Efficient algorithms for physical layer security in one-way relay systems
- 5 Downloads
In this paper, we solve two problems aiming at improving the secure communications in a one-way relay system. The system under consideration consists of one source, one destination, N cooperative relays that use amplify and forward, and one eavesdropper. First, we minimize the relays power under information rate constraints for both the legitimate destination and the eavesdropper. When the source power is given, the problem is formulated as a non-convex quadratically constraint quadratic programming, which can be solved using a semidefinite programming (SDP). However, since SDP suffers from high complexity, we propose a novel approach, using generalized eigenvalue, that provides a closed form of the optimal solution in most cases. Then we prove that the relays power can be further decreased as the source power increases. Second, we solve the problem of maximizing the secrecy rate by looking for the optimal relays beamforming vector. We show that the optimization problem of the beamforming vector is a product of two correlated generalized Rayleigh quotients. For this problem, we show that the optimal beamforming vector can be obtained using a series of SDPs, then we significantly simplify the problem by solving it using a series of eigenvalue problem. Numerical results show that the proposed approaches achieve the optimal solution of the relay beamforming vector and enhance the physical layer security with power allocation.
KeywordsPhysical layer security Relaying systems Convex optimization
The authors would like to acknowledge the support provided by the Deanship of Scientific Research at King Fahd University of Petroleum and Minerals (KFUPM) under Research Grant RG1416.
- 1.Obeed, M. (2016). Physical layer security in one-way and two-way relay systems. Master’s thesis, King Fahd University of Petroleum and Minerals. http://eprints.kfupm.edu.sa/139830/.
- 5.Parada, P., & Blahut, R. (2005). Secrecy capacity of simo and slow fading channels. In Proceedings of the international symposium on information theory, 2005. ISIT 2005 (pp. 2152–2155). IEEE.Google Scholar
- 14.Zhang, J., & Gursoy, M. C. (2010). Relay beamforming strategies for physical-layer security. In 2010 44th annual conference on information sciences and systems (CISS) (pp. 1–6). IEEE.Google Scholar
- 17.Nikookar-Hamedani, P., & Soleimani-Nasab, E. (2016). Physical layer security in the presence of the eavesdroppers in cooperative networks. In Smart grids conference (SGC), 2016 (pp. 1–8). IEEE.Google Scholar
- 20.Wang, H.-M., Yin, Q., & Xia, X.-G. (2011). Improving the physical-layer security of wireless two-way relaying via analog network coding. In 2011 IEEE Global telecommunications conference (GLOBECOM 2011) (pp. 1–6). IEEE.Google Scholar
- 24.Zhang, R., Song, L., Han, Z., Jiao, B., & Debbah, M. (2010). Physical layer security for two way relay communications with friendly jammers. In 2010 IEEE Global telecommunications conference (GLOBECOM 2010) (pp. 1–6). IEEE.Google Scholar
- 25.Obeed, M., & Mesbah, W. (2016). An efficient physical layer security algorithm for two-way relay systems. In 2016 IEEE Wireless communications and networking conference (WCNC) (pp. 1–6). IEEE.Google Scholar
- 30.Grant, M., & Boyd, S. (2013). Cvx: Matlab software for disciplined convex programming. http://cvxr.com/cvx.