Achievable rate region with secrecy constraints for secure communication in two-way relay networks

被引:4
|
作者
Yang, Yunchuan [1 ]
Wang, Wenbo [1 ]
Zhao, Hui [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Univ Wireless Commun, Beijing 100876, Peoples R China
关键词
physical layer security; two-way relay; cooperative beamforming; null space beamforming; semi-definite programming (SDP); geometric programming (GP); WIRELESS; CHANNELS;
D O I
10.1002/dac.2663
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a two-way relay network consisted of two sources and multiple relays in the presence of an eavesdropper, where the cooperative beamforming strategy is applied to exploit the cooperative diversity to support the secure communication as illustrated in Figure1. Naturally, we are interested in the beamforming strategy and power allocation to maximize the achievable sum secrecy rate. However, the corresponding problem is equivalent to solve a product of three correlated generalized Rayleigh quotients problem and difficult to solve in general. Because of the openness of wireless medium, the information rate leakage to the eavesdropper cannot be canceled perfectly. To some extent, almost perfect secrecy', where the rate leakage to the eavesdropper is limited, is more interesting from the practical point of view. In this case, we concern ourself mainly the achievable rate region for general case where the rate at the eavesdropper is regarded as the measurement of secrecy level. Two beamforming approaches, optimal beamforming and null space beamforming, are applied to investigate the achievable rate region with total power constraint and the rate constraint at the eavesdropper, which can be obtained by solving a sequence of the weighted sum inverse-signal-to-noise-ratio minimization (WSISM) problem. Because of the non-convexity of WSISM problem, an alternating iteration algorithm is proposed to optimize the relay beamforming vector and two sources' transmit power, where two subproblems need to be solved in each iteration. Meanwhile, we provide the convergence analysis of proposed algorithm. Through the numerical simulations, we verify the effectiveness of proposed algorithm. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:231 / 249
页数:19
相关论文
共 50 条
  • [1] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Tao Li
    Shidong Zhou
    Tsinghua Science and Technology, 2018, 23 (02) : 126 - 134
  • [2] Achievable secrecy rate region of two-way communication with secret key feedback
    Li T.
    Zhou S.
    Zhou, Shidong (zhousd@tsinghua.edu.cn), 2018, Tsinghua University (23): : 126 - 134
  • [3] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Li, Tao
    Zhou, Shidong
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (02) : 126 - 134
  • [4] Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback
    Tao Li
    Shidong Zhou
    Tsinghua Science and Technology, 2018, (02) : 126 - 134
  • [5] Achievable Rate Region for Energy Harvesting Asynchronous Two-Way Relay Networks
    Vahidnia, Reza
    Anpalagan, Alagan
    Mirzaei, Javad
    IEEE ACCESS, 2016, 4 : 951 - 958
  • [6] An Achievable Rate Region for the Two-Way Multiple Relay Channel
    Ponniah, Jonathan
    Xie, Liang-Liang
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1670 - 1674
  • [7] An Achievable Rate Region for the Two-Way Two-Relay Channel
    Ponniah, Jonathan
    Xie, Liang-Liang
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 489 - 493
  • [8] Maximizing the minimum secrecy rate of two-way relay networks
    Sharifi, Faezeh
    Akhlaghi, Soroush
    COMPUTER COMMUNICATIONS, 2021, 178 : 259 - 270
  • [9] Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks
    Nie, Yulong
    Lan, Xiaolong
    Liu, Yong
    Chen, Qingchun
    Chen, Gaojie
    Fan, Lisheng
    Tang, Dong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1610 - 1625
  • [10] Maximising the minimum achievable secrecy rate of two-way relay networks using the null space beamforming method
    Khordad, Erfan
    Akhlaghi, Soroush
    Mirzaee, Meysam
    IET COMMUNICATIONS, 2017, 11 (06) : 793 - 800