Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers

We have evaluated the optimal secrecy rate for Amplify-and-Forward (AF) relay networks with multiple eavesdroppers. Assuming i.i.d. Gaussian noise at the destination and the eavesdroppers, we have devised technique to calculate optimal scaling factor for relay nodes to obtain optimal secrecy rate under both sum power constraint and individual power constraint. Initially, we have considered special channel conditions for both destination and eavesdroppers, which led us to analytical solution of the problem. Contrarily, the general scenario being a non-convex optimization problem, not only lacks an analytical solution, but also is hard to solve. Therefore, we have proposed an efficiently solvable quadratic program (QP) which provides a sub-optimal solution to the original problem. Then, we have devised an iterative scheme for calculating optimal scaling factor efficiently for both the sum power and individual power constraint scenario. Necessary figures are provided in result section to affirm the validity of our proposed solution.

[1]  Athina P. Petropulu,et al.  Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels , 2009, ArXiv.

[2]  Yindi Jing,et al.  Network Beamforming Using Relays With Perfect Channel Information , 2007, IEEE Transactions on Information Theory.

[3]  Minghua Chen,et al.  Amplify-and-forward in wireless relay networks , 2011, 2011 IEEE Information Theory Workshop.

[4]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[5]  Brett Schein,et al.  Distributed coordination in network information theory , 2001 .

[6]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[8]  Zhu Han,et al.  Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[11]  Joy Kuri,et al.  Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[12]  Pietro Belotti,et al.  Linear Programming Relaxations of Quadratically Constrained Quadratic Programs , 2012, ArXiv.

[13]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[14]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[15]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[16]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[17]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[18]  Raviraj S. Adve,et al.  Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.

[19]  Lizhong Zheng,et al.  Amplify-and-Forward in Wireless Relay Networks: Rate, Diversity, and Network Size , 2007, IEEE Transactions on Information Theory.

[20]  R. E. Kalman,et al.  Optimum Seeking Methods. , 1964 .

[21]  J. R. Bar-on,et al.  Global optimization of a quadratic functional with quadratic equality constraints , 1994 .

[22]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[23]  Hesham El Gamal,et al.  Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[24]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.