Physical Layer Security Cognitive Decode-and-Forward Relay Beamforming Network with Multiple Eavesdroppers

  • Nguyen Nhu TuanEmail author
  • Tran Thi Thuy
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11432)


Physical layer security (PLS) approach for wireless communication can prevent eavesdropping without upper layer data encryption. In this paper, we consider the transmission of confidential message over wireless channel with the help of multiple cooperating relays in the Decode-and-Forward cooperative scheme. Based on an information-theoretic formulation of problem we take into account a wireless network system, in which an one-way relay wireless system including a source, a legitimate destination, multiple trusted relays and multiple eavesdroppers. For decode-and-forward beamforming protocol in the presence of one eavesdropper, the closed-form optimal solution is derived for the relay weights. For another case, when the communication system has the presence of multiple eavesdroppers, it becomes more difficult to find the optimal solution of the secrecy rate maximization problem. Hence, there are several criteria were considered leading to a suboptimal but simple solution. Specifically, nulling out the message signals completely at all eavesdroppers results in a simpler form of this problem and a suboptimal solution is explicitly obtained. In this paper, we propose a new approach based on the well known method, DC programming and DCA to solve the original problem, without considering any additional constraints.


Decode-and-Forward Relay beamforming Physical layer security DC programming and DCA 



We would like to thank Prof. Hoai An Le Thi, The director of LITA, University of Lorraine, France for helping us do research in this field. We also thank the referees for leading us to improve the manuscript.


  1. 1.
    Wyner, A.D.: The Wire-tap channel. Bell Sys. Tech. J. 54, 1355–1387 (1975)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Csiszar, I., Korner, J.: The broadcast channels with confidential messages. IEEE Trans. Inf. Thoery IT–24(3), 339–348 (1978)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Leung-Yan-Cheong, S.K., Hellman, M.E.: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory IT–24, 451–456 (1978)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16, 1550–1573 (2014)CrossRefGoogle Scholar
  5. 5.
    Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Math. Vietnamica 22, 289–357 (1997)MathSciNetzbMATHGoogle Scholar
  6. 6.
    Pham Dinh, T., Le Thi, H.A.: Optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8, 476–505 (1998)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Nguyen, N.-T., Le-Thi, H.A. (eds.) Transactions on CCI XIII. LNCS, vol. 8342, pp. 1–37. Springer, Heidelberg (2014). Scholar
  8. 8.
    Tuan, N.N., Son, D.V.: DC programming and DCA for Enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. In: Le, N.-T., Van Do, T., Nguyen, N.T., Thi, H.A.L. (eds.) ICCSAMA 2017. AISC, vol. 629, pp. 23–33. Springer, Cham (2018). Scholar
  9. 9.
    Le Thi, H.A.: DC Programming and DCA.
  10. 10.
    Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Vishwakarma, S., Chockalingam, A.: Decode-and-Forward relay beamforming for security with finite-alphabet input. IEEE Commun. Lett. 17(5), 912–915 (2013)CrossRefGoogle Scholar
  12. 12.
    Thuy, T.T., Tuan, N.N., An, L.T.H., Gély, A.: DC programming and DCA for enhancing physical layer security via relay beamforming strategies. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9622, pp. 640–650. Springer, Heidelberg (2016). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of CryptographyAcademy of Cryptography TechniqueHanoiVietnam
  2. 2.FPT UniversityHanoiVietnam

Personalised recommendations