Optimal Beamforming for Secure Transmit in Practical Wireless Networks

被引:1
|
作者
Yang, Qiuqin [1 ]
Li, Linfang [1 ]
Luo, Ming-Xing [1 ]
Wang, Xiaojun [2 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Dublin City Univ, Sch Elect Engn, Dublin 9, Ireland
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 01期
基金
中国国家自然科学基金;
关键词
Secure transmission; MISO system; imperfect CSI; BF vector; convex optimization; COMMUNICATION; SYSTEMS;
D O I
10.32604/cmc.2022.027120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real communication systems, secure and low-energy transmit scheme is very important. So far, most of schemes focus on secure transmit in special scenarios. In this paper, our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise (AN), the imperfect receiver and imperfect channel state information (CSI) of eavesdropper, weight of beamforming (BF) vector, cooperative jammers (CJ), multiple receivers, and multiple eavesdroppers, and the analysis shows that the protocol can reduce the transmission power, and at the same time the safe reachability rate is greater than our pre-defined value, and the analysis results are in good agreement with the simulation results. In this letter, the minimal transmit power is modeled as a non-convexity optimization that is general difficult. Our method is to transform it into a two-level non-convex problem. The outer is a univariate optimization that can be solved by the golden search algorithm. The inner is a convex optimization solved by using the CVX. The solutions are further used to improve the confidentiality rate of the system, and reduce the transmit power of the system and resource consumption in terms of the imperfect CSI. Simulations show the efficiency and robustness of the proposed protocol.
引用
收藏
页码:1863 / 1877
页数:15
相关论文
共 50 条
  • [21] Robust Transmit Beamforming for Secure Integrated Sensing and Communication
    Ren, Zixiang
    Qiu, Ling
    Xu, Jie
    Ng, Derrick Wing Kwan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (09) : 5549 - 5564
  • [22] Secrecy Transmit Beamforming for Heterogeneous Networks
    Lv, Tiejun
    Gao, Hui
    Yang, Shaoshi
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (06) : 1154 - 1170
  • [23] Joint beamforming and transmit diversity for wireless communications
    Xu, HJ
    Liu, J
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2004, : 195 - 199
  • [24] Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks
    Lin, Zhi
    Lin, Min
    Ouyang, Jian
    Zhu, Wei-Ping
    Chatzinotas, Symeon
    IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (08) : 1166 - 1170
  • [25] Secure Deployment with Optimal Connectivity in Wireless Sensor Networks
    Sangwan, Anju
    Singh, Rishipal
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2016, 7 (02) : 1 - 21
  • [26] An Optimal and Secure Routing Protocol for Wireless Sensor Networks
    Lazrag, Hilmi
    Chaibi, Hasna
    Saadane, Rachid
    Driss Rahmani, M.
    PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 83 - 87
  • [27] Optimal Beamforming in Wireless Multiuser MIMO-relay Networks
    Golbon-Haghighi, Mohammad-Hossein
    Shirazi, Mojtaba
    Mahboobi, Behrad
    Ardebilipour, Mehrdad
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [28] Generalized Firefly Algorithm for Optimal Transmit Beamforming
    Le, Tuan Anh
    Yang, Xin-She
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (06) : 5863 - 5877
  • [29] Optimal Transmit Beamforming for Integrated Sensing and Communication
    Hua, Haocheng
    Xu, Jie
    Han, Tony Xiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 10588 - 10603
  • [30] Practical and secure localization and key distribution for wireless sensor networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    AD HOC NETWORKS, 2012, 10 (06) : 946 - 961