Physical Layer Security Cognitive Decode-and-Forward Relay Beamforming Network with Multiple Eavesdroppers
Physical layer security (PLS) approach for wireless communication can prevent eavesdropping without upper layer data encryption. In this paper, we consider the transmission of confidential message over wireless channel with the help of multiple cooperating relays in the Decode-and-Forward cooperative scheme. Based on an information-theoretic formulation of problem we take into account a wireless network system, in which an one-way relay wireless system including a source, a legitimate destination, multiple trusted relays and multiple eavesdroppers. For decode-and-forward beamforming protocol in the presence of one eavesdropper, the closed-form optimal solution is derived for the relay weights. For another case, when the communication system has the presence of multiple eavesdroppers, it becomes more difficult to find the optimal solution of the secrecy rate maximization problem. Hence, there are several criteria were considered leading to a suboptimal but simple solution. Specifically, nulling out the message signals completely at all eavesdroppers results in a simpler form of this problem and a suboptimal solution is explicitly obtained. In this paper, we propose a new approach based on the well known method, DC programming and DCA to solve the original problem, without considering any additional constraints.
KeywordsDecode-and-Forward Relay beamforming Physical layer security DC programming and DCA
We would like to thank Prof. Hoai An Le Thi, The director of LITA, University of Lorraine, France for helping us do research in this field. We also thank the referees for leading us to improve the manuscript.
- 8.Tuan, N.N., Son, D.V.: DC programming and DCA for Enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. In: Le, N.-T., Van Do, T., Nguyen, N.T., Thi, H.A.L. (eds.) ICCSAMA 2017. AISC, vol. 629, pp. 23–33. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61911-8_3CrossRefGoogle Scholar
- 9.Le Thi, H.A.: DC Programming and DCA. http://www.lita.univ-lorraine.fr/lethi/
- 12.Thuy, T.T., Tuan, N.N., An, L.T.H., Gély, A.: DC programming and DCA for enhancing physical layer security via relay beamforming strategies. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9622, pp. 640–650. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49390-8_62CrossRefGoogle Scholar