Advanced Search
Volume 39 Issue 7
Jul.  2017
Turn off MathJax
Article Contents
HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152
Citation: HUANG Kaizhi, ZHANG Bo. Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks[J]. Journal of Electronics & Information Technology, 2017, 39(7): 1673-1680. doi: 10.11999/JEIT161152

Cooperative Secrecy Beamforming Scheme Resistant to Multi-eavesdroppers in Dense Heterogeneous Networks

doi: 10.11999/JEIT161152
Funds:

The Program for Science and Technology Development of Henan Province (152102210013), The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61171108, 61471396)

  • Received Date: 2016-10-27
  • Rev Recd Date: 2017-02-26
  • Publish Date: 2017-07-19
  • To guarantee the secrecy of downlink confidential information sent to marcocell user when there were multiple colluding eavesdroppers in dense heterogenous networks, a cooperative secrecy beamforming scheme resistant to multi-eavesdroppers is proposed in the paper. The transmission rate of confidential information is improved and eavesdroppers are jammed by jointly optimizing the beamforming vectors at macrocell base station and femtocell base stations. To obtain the optimal beamforming vectors, the problem of maximizing the secrecy rate is modeled under the limitations of quality of service and base station power. The secrecy rate maximization problem is non-convex. Due to the intractability, this problem is recast into a series of SemiDefinite Programs (SDP) using the SemiDefinite Relaxation (SDR) technique and the Lagrange duality. Simulation results validate the efficacy and the secrecy of the proposed scheme.
  • loading
  • HAIDER F, GAO X, YOU X H, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014.6736752.
    HU R Q and QIAN Y. An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems[J]. IEEE Communications Magazine, 2014, 52(5): 94-101. doi: 10.1109/MCOM.2014.6815898.
    SONG K, JI B, HUANG Y, et al. Performance analysis of antenna selection in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2015, 63(10): 2520-2532. doi: 10.1109/TSP.2015.2414904.
    宋康, 韦磊, 冀保峰, 等. 基于干扰消除的异构蜂窝网络中断分析[J]. 电子与信息学报, 2015, 38(2): 255-261. doi: 10.11999/JEIT150532.
    SONG Kang, WEI Lei, JI Baofeng, et al. Outage performance for heterogeneous cellular networks with interference cancellation[J]. Journal of Electronics Information Technology, 2015, 38(2): 255-261. doi: 10.11999/ JEIT150532.
    钟智豪, 罗文宇, 彭建华, 等. 多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J]. 中国科学: 信息科学, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    ZHONG Zhihao, LUO Wenyu, PENG Jianhua, et al. Secrecy performasnce analysis of cooperative transmisson and cooperative jamming in K-tier heterogeneous cellular networks[J]. Scientia Sinica Informations, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
    SAMDANIS K, TALEB T, and SCHMID S. Traffic? offload? enhancements for eUTRANn[J]. IEEE Communications Surveys Tutorials, 2012, 14(3): 884-896. doi: 10.1109/SURV. 2011.072711.00168.
    WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387. doi: 10.1002/j.1538- 7305. 1975.tb02040.x.
    GOEL S and NEGI R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, 2005, 3: 1501-1506. doi: 10.1109/ MILCOM.2005.1605889.
    PINTO P C, BARROS J, and WIN M Z. Secure communication in stochastic wireless networksPart II: Maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. doi: 10.1109/TIFS.2011. 2165947.
    PINTO P C, BARROS J, and WIN M Z. Wireless physical-layer security: The case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, 2009: 2442-2446. doi: 10.1109/ISIT.2009.5206050.
    雷维嘉, 左莉杰, 江雪, 等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579
    LEI Weijia, ZUO Lijie, JIANG Xue, et al. Physical layer security resistant to multi-eavesdroppers with inaccurate channel state information in relay network[J]. Journal of Electronics Information Technology, 2015, 37(9): 2191-2197. doi: 10.11999/JEIT141579.
    L? T, GAO H, CAO R, et al. Coordinated secure beamforming in K-User interference channel with multiple eavesdroppers[J]. IEEE Wireless Communication Letters, 2016, 5(2): 212-215. doi: 10.1109/LWC.2016.2519905.
    NGUYEN Van-Dinh, DUONG Trung Q, DUONG Octavia A, et al. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2609-2623. doi: 10.1109/TIFS.2016.2594131.
    LUO Z Q, MA W K, SO A C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. doi: 10.1109/MSP.2010. 936019.
    YANG S, LV T, and HANZO L. Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM[J]. IEEE Transactions on Vehicular Technology, 2013, 62(4): 1667-1677. doi: 10.1109/TVT.2012.2235190.
    CHARNES A and COOPER W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186.
    BOYD S and VANDENBERGHE L. Convex Optimization[M]. Cambridge, U.K.: Cambridge University Press, 2004: 121-180.
    张立健, 金梁, 罗文宇. 多用户MISO干扰信道中的安全协同波束成形[J]. 通信学报, 2015, 36(11): 41-51. doi: 10.11959/ j.issn.1000-436x.2015198.
    ZHANG Lijian, JIN Liang, and LUO Wen-yu. Secure coordinated beamforming for multiuser MISO interference channels[J]. Journal on Communications, 2015, 36(11): 41-51. doi: 10.11959/j.issn.1000-436x.2015198.
    L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
    LOPEZ-PEREZ D, GUVENC I, DELAROCHE G, et al. Enhanced intercell interference coordination challenges in heterogeneous networks[J]. IEEE Wireless Communications, 2011, 18(3): 22-30. doi: 10.1109/MWC.2011.5876497.
    SHIU Y S, CHANG S Y, WU H C, et al. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74. doi: 10.1109/MWC. 2011.5751298.
    FAKOORIAN S A A and SWINDLEHURS A L T. MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 640-649. doi: 10.1109/TIFS.2011.2156788.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1146) PDF downloads(249) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return