Abstract
Beside of cryptography - the primary traditional methods for ensuring information security and confidentiality, the appearance of the physical layer security approach plays an important role for not only enabling the data transmission confidentially without relying on higher-layer encryption, but also enhancing confidentiality of the secret key distribution in cryptography itself. In this paper, we mention a technique used in physical layer security, this is relay beamforming strategy with Decode-and-Forward relaying technique. The optimization problems with the aim of maximizing the sum of secrecy rates subject to individual relay power constraints are formulated as a nonconvex problem. These problems can be rewritten as DC (difference of two convex functions) programs. We apply the standard DCA scheme to find solution to this problem. The main benefit of the proposed method is that it provides an optimal value for the system secrecy rate while the previous existing methods only give its upper bound.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Shatri, A., Weber, T.: Achieving the maximum sum rate using DC programming in cellular networks. IEEE Trans. Sig. Process 60(3), 1331–1341 (2012)
Cheng, Y., Pesavento, M.: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks. IEEE Trans. Sig. Process. 60(6), 2962–2973 (2012)
Dong, L., Han, Z., Petropulu, A., Poor, H.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Sig. Process 58(3), 1875–1888 (2010)
Ekrem, E., Ulukus, S.: Secrecy in cooperative relay broadcast channels. IEEE Trans. Inf. Theory 57(1), 137–155 (2011)
Fazeli-Dehkordy, S., ShahbazPanahi, S., Gazor, S.: Multiple peer-to-peer communications using a network of relays. IEEE Trans. Signal Process. 57(8), 3053–3062 (2009)
Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun. 7(6), 2180–2189 (2008)
Havary-Nassab, V., ShahbazPanahi, S., Grami, A.: Joint receive-transmit beamforming for multi-antenna relaying schemes. IEEE Trans. Signal Process. 58(9), 4966–4972 (2010)
He, X., Yener, A.: Cooperative jamming: the tale of friendly interference for secrecy. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 65–88. Spinger, Heidelberg (2010)
Hero, A.: Secure space-time communication. IEEE Trans. Inf. Theory 49(12), 3235–3249 (2003)
Jing, Y., Jafarkhani, H.: Network beamforming using relays with perfect channel information. IEEE Trans. Inf. Theory 55(6), 2499–2517 (2009)
Kha, H.H., Tuan, H.D., Nguyen, H.H.: Fast global optimal power allocation in wireless network by local DC programming. IEEE Trans. Wireless Commun. 11(2), 510–512 (2012)
Le Thi, H.A.: DC Programming and DCA. http://www.lita.univ-lorraine.fr/~lethi/
Le Thi, H.A., Nguyen, M.C., Pham Dinh, T.: A DC Programming Approach for Finding Communities in Networks. Neural Comput. 26(12), 2827–2854 (2014)
Le Thi, H.A., Nguyen, M.C., Pham Dinh, T.: Self-organizing maps by difference of convex functions optimization. Data Min. Knowl. Disc. 28, 1336–1365 (2014)
Le Thi, H.A., Pham Dinh, T.: The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann. Oper. Res. 133, 23–46 (2005)
Le Thi, H.A., Vo, X.T., Le, H.M.: DC approximation approaches for sparse optimization. Eur. J. Oper. Res. 244(1), 26–46 (2015)
Le Thi, H.A., Vo, X.T., Pham Dinh, T.: Feature selection for linear SVMs under uncertain data: Robust optimization based on difference of convex functions algorithms. Neural Netw. 59, 36–50 (2014)
Li, J., Petropulu, A., Weber, S.: On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Sig. Process 59(10), 4985–4997 (2011)
Munoz-Medina, O., Vidal, J., Agustin, A.: Linear transceiver design in nonregenerative relays with channel state information. IEEE Trans. Sig. Process. 55(6), 2593–2604 (2007)
Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, vol. 3, pp. 1906–1910, September 2005
Parada, P., Blahut, R.: Secrecy capacity of simo and slow fading channels. In: Proceedings of the International Symposium on Information Theory, ISIT 2005, pp. 2152–2155, September 2005
Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Mathematica Vietnamica 22(1), 289–357 (1997)
Pham Dinh, T., Le Thi, H.A.: Optimization algorithms for solving the trustregion subproblem. SIAM J. Optim. 8, 476–505 (1998)
Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Nguyen, N.-T., Le-Thi, H.A. (eds.) TCCI 2013. LNCS, vol. 8342, pp. 1–37. Springer, Heidelberg (2014)
Shafiee, S., Ulukus, S.: Achievable rates in gaussian miso channels with secrecy constraints. In: IEEE International Symposium on Information Theory, 2007, ISIT 2007, pp. 2466–2470, June 2007
ShahbazPanahi, S., Dong, M.: Achievable rate region under joint distributed beamforming and power allocation for two-way relay networks. IEEE Trans. Wireless Commun. 11(11), 4026–4037 (2012)
Stanojev, I., Yener, A.: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Inf. Forensics Secur. 12(1), 134–145 (2013)
Vucic, N., Schubert, M.: DC programming approach for resource allocation in wireless networks. In: IEEE, Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp. 380–386, May 2010
Wyner, A.D.: The wire-tap channel. Bell Sys. Tech. J. 54, 1355–1387 (1975)
Zhang, J., Gursoy, M.: Collaborative relay beamforming for secrecy. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–5, May 2010
Zhang, J., Gursoy, M.: Relay beamforming strategies for physical-layer security. In: 2010 44th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6, March 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thuy, T.T., Tuan, N.N., An, L.T.H., Gély, A. (2016). DC Programming and DCA for Enhancing Physical Layer Security via Relay Beamforming Strategies. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, TP. (eds) Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science(), vol 9622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49390-8_62
Download citation
DOI: https://doi.org/10.1007/978-3-662-49390-8_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49389-2
Online ISBN: 978-3-662-49390-8
eBook Packages: Computer ScienceComputer Science (R0)