Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate. We first analyze the challenges in solving this problem. The result indicates that our nonconvex joint power allocation is equivalent to a joint MS access control and power allocation. Then, by problem relaxation and the alternating optimization approach, two suboptimal joint MS access control and power allocation algorithms are proposed. These algorithms alternatively solve the subproblem of joint BS and UR power allocation and the subproblem of MS selection until system sum secrecy rate is nonincreasing. In addition, the convergence and computational complexity of the proposed algorithms are analyzed. Finally, simulations results are presented to demonstrate the performance of our proposed algorithms.

[1]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[2]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[3]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[4]  Liang Jin,et al.  A physical layer security transmission mechanism based on joint channel characteristics in relay system , 2012, 2012 IEEE 14th International Conference on Communication Technology.

[5]  Huiming Wang,et al.  Joint relay selection and artificial jamming power allocation for secure DF relay networks , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[6]  Junni Zou,et al.  Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks , 2013, IEEE Transactions on Wireless Communications.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[9]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[10]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[11]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[12]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[13]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[14]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[15]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[16]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[17]  Guanghan Xu,et al.  Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks , 2013, 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID).

[18]  Zhu Han,et al.  Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game , 2009, IEEE Transactions on Mobile Computing.

[19]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[20]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[21]  Jianhua Ge,et al.  Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.

[22]  Armin Wittneben,et al.  Power Allocation Schemes for Amplify-and-Forward MIMO-OFDM Relay Links , 2007, IEEE Transactions on Wireless Communications.

[23]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[24]  Luigi Grippo,et al.  On the convergence of the block nonlinear Gauss-Seidel method under convex constraints , 2000, Oper. Res. Lett..

[25]  Urbashi Mitra,et al.  Optimization of Amplify-and-Forward Multicarrier Two-Hop Transmission , 2011, IEEE Transactions on Communications.

[26]  Di Zhao,et al.  Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading , 2013 .

[27]  Ioannis Lambadaris,et al.  Optimal Joint Resource Allocation and Power Control in Bidirectional Relaying Networks , 2014, IEEE Transactions on Vehicular Technology.

[28]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[29]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[30]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[31]  Yasutada Oohama,et al.  Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.

[32]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[33]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[34]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[35]  Yingbo Hua,et al.  A Dual-Phase Power Allocation Scheme for Multicarrier Relay System With Direct Link , 2014, IEEE Transactions on Signal Processing.