Next Article in Journal
On the Limiting Behaviour of the Fundamental Geodesics of Information Geometry
Next Article in Special Issue
Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit
Previous Article in Journal
Evaluating the Irregularity of Natural Languages
Previous Article in Special Issue
An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Communication for Two-Way Relay Networks with Imperfect CSI

School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Current address: No. 10, Xi Tu Cheng Road, Haidian District, Beijing 100876, China.
Entropy 2017, 19(10), 522; https://doi.org/10.3390/e19100522
Submission received: 30 July 2017 / Revised: 24 September 2017 / Accepted: 26 September 2017 / Published: 29 September 2017
(This article belongs to the Special Issue Information-Theoretic Security)

Abstract

:
This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rate of the eavesdropper to be upper-bounded. Due to the imperfect CSI, a robust optimization problem is summarized. A novel iterative algorithm is proposed, where the line search technique is applied, and the feasibility is preserved during iterations. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are optimally solved. The optimality property of the robust optimization problem is analyzed. Simulation results show that the proposed algorithm performs very close to the non-robust model with perfect CSI, in terms of the obtained relay transmit power; it achieves higher secrecy rate compared to the existing work. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally.

1. Introduction

Due to the openness and the broadcast property of wireless communication, network security becomes a challenging issue. The physical layer security technique becomes appealing, because it guarantees the information being only accessed by the legitimate users rather than eavesdroppers. It makes use of the physical characteristics of wireless channels and is free of a security key, so that the information is transmitted securely in the sense that it can be decoded by legitimate users, but not eavesdroppers.
Physical layer security is widely studied from both the information theory aspect and the signal processing aspect for wiretap channels, like broadcast wiretap channels and Multiple-Input-Multiple-Output (MIMO) wiretap channels. The secure communication is managed through multiple-antenna system [1,2,3,4,5,6,7,8,9] or node cooperation [10,11]. Research works on node cooperation are well explored. It is suitable for low-complexity networks, which cannot afford multiple antennas. Cooperative relay networks with Amplify-and-Forward (AF) [12,13,14,15] or Decode-and-Forward (DF) [16,17] protocols are mostly investigated. For one-way relay networks, the authors in [18,19] design the relay beamforming weights to maximize the secrecy rate and to minimize the relay transmit power; the secrecy outage probability is analyzed for both half-duplex [20] and full-duplex relay networks [21]; in [22], the optimal relay selection schemes are considered, for both AF and DF protocols; the secure energy efficiency maximization model is proposed in [23]; the asymptotic secrecy performance for the large-scale MIMO relaying scenario is analyzed in [24], which concludes that the AF protocol is a better choice compared to DF under large transmit powers. Compared to one-way relay, two-way relay networks are more efficient for communications between user pairs. In [25], the minimum per-user secrecy rate is maximized, and the source power allocation is analyzed, where the relay beamforming vector lies in the nullspace of the equivalent channel of the relay link from user nodes to the eavesdropper.
All the aforementioned references suppose that the CSI from users and from relays to eavesdroppers are perfectly known. In fact, it is very difficult to obtain the perfect CSI of the eavesdroppers. Assuming that no CSI of eavesdroppers is known, artificial noise is introduced in the literature, and enhances security: Wang et al. proposes a cooperative artificial noise transmission-based secrecy strategy and summarizes the relay beamforming design and power allocation problems as second order cone programming and linear programming problems [14], respectively; Salem et al. sends the artificial noise in the nullspace of the legitimate channel and compares the cases in which that all relays are working and that only the best relay is used [15]. In [26], no CSI of eavesdroppers and imperfect CSI between users and jammers are assumed, and the secrecy performance is analyzed for the Cooperative