Confidential Multicasting Assisted by Multi-Hop Multi-Antenna DF Relays in the Presence of Multiple Eavesdroppers

In this paper, we consider confidential multicasting in multi-hop multi-antenna decode-and-forward (DF) relay networks, where a source sends a secure common message to multiple destinations in the presence of multiple eavesdroppers with the help of a multi-antenna DF relay located at each hop. Under an overall power constraint, we first show that the optimization problem for relay beamformer design and power allocation to maximize the achievable multicast secrecy rate in a two-hop multi-antenna relay network can be solved by using semidefinite relaxation and bisection technique. Further, we also propose a suboptimal iterative sequential update scheme for a multi-hop relay network including more than two hops. At each iteration, the relay beamformer at each hop is updated sequentially by solving an extended generalized eigenvector problem for a multiple-destination multiple-eavesdropper case, and the power allocation is updated by using the bisection technique with the feasibility problem of linear programming. Numerical results are presented to verify the multicast secrecy rates achieved by the proposed schemes in multi-hop multi-antenna DF relay networks.

[1]  Johan Löfberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .

[2]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[4]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[5]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[6]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[7]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[10]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[11]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[12]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[13]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[14]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[15]  Jian Wang,et al.  Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[16]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[17]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[18]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[19]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[20]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[21]  Mustafa Cenk Gursoy,et al.  Relay beamforming strategies for physical-layer security , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[22]  Jong-Ho Lee,et al.  Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[23]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[24]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[25]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[26]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[27]  Zhi-Quan Luo,et al.  Distributed Beamforming for Relay Networks Based on Second-Order Statistics of the Channel State Information , 2008, IEEE Transactions on Signal Processing.

[28]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[29]  Nikos D. Sidiropoulos,et al.  Quality of Service and Max-Min Fair Transmit Beamforming to Multiple Cochannel Multicast Groups , 2008, IEEE Transactions on Signal Processing.

[30]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[31]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[32]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[33]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.