Advanced Search
Volume 37 Issue 9
Sep.  2015
Turn off MathJax
Article Contents
Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
Citation: Lei Wei-jia, Zuo Li-jie, Jiang Xue, Xie Xian-zhong. Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579

Physical Layer Security Scheme Resistant to Multi-eavesdroppers with Inaccurate Channel State Information in Relay Network

doi: 10.11999/JEIT141579
  • Received Date: 2014-12-10
  • Rev Recd Date: 2015-05-04
  • Publish Date: 2015-09-19
  • This paper investigates the relay transmission system in the presence of multiple collusion single-antenna eavesdroppers. A physical layer security scheme employing nullspace Artificial Noise (AN) and Amplify-and-Forward (AF) relay beamforming is designed. In the case that channel state information can not be accurately obtained, the weighted matrice of relay beamforming and the nullspace AN covariance are jointed optimized based on the Semi-Definite Programs (SDP), which can effectively reduce the amount of the information likely to be obtained by the multiple collusion eavesdroppers and significantly improve the security capacity of the system. It is an effective physical security transmission scheme with good robustness. Simulation results verify that the scheme has good performance.
  • loading
  • Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715.
    Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456.
    Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
    Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5.
    Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717.
    Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.
    Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506.
    Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networkspart II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147.
    Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446.
    Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343.
    Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56.
    Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487.
    Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162.
    Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655.
    Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34.
    Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9.
    Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1326) PDF downloads(477) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return