Jamming (CJ) technique. Networks with imperfect CSI are often considered, as well. The multi-user downlink channel is considered in [27], where the lower bound of the sum secrecy rate is maximized, and semi-definite relaxation and first order Tailor extension techniques are applied. In [28], a multiple-antenna AF relay network with partial CSI and a bounded error region is considered, which maximizes the worst case secrecy rate, where a rank two relay beamformer is constructed via singular value decomposition. The secure communication switches between the DF relay protocol and the CJ technique in [29], and the authors provide robust designs for the secrecy rate maximization and secrecy outage probability minimization problems. In [30], both the source and the relay have multiple antennas, where they jointly design source and relay beamforming matrices, to minimize the relay power with Quality of Service (QoS) constraints. The worst case SNR at the eavesdropper is considered, which is approximated by its upper bound. For a two-way relay network with two users and one eavesdropper, Wang et al. assumes no CSI of the eavesdropper is available [31]. The artificial noise technique is applied, and the relay transmit power for signals is minimized, while the QoS of two users are guaranteed. A second order cone programming problem is formed and solved by the interior point method.
In this paper, we consider the same communication model as [31]. Differently, we assume that there is imperfect CSI from users and relays to the eavesdropper. By designing the relay beamforming weights, we build up the model to minimize the relay transmit power, while the QoS of the legitimate users are guaranteed, and the worst case achievable rate of the eavesdropper is upper bounded. Compared to [31], the proposed model makes use of the imperfect CSI, and guarantees that the achievable rate of the eavesdropper is very low. Compared to the optimization model in [31], the proposed model has an extra robust constraint for the eavesdropper, which leads to a much more difficult robust optimization problem [32]. Usually, such problem is NP-hard. There is a lack of an efficient method to solve this kind of problem. We propose an efficient iterative algorithm to solve the problem with the line search technique. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are solved optimally; the iterative points always remain feasible. The optimality conditions of the robust optimization problem are also analyzed. Simulation results show that compared to [31], our algorithm achieves a higher secrecy rate; the proposed algorithm is efficient and converges very quickly; numerically, more than 85% of the problems are solved optimally. The main contributions of our paper are listed as follows:
  • A new model to design the relay beamforming weights is proposed with the assumption of imperfect CSI and summarized as a robust optimization problem.
  • A novel algorithm is proposed, where the line search technique is applied. A sequence of QCQP subproblems and one-dimensional subproblems is solved optimally. The feasibility is preserved during iterations. Simulation results verify the efficiency of the proposed algorithm.
  • The optimality properties of the robust optimization problem are analyzed. Numerically, most problems are solved optimally.
The rest of the paper is organized as follows. The system model of the two-way relay network with one eavesdropper is shown in Section 2. In Section 3, the corresponding optimization problem is summarized, and a novel algorithm is proposed. Simulation results are shown in Section 4. The conclusion is summarized in Section 5.
Notations: Uppercase and lowercase bold-faced letters denote matrices and column vectors, respectively. R and C represent the real and complex domain, respectively. ( · ) H , ( · ) T and ( · ) * represent the Hermitian, transpose and conjugate of a matrix, respectively. | · | represents the absolute value. By default, · is the two-norm of a vector. · F is the Frobenius norm of a matrix. E ( · ) is the mathematical expectation of a random variable. Tr ( · ) represents the trace of a matrix. Re ( · ) means the real part of a scaler, a vector or a matrix. λ max ( · ) represents the largest eigenvalue of a Hermitian matrix. Diag ( a ) is the diagonal matrix with diagonal entries as the elements of vector a ; Diag ( A ) is the diagonal matrix with the same diagonal entries as matrix A . x N ( μ , σ 2 ) represents that the random variable x obeys a Gaussian distribution with the mean as μ and variance as σ 2 .

