4.7 Article

Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks

期刊

IEEE TRANSACTIONS ON SIGNAL PROCESSING
卷 62, 期 8, 页码 2111-2126

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSP.2014.2303942

关键词

Null space beamforming; physical layer security; semi-definite programming; sequential quadratic programming

资金

  1. National Natural Science Foundation of China NSFC [11331012, 61302088]
  2. Research Fund for the Doctoral Program of Higher Education [20130005120003]
  3. National Key Technology R&D Program of China [2012ZX03004005]

向作者/读者索取更多资源

In this paper, we consider a two-way relay network with two sources and multiple cooperative relays in the presence of an eavesdropper. To guarantee the secrecy, a null space beamforming scheme is applied, where the relay beamforming vector lies in the nullspace of the equivalent channel of relay link from two sources to the eavesdropper. Our goal is to obtain the optimal beamforming vector as well as two sources' transmit power subject to various criteria. We propose three different approaches and solve them in an alternating iterative way, where subproblems for solving beamforming and sources' power are formulated in each iteration, respectively. First, we minimize the total transmit power under secrecy rate constraint at two sources. For beamforming vector subproblem, two different methods, semi-definite programming (SDP) and sequential quadratic programming (SQP), are proposed, where we analyze and verify SQP has lower complexity than SDP. Second, we maximize the secrecy sum rate, subject to total transmit power constraint. The beamforming vector subproblem is equivalent to a generalized Rayleigh quotient problem with rank constraint. Third, the problem of minimum per-user secrecy rate maximization under the total power constraint is investigated for user fairness. An iterative procedure utilizing the SDP with bisection search method is proposed to solve beamforming subproblem. In each approach the subproblem with two sources' power is formulated as a single variable problem and solved by Newton's method with line search. Simulation results demonstrate the validity of proposed approaches and algorithms for both symmetric and asymmetric scenarios.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据