4.7 Article

Joint Source-Relay Secure Precoding for MIMO Relay Networks With Direct Links

Journal

IEEE TRANSACTIONS ON COMMUNICATIONS
Volume 65, Issue 7, Pages 2781-2793

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2017.2686870

Keywords

Physical layer security; secrecy rate; relay; multiple-input multiple-output; precoding

Funding

  1. National Natural Science Foundation of China [61671364]
  2. Author of National Excellent Doctoral Dissertation of China [201340]
  3. Young Talent Support Fund of Science and Technology of Shaanxi Province [2015KJXX-01]
  4. US NSF [CNS-1646607, ECCS-1547201, CCF-1456921, CNS-1443917, ECCS-1405121]

Ask authors/readers for more resources

In this paper, we propose a joint source-relay precoding scheme to secure an amplify-and-forward multiple-input multiple-output wireless relay network in the existence of a multi-antenna eavesdropper. Different from existing works that only consider some specific signal design to simplify the problem, we take both the direct links from the source to the destination and to the eavesdropper into account, and investigate the general joint signal covariance matrices optimization problem to maximize the secrecy rate, which leads to a difficult non-convex optimization problem. To handle it, we propose a group alternating optimization algorithm to find a solution, which alternately optimizes the signal covariance matrix and the linear precoding matrix at the source and the relay, respectively. For optimizing the linear precoding matrix at the relay, the problem is still non-convex, and we propose a minorization-maximization (MM) method to handle it. The MM method transforms the original non-convex problem into a series of convex problems and guarantees the convergence of a local optimum. For optimizing the signal covariance matrix at the source, we reveal the convex-concave property of the problem, and find its global optimum using a barrier method combined with the Newton iteration. We also provide an initialization method to trigger the algorithm and analyze the convergence and complexity. The numerical results show the computational efficiency and the prominent performance of the proposed algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available