DocumentCode :
66130
Title :
Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks
Author :
Hui-Ming Wang ; Miao Luo ; Qinye Yin ; Xiang-Gen Xia
Author_Institution :
Minist. of Educ. Key Lab. for Intell. Networks & Network Security, Xi´an Jiaotong Univ., Xi´an, China
Volume :
8
Issue :
12
fYear :
2013
fDate :
Dec. 2013
Firstpage :
2007
Lastpage :
2020
Abstract :
In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security of a single-antenna-equipped two-way relay network in the presence of an eavesdropper. The basic idea is that in both cooperative transmission phases, some intermediate nodes help to relay signals to the legitimate destination adopting distributed beamforming, while the remaining nodes jam the eavesdropper, simultaneously, which takes the data transmissions in both phases under protection. Two different schemes are proposed, with and without the instantaneous channel state information of the eavesdropper, respectively, and both are subjected to the more practical individual power constraint of each cooperative node. Under the general channel model, it is shown that both problems can be transformed into a semi-definite programming (SDP) problem with an additional rank-1 constraint. A current state of the art technique for handling such a problem is the semi-definite relaxation (SDR) and randomization techniques. In this paper, however, we propose a penalty function method incorporating the rank-1 constraint into the objective function. Although the so-obtained problem is not convex, we develop an efficient iterative algorithm to solve it. Each iteration is a convex SDP problem, thus it can be efficiently solved using the interior point method. When the channels are reciprocal such as in TDD mode, we show that the problems become second-order convex cone programming ones. Numerical evaluation results are provided and analyzed to show the properties and efficiency of the proposed hybrid security scheme, and also demonstrate that our optimization algorithms outperform the SDR technique.
Keywords :
antenna arrays; array signal processing; convex programming; cooperative communication; iterative methods; jamming; relay networks (telecommunication); telecommunication security; SDR techniques; TDD mode; convex SDP problem; convex semidefinite programming problem; cooperative node; cooperative transmission phases; distributed beamforming; eavesdropper; general channel model; hybrid cooperative beamforming; hybrid cooperative jamming; hybrid security scheme; instantaneous channel state information; interior point method; intermediate nodes; iterative algorithm; numerical evaluation; optimization algorithms; penalty function method; physical-layer security; randomization techniques; rank-1 constraint; relay signals; second-order convex cone programming; semidefinite relaxation techniques; single-antenna-equipped two-way relay network; two-way relay networks; Array signal processing; Channel models; Jamming; Physical layer; Relays; Security; Wireless communication; Physical layer security; distributed beamforming; penalty function method; secrecy rate; semi-definite programming; two-way relay networks;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2013.2287046
Filename :
6646279
Link To Document :
بازگشت