DocumentCode :
76099
Title :
Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications
Author :
Zheng Chu ; Cumanan, Kanapathippillai ; Mai Xu ; Zhiguo Ding
Author_Institution :
Sch. of Electr. & Electron. Eng., Newcastle Univ., Newcastle upon Tyne, UK
Volume :
9
Issue :
3
fYear :
2015
fDate :
2 12 2015
Firstpage :
396
Lastpage :
403
Abstract :
In the present study, the authors investigate robust secrecy rate optimisation problems for a multiple-input-single-output secrecy channel with multiple device-to-device (D2D) communications. The D2D communication nodes access this secrecy channel by sharing the same spectrum, and help to improve the secrecy communications by confusing the eavesdroppers. In return, the legitimate transmitter ensures that the D2D communication nodes achieve their required rates. In addition, it is assumed that the legitimate transmitter has imperfect channel state information of different nodes. For this secrecy network, the authors solve two robust secrecy rate optimisation problems: (a) robust power minimisation problem, subject to the probability based secrecy rate and the D2D transmission rate constraints; (b) robust secrecy rate maximisation problem with the transmit power, the probabilistic based secrecy rate and the D2D transmission rate constraints. Owing to the non-convexity of robust beamforming design based on two statistical channel uncertainty models, the authors present two conservative approximation approaches based on `Bernstein-type´ inequality and `S-Procedure´ to solve these robust optimisation problems. Simulation results are provided to validate the performance of these two conservative approximation methods, where it is shown that `Bernstein-type´ inequality based approach outperforms the `S-Procedure´ approach in terms of achievable secrecy rates.
Keywords :
approximation theory; array signal processing; computer network security; minimax techniques; multiuser channels; radio networks; radio spectrum management; radio transmitters; statistical analysis; Bernstein-type inequality based approach; D2D communication node; D2D transmission rate constraint; S-procedure approach; conservative approximation method; eavesdropper; imperfect channel state information; legitimate transmitter; multiple device-to-device communication; multiuser multiple input single output secrecy channel access; probabilistic based secrecy rate; robust beamforming design; robust power minimisation problem; robust secrecy rate maximisation problem; robust secrecy rate optimisation problem; secrecy communication network; spectrum sharing; statistical channel uncertainty model;
fLanguage :
English
Journal_Title :
Communications, IET
Publisher :
iet
ISSN :
1751-8628
Type :
jour
DOI :
10.1049/iet-com.2014.0310
Filename :
7047328
Link To Document :
بازگشت