2. System Model

We consider a half-duplex wireless communication system where two legitimate users Alice ( U 1 ) and Bob ( U 2 ) exchange messages with N relay nodes R n , n = 1 , 2 , , N , in the presence of an eavesdropper Eve, who eavesdrops signals from the two users and relays passively, as illustrated in Figure 1. Suppose each user, each relay and Eve have a single antenna. The AF relay protocol is applied.
We assume that the perfect CSI between two users and relays is known, as h j C N × 1 , j = 1 , 2 . However, due to limited feedback, it is difficult to obtain perfect CSI of Eve. Thus we assume the imperfect CSI for the channels from users and relays to the eavesdropper, and the norm-bounded error channel estimation is considered. The CSI between the users and the eavesdropper, f j C , and that between relays and the eavesdropper, c C N × 1 , are assumed to be imperfect and are estimated with bounded errors:
f j = f j 0 + Δ f j , | Δ f j | ε j , j = 1 , 2 ;
c = c 0 + Δ c , Δ c ε .
Here, f j 0 and c 0 are the estimations, which are achievable; Δ f j and Δ c are the bounded errors, j = 1 , 2 . Such assumptions are practical in scenarios where some users and relays are turned into eavesdroppers and their CSI have already been partially estimated.
In the first phase, Alice and Bob transmit P j s j , j = 1 , 2 to all relays, respectively, where P j is the fixed transmit power and s j C is the information symbol with E ( | s j | 2 ) = 1 . Then, relays receive:
y R = j = 1 2 P j h j s j + n R ,
where n R C N × 1 is the noise at relays with zero mean and covariance matrix as σ R 2 I N .
In the second phase, the n-th relay multiples its received signal by its beamforming weight w n and then broadcasts the signal to both users. Thus, the vector transmitted by relays is represented as x R = W H y R , where W = Diag ( w ) and w = ( w 1 , w 2 , , w N ) T . Alice receives:
y 1 = h 1 T x R + z 1 = h 1 T W H h 1 P 1 s 1 self-canceled   signal + h 1 T W H h 2 P 2 s 2 desired signal + h 1 T W H n R + z 1 noise ,
where z 1 N ( 0 , σ 1 2 ) is the local noise. It consists of the self-canceled signal, which is perfectly known by Alice and is canceled locally, the desired signal from Bob and the noise. The received signal at Bob has a similar expression.
Since the two source nodes subtract their self-canceled terms, the SNRs achieved at Alice and Bob can be respectively expressed as:
SNR 1 = P 2 | h 1 T W H h 2 | 2 σ R 2 h 1 T W H 2 + σ 1 2 = P 2 | w H H 1 h 2 | 2 σ R 2 w H H 1 2 + σ 1 2 ,
SNR 2 = P 1 | h 2 T W H h 1 | 2 σ R 2 h 2 T W H 2 + σ 2 2 = P 1 | w H H 2 h 1 | 2 σ R 2 w H H 2 2 + σ 2 2 ,
where H j = Diag ( h j ) , j = 1 , 2 .
In both phases, Eve listens to the users and relays and receives signals as:
y E 1 = j = 1 2 P j f j s j + n E 1 , y E 2 = c T W H y R + n E 2 = c T W H j = 1 2 P j h j s j + ( c T W H n R + n E 2 ) ,
where n E 1 N ( 0 , σ E 1 2 ) and n E 2 N ( 0 , σ E 2 2 ) are the noise at Eve in the two phases, respectively. Suppose Eve is intelligent and tries to decode signals by combining the information received in both phases, which is expressed as:
y E = H E s + n E ,
where:
H E = ( P 1 f 1 P 2 f 2 P 1 w H C h 1 P 2 w H C h 2 ) , s = ( s 1 s 2 ) , n E = ( n E 1 w H C n R + n E 2 ) ,   and   C = Diag ( c )
Suppose all the transmit signals and all the noises are independent of each other. The achievable rate of Eve is denoted as:
R E = 1 2 log 2 | I 2 + K E - 1 H E H E H | = 1 2 log 2 ( 1 + R 0 ) .
Here, K E = Diag ( σ E 1 2 , σ E 2 2 + σ R 2 w H C C H w ) , and:
R 0 ( Δ c , Δ f 1 , Δ f 2 ; w ) = j = 1 2 P j | f j | 2 σ E 1 2 + j = 1 2 P j | w H C h j | 2 σ E 2 2 + σ R 2 w H C C H w + P 1 P 2 | f 1 w H C h 2 - f 2 w H C h 1 | 2 σ E 1 2 ( σ E 2 2 + σ R 2 w H C C H w ) .
The detailed deduction is shown in Appendix A. The definitions of C and f j , j = 1 , 2 are shown in (5) and (1).
We want to design the relay beamforming vector w , to minimize the total relay transmit power, while requiring the SNRs of two legitimate users to be guaranteed and the achievable rate of Eve to be upper-bounded. Due to the imperfect CSI of Eve, the worst case achievable rate is considered. The model is summarized as follows:
min w C N × 1 P R ( w )                 
s . t . SNR j ( w ) γ j , j = 1 , 2 ; R E ( Δ c , Δ f 1 , Δ f 2 ; w ) = 1 2 log 2 ( 1 + R 0 ) r E ,
  for   all   Δ c 2 ε , | Δ f j | ε j , j = 1 , 2 .
where the relay transmit power is:
P R = E ( x R H x R ) = Tr ( E ( ( W H y R ) ( W H y R ) H ) ) = P 1 w H H 1 H 1 H w + P 2 w H H 2 H 2 H w + σ R 2 w H w ,
and γ 1 , γ 2 , r E are the given thresholds. Here the achievable rate of Eve is required to be below the given threshold under any variation of channel coefficients. Due to the constraint (7c), we can guarantee that the achievable rate of Eve is very low. Because of this constraint, problem (7) is a robust optimization problem. It is equivalent to a QCQP problem with infinite constraints, which is usually NP-hard. In the following section, the problem is solved by a novel algorithm.
Remark 1.
The model with perfect CSI and that with no CSI [31] are two extreme cases of the model (7). If we let ε = ε 1 = ε 2 = 0 , then the model degenerates to that with perfect CSI; if the parameters ε and ε j , j = 1 , 2 and r E go to infinity, then it becomes the model with no CSI.

