吉林大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (5): 1658-1664.doi: 10.13229/j.cnki.jdxbgxb201505040

Previous Articles     Next Articles

Eavesdropping-resistant cooperative relay transmission scheme with partial channel state information

LEI Wei-jia, ZUO Li-jie, XIE Xian-zhong   

  1. Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and elecommunications, Chongqing 400065, China
  • Received:2014-03-12 Online:2015-09-01 Published:2015-09-01

Abstract: An Amplify-and-Forward (AF) relay beam-forming and cooperation jamming scheme is proposed in the circumstances that the eavesdropper's channel state information cannot be obtained and the direct link is present. The beam-forming weights of relays are optimized using convex optimization theory, and the results of the optimization are global and unique. Simulation results show that the proposed scheme can effectively prevent eavesdropping, reduce information leakage, and consequently enhance secure transmission rate.

Key words: communication technology, physical layer security, relay beam-forming, cooperation jamming, eavesdropping-resistant, artificial noise

CLC Number: 

  • TN925
[1] Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28: 656-715.
[2] Leung-Yan-Cheong S K, Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24: 451-456.
[3] Csiszár I, Körner J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24: 339-348.
[4] Chiurtu N, Rimoldi B, Telatar I E. On the capacity of multi-antenna Gaussian channels[C]∥IEEE International Symposium on Information Theory,Washington,2001.
[5] Sendonaris A, Erkip E, Aazhang B. User cooperation diversity part I: system description and part II: implementation aspects and performance analysis[J]. IEEE Transactions on Communication, 2003, 51(11): 1927-1948.
[6] Laneman J N, Tse D N C, Wornell G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080.
[7] Praveen K G, Lai L F, Gamal E L H. On the secrecy capacity of fading channels[J]. IEEE Transactions on Information Theory, 2008, 54(10): 4687-4698.
[8] Li J Y, Petropulu A P, Weber S. On cooperative relaying schemes for wireless physical layer security[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4985-4997.
[9] Lun D, Zhu H, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.
[10] Ye Y, Li Q, Wing-Kin M, et al. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
[11] Zhang J W, Gursoy M C. Collaborative relay beamforming for secrecy[C]∥Preceding of IEEE International Conference on Communications, 2010.
[12] Huang J, Swindlehurst A L. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
[13] Wang H M, Yin Q Y, Xia X G. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.
[14] Liang Y B, Gerhard K, Vincent H, et al. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2007.
[15] Boyd S, Vandenberghe L. Convex Optimization[M]. Cambridge, UK: Cambridge University Press, 2004.
[16] Sturm J F. Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones[J]. Optimization Methods and Software, 1999, 11(1-4): 625-653.
[1] ZHOU Yan-guo,ZHANG Hai-lin,CHEN Rui-rui,ZHOU Tao. Two-level game approach based resource allocation scheme in cooperative networks [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1879-1886.
[2] SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[3] DONG Ying, CUI Meng-yao, WU Hao, WANG Yu-hou. Clustering wireless rechargeable sensor networks charging schedule based on energy prediction [J]. 吉林大学学报(工学版), 2018, 48(4): 1265-1273.
[4] MOU Zong-lei, SONG Ping, ZHAI Ya-yu, CHEN Xiao-xiao. High accuracy measurement method for synchronous triggering pulse transmission delay in distributed test system [J]. 吉林大学学报(工学版), 2018, 48(4): 1274-1281.
[5] DING Ning, CHANG Yu-chun, ZHAO Jian-bo, WANG Chao, YANG Xiao-tian. High-speed CMOS image sensor data acquisition system based on USB 3.0 [J]. 吉林大学学报(工学版), 2018, 48(4): 1298-1304.
[6] CHEN Rui-rui, ZHANG Hai-lin. Performance analysis of 3D millimeter wave communications [J]. 吉林大学学报(工学版), 2018, 48(2): 605-609.
[7] ZHANG Chao-yi, LI Jin-hai, YAN Yue-peng. Improved Tong detection algorithm with double thresholds [J]. 吉林大学学报(工学版), 2018, 48(2): 610-617.
[8] GUAN Ji-shi, SHI Yao-wu, QIU Jian-wen, SHAN Ze-biao, SHI Hong-wei. New algorithm to estimate characteristic exponent of α-stable distribution [J]. 吉林大学学报(工学版), 2018, 48(2): 618-624.
[9] LI Wei, LI Ya-jie. Satisfactory integrated design between failure accommodation and communication for non-uniform transmission networked control system under discrete event-triggered communication scheme [J]. 吉林大学学报(工学版), 2018, 48(1): 245-258.
[10] SUN Xiao-ying, WANG Zhen, YANG Jin-peng, HU Ze-zheng, CHEN Jian. Electromagnetic susceptibility assessment of electronic throttle based on Bayesian network [J]. 吉林大学学报(工学版), 2018, 48(1): 281-289.
[11] WU Wei, WANG Shi-gang, ZHAO Yan, WEI Jian, ZHONG Cheng. Hexagonal elemental image array generation [J]. 吉林大学学报(工学版), 2018, 48(1): 290-294.
[12] YUAN Jian-guo, ZHANG Xi-ruo, QIU Piao-yu, WANG Yong, PANG Yu, LIN Jin-zhao. Non-iterative phase noise suppression algorithm utilizing cyclic prefix in OFDM systems [J]. 吉林大学学报(工学版), 2018, 48(1): 295-300.
[13] WANG Jin-peng, CAO Fan, HE Xiao-yang, ZOU Nian-yu. Multi carrier system joint receiving method based on MAI and ICI [J]. 吉林大学学报(工学版), 2018, 48(1): 301-305.
[14] SHI Wen-xiao, SUN Hao-ran, WANG Shao-bo. Joint channel allocation and routing algorithm in wireless mesh network [J]. 吉林大学学报(工学版), 2017, 47(6): 1918-1925.
[15] JIANG Lai-wei, SHA Xue-jun, WU Xuan-li, ZHANG Nai-tong. Novel joint user association and resource allocation method in LTE-A HetNets [J]. 吉林大学学报(工学版), 2017, 47(6): 1926-1932.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!