Advertisement

Distributed Secrecy Beamforming and Precoding in Multi-Antenna Wireless Relay Systems

  • Y.-W. Peter Hong
  • Pang-Chang Lan
  • C.-C. Jay Kuo
Chapter
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)

Abstract

This chapter describes the use of the secrecy beamforming and precoding techniques in multiantenna wireless relay systems. Here, the multiple antennas at the relays may provide additional spatial degrees of freedom that can be further utilized to enhance secrecy. However, the extra source-to-relay transmission and the trustworthiness of the relays, i.e., whether or not the relays may also eavesdrop on the message, pose additional challenges in guaranteeing secrecy in these systems. The use of jamming or artificial noise (AN) in these scenarios is also discussed.

Keywords

Relay Distributed antenna system Beamforming Precoding Artificial noise Jamming Secrecy.  

References

  1. 1.
    Gomez-Cuba F, Asorey-Cacheda R, Gonzalez-Castano F (2012) A survey on cooperative diversity for wireless networks. IEEE Commun Surveys Tuts 14(3):822–835Google Scholar
  2. 2.
    He X, Yener A (2010) Cooperation with an untrusted relay: a secrecy perspective. IEEE Trans Inf Theory 56(8):3807–3827MathSciNetCrossRefGoogle Scholar
  3. 3.
    Dong L, Han Z, Petropulu A, Poor H (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58(3):1875–1888MathSciNetCrossRefGoogle Scholar
  4. 4.
    Zhang J, Gursoy M (2010) Collaborative relay beamforming for secrecy. In: Proceedings of IEEE International Conference on Communications (ICC)Google Scholar
  5. 5.
    Horn RA, Johnson CR (1985) Matrix analysis. Cambridge Univerity Press, CambridgeGoogle Scholar
  6. 6.
    Solis FJ, Wets RJ-B (1981) Minimization by random search techniques. Math Oper Res 6:19–30MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Oohama Y (2001) Coding for relay channels with confidential messages. In: Proceedings of IEEE Information Theory, Workshop, 87–89Google Scholar
  8. 8.
    Jeong C, Kim I-M, Kim DI (2012) Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Trans Signal Process 60(1):310–325MathSciNetCrossRefGoogle Scholar
  9. 9.
    Maio AD, Huang Y, Palomar DP, Zhang S, Farina A (2011) Fractional QCQP with applications in ML steering direction estimation for radar detection. IEEE Trans Signal Process 59(1):172–185MathSciNetCrossRefGoogle Scholar
  10. 10.
    Rong Y, Gao F (2009) Optimal beamforming for non-regenerative MIMO relays with direct link. IEEE Commun Lett 13(12):926–928CrossRefGoogle Scholar
  11. 11.
    Ding Z, Peng M, Chen H-H (2012) A general relaying transmission protocol for MIMO secrecy communications. IEEE Trans Commun 60(11):3461–3471CrossRefGoogle Scholar
  12. 12.
    Huang J, Swindlehurst AL (2011) Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans Signal Process 59(10):4871–4884MathSciNetCrossRefGoogle Scholar
  13. 13.
    Fakoorian S, Swindlehurst A (2011) Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans Signal Process 59(10):5013–5022MathSciNetCrossRefGoogle Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Y.-W. Peter Hong
    • 1
  • Pang-Chang Lan
    • 2
  • C.-C. Jay Kuo
    • 3
  1. 1.Department of Electrical EngineeringNational Tsing Hua UniversityHsinchuTaiwan, R.O.C.
  2. 2.Department of Electrical EngineeringUniversity of Southern CaliforniaLos AngelesUSA
  3. 3.Department of Electrical EngineeringUniversity of Southern CaliforniaLos AngelesUSA

Personalised recommendations