Achievable rate region with secrecy constraints for secure communication in two-way relay networks

被引:4
|
作者
Yang, Yunchuan [1 ]
Wang, Wenbo [1 ]
Zhao, Hui [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Univ Wireless Commun, Beijing 100876, Peoples R China
关键词
physical layer security; two-way relay; cooperative beamforming; null space beamforming; semi-definite programming (SDP); geometric programming (GP); WIRELESS; CHANNELS;
D O I
10.1002/dac.2663
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a two-way relay network consisted of two sources and multiple relays in the presence of an eavesdropper, where the cooperative beamforming strategy is applied to exploit the cooperative diversity to support the secure communication as illustrated in Figure1. Naturally, we are interested in the beamforming strategy and power allocation to maximize the achievable sum secrecy rate. However, the corresponding problem is equivalent to solve a product of three correlated generalized Rayleigh quotients problem and difficult to solve in general. Because of the openness of wireless medium, the information rate leakage to the eavesdropper cannot be canceled perfectly. To some extent, almost perfect secrecy', where the rate leakage to the eavesdropper is limited, is more interesting from the practical point of view. In this case, we concern ourself mainly the achievable rate region for general case where the rate at the eavesdropper is regarded as the measurement of secrecy level. Two beamforming approaches, optimal beamforming and null space beamforming, are applied to investigate the achievable rate region with total power constraint and the rate constraint at the eavesdropper, which can be obtained by solving a sequence of the weighted sum inverse-signal-to-noise-ratio minimization (WSISM) problem. Because of the non-convexity of WSISM problem, an alternating iteration algorithm is proposed to optimize the relay beamforming vector and two sources' transmit power, where two subproblems need to be solved in each iteration. Meanwhile, we provide the convergence analysis of proposed algorithm. Through the numerical simulations, we verify the effectiveness of proposed algorithm. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:231 / 249
页数:19
相关论文
共 50 条
  • [31] Achievable SNR and Rate Regions for OFDM-based Asynchronous Two-way Relay Networks
    Mirzaei, Javad
    ShahbazPanahi, Shahram
    2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2014, : 105 - 109
  • [32] The Average Achievable Rate of Multi-Antenna Two-Way Relay Networks with Interference Alignment
    Xue Jiang
    Baoyu Zheng
    Weiping Zhu
    Lei Wang
    Xiaoyun Hou
    中国通信, 2020, 17 (06) : 121 - 130
  • [33] User power allocation and relay beamforming design for secrecy sum rate maximization in two-way relay networks
    Cheraghi, Mehdi
    Darmani, Yousef
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 146
  • [34] Achievable Degrees of Freedom of Cellular Multiuser Two-Way Relay Networks
    Wang, Rui
    Liu, Erwu
    Liu, Yuan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (08) : 4028 - 4038
  • [35] Secrecy Rate Region of Independent Parallel Multiple-Carrier Two-Way Secure Communications with Secure Feedback
    Li, Tao
    Zhao, Juntao
    Zhou, Shidong
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [36] An Achievable Rate Region for the Two-Way Channel with Common Output
    Sabag, Oron
    Permuter, Haim H.
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 527 - 531
  • [37] A New Achievable Rate Region for the Gaussian Two-Way Relay Channel via Hybrid Broadcast Protocol
    Ghasemi-Goojani, Shahab
    Behroozi, Hamid
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (11) : 1883 - 1886
  • [38] Secure Beamforming with Artificial Noise for Two-way Relay Networks
    Li, Dandan
    Xiong, Ke
    Du, Guanyao
    Qiu, Zhengding
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (06): : 1418 - 1432
  • [39] Secure Resource Allocation for OFDMA Two-Way Relay Networks
    Zhang, Haijun
    Xing, Hong
    Chu, Xiaoli
    Nallanathan, Arumugam
    Zheng, Wei
    Wen, Xiangming
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 3649 - 3654