Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying

被引:67
|
作者
Wang, Dong [1 ,2 ]
Bai, Bo [1 ]
Chen, Wei [1 ]
Han, Zhu [3 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] New Star Res Inst Appl Technol, Hefei 230031, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
关键词
Physical layer security; secure energy efficiency; power allocation; amplify-and-forward; relay networks; RESOURCE-ALLOCATION; OPTIMIZATION; NETWORKS; SECRECY; DESIGN;
D O I
10.1109/TWC.2015.2477510
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For transmitting data in a secret and energy-efficient manner in collaborative amplify-and-forward relay networks, the secure energy efficiency (EE) defined as the secret bits transferred with unit energy is maximized to satisfy each node power constraint and target secrecy rate requirement, based on physical security framework. The secure EE is maximized by joint source and relay power allocation, which is a nonconvex optimization problem. To cope with this difficulty, a solution scheme and corresponding algorithms are developed by jointly applying fractional programming, exact penalty, alternate search, and difference of convex functions programming. The key idea of the scheme is to convert the primal problem into simple subproblems step by step, such that related methods are adopted. It is verified that, compared with secrecy rate maximization, the proposed scheme improves the secure EE significantly yet with a certain loss of the secrecy rate due to the tradeoff between secure EE and secrecy rate. Furthermore, the proposed scheme achieves higher secure EE and secrecy rate than total transmission power minimization does, while with a certain increase of power consumption. These results indicate that a reasonable balance among secure EE, secrecy rate, and power consumption can be reached by the proposed scheme.
引用
收藏
页码:740 / 752
页数:13
相关论文
共 50 条
  • [1] CREEP: Cognitive Relaying Enabled Efficiency and Physical-layer Security Preserving Framework
    Chen, Zhicheng
    Cao, Bin
    Zhang, Yalin
    Zhang, Qinyu
    Sun, Limin
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2014, : 258 - 262
  • [2] Physical-Layer MIMO Relaying
    Khina, Anatoly
    Kochman, Yuval
    Erez, Uri
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,
  • [3] Fairness-Aware Sub-Optimal Relay Selection for Physical-Layer Security in AF Relaying Networks
    Du, Haoyu
    Ge, Jianhua
    Zhang, Chensi
    Tian, Peijie
    2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,
  • [4] Physical Layer Security With RF Energy Harvesting in AF Multi-Antenna Relaying Networks
    Salem, Abdelhamid
    Hamdi, Khairi Ashour
    Rabie, Khaled M.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (07) : 3025 - 3038
  • [5] Energy Harvesting for Physical-Layer Security in OFDMA Networks
    Zhang, Meng
    Liu, Yuan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) : 154 - 162
  • [6] Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System
    El Shafie, Ahmed
    Sultan, Ahmed
    Al-Dhahir, Naofal
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1856 - 1859
  • [7] Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?
    Chen, Xiaoming
    Lei, Lei
    Zhang, Huazi
    Yuen, Chau
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 5135 - 5146
  • [8] Opportunistic relaying of the physical-layer network coding packets
    Lü, Ling
    Yu, Hong-Yi
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (07): : 1767 - 1770
  • [9] A Rateless Approach to Physical-Layer Security
    Johnson, Matthew H.
    Harrison, Willie K.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [10] Special Issue on Physical-Layer Security
    Bloch, Matthieu
    Debbah, Merouane
    Liang, Yingbin
    Oohama, Yasutada
    Thangaraj, Andrew
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (04) : 349 - 351