Consider a two-way amplify-and-forward (AF) relay network where two legitimate nodes communicate through a relay in the presence of an eavesdropper. Assuming full duplexity at the legitimate nodes and the relay, a robust artificial noise (AN)-aided AF scheme is proposed to maximize the worst-case sum secrecy rate under imperfect channel state information (CSI) of the eavesdropper. This robust sum secrecy rate maximization (SSRM) problem is formulated as a max-min semi-infinite problem and is tackled by the semidefinite relaxation (SDR) method. In particular, we first convert the max-min semi-infinite problem into a maximization problem with a finite number of constraints. Then, an efficient two-block alternating difference-of-concave (DC) programming approach is proposed to iteratively solve the SDR problem, with one of the blocks computed in closed form. In addition, a specific robust rank-one solution construction procedure is presented to extract a feasible solution for the original robust SSRM problem from the SDR solution. The efficacy of the proposed method is demonstrated by numerical simulations.
physical-layer security full-duplex relay difference-of-concave program semidefinite relaxation MIMO
This is a preview of subscription content, log in to check access.
This work was supported by National Natural Science Foundation of China (Grant Nos. 61401073, 61531009).
Zheng G, Krikidis I, Li J, et al. Improving physical layer secrecy using full-duplex jamming receivers. IEEE Trans Sig Process, 2013, 61: 4962–4974MathSciNetCrossRefGoogle Scholar
Sun Y, Ng D W K, Zhu J, et al. Multi-objective optimization for robust power efficient and secure full-duplex wireless communication systems. IEEE Trans Wirel Commun, 2016, 15: 5511–5526CrossRefGoogle Scholar
Parsaeefard S, Le-Ngoc T. Improving wireless secrecy rate via full-duplex relay-assisted protocols. IEEE Trans Inf Foren Sec, 2015, 10: 2095–2107CrossRefGoogle Scholar
Chen G, Gong Y, Xiao P, et al. Physical layer network security in the full-duplex relay system. IEEE Trans Inf Foren Sec, 2015, 10: 574–583CrossRefGoogle Scholar
Lee J. Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Commun Lett, 2015, 19: 525–528MathSciNetCrossRefGoogle Scholar
Li Q, Han D. Sum secrecy rate maximization for full-duplex two-way relay networks. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Shanghai, 2016. 3641–3645Google Scholar
Gong S Q, Xing C W, Fei Z S, et al. Cooperative beamforming design for physical-layer security of multi-hop MIMO communications. Sci China Inf Sci, 2016, 59: 062304CrossRefGoogle Scholar
Zhao R, Lin H X, He Y C, et al. Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection. Sci China Inf Sci, 2017, 60: 069303CrossRefGoogle Scholar
Liang Y, Poor H V, Shamai S. Information theoretic Ssecurity. Found Trends Commun Inf Theory, 2008, 5: 355–580CrossRefMATHGoogle Scholar
Li C, Yang L, Zhu W-P. Minimum mean squared error design of single-antenna two-way distributed relays based on full or partial channel state information. IET Commun, 2011, 5: 728–735MathSciNetCrossRefGoogle Scholar
Li C, Yang L, Zhu W-P. A two-way MIMO relaying scheme with partial channel state information. Wirel Pers Commun, 2013, 72: 1949–1968CrossRefGoogle Scholar
Tekin E, Yener A. The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming. IEEE Trans Inf Theory, 2008, 54: 2735–2751CrossRefMATHGoogle Scholar