beamforming Problem in Multi-User Networks , 2016, Wirel. Pers. Commun..

[10]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[11]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[12]  Mahmoud Ahmadian-Attari,et al.  Low-complexity robust relay optimisation for multiple peer-to-peer beamforming: a safe tractable approximation approach , 2015, IET Commun..

[13]  Patrick Tague,et al.  Stochastic optimization of flow-jamming attacks in multichannel wireless networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[15]  Mahmoud Ahmadian-Attari,et al.  Secure robust relay beamforming: a convex conic approximation approach , 2016, IET Commun..

[16]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[17]  Mehrdad Ardebilipour,et al.  Stochastic Robust Collaborative Beamforming: Non-Regenerative Relay , 2016, IEEE Transactions on Communications.

[18]  Huiming Wang,et al.  Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.