3. Robust Optimization Model

In this section, we first approximate Problem (7) by a new robust optimization problem, where there are less parameters with uncertainty. Then, we propose a novel efficient algorithm to solve the approximated problem.

3.1. Robust Model Formulation

In Problem (7), there are several parameters with uncertainty, which are coupled together and thus make the problem intractable. We tighten the constraint (7c) by replacing R 0 with its upper bound R 1 , where a 0 = P 1 P 2 j = 1 2 ( | f j 0 | + ε j ) 2 σ E 1 2 ,
R 2 ( Δ c ; w ) = j = 1 2 ( P j + a 0 ) | w H C h j | 2 σ E 2 2 + σ R 2 w H C C H w and R 1 ( Δ c ; w ) = j = 1 2 P j ( | f j 0 | + ε j ) 2 σ E 1 2 + R 2 .
It holds that:
R 0 ( Δ c , Δ f 1 , Δ f 2 ; w ) R 1 ( Δ c ; w ) ,
for any | Δ f j | ε j , j = 1 , 2 . The detailed deduction is shown in Appendix B. Problem (7) is tightened as the following robust optimization problem:
min w C N × 1 P R ( w )         
s . t . SNR j ( w ) γ j , j = 1 , 2 ;
      R 2 ( Δ c ; w ) γ E ,   for   all   Δ c 2 ε ,
Here, γ E = 2 2 r E - 1 - j = 1 2 P j ( | f j 0 | + ε j ) 2 σ E 1 2 , and in Constraint (9c), R 2 γ E is the equivalent form as 1 2 log 2 ( 1 + R 1 ) r E . The parameters Δ f j , j = 1 , 2 in Problem (7) have been eliminated. Accordingly, any feasible point of Problem (9) is a feasible point of Problem (7).
In the rest of this section, we focus on solving the tightened Problem (9).

3.2. Algorithm Preserving Feasibility

As a robust optimization problem, Problem (9) is still difficult to solve and generally NP-hard. Usually, robust optimization problems are approximated, and the parameters with uncertainty are eliminated. Then, the classical optimization technique is used, and the approximated problem is solved directly. However, sometimes, the approximated problem is not a “good” approximation. It may cut off parts of the feasible region of the original problem and consequently lose the optimality property or even feasibility. To avoid these disadvantages, we propose an efficient iterative algorithm to solve Problem (9). In each iteration, the iterative point is updated by the line search technique, and it is always a feasible point of Problem (9). The optimality properties of Problem (9) are analyzed, as well.

3.2.1. Initialization

First, we initialize the algorithm by solving the following subproblem:
min w C N × 1 P R ( w )               
s . t . SNR j ( w ) ( 1 + β δ ) γ j , j = 1 , 2 ;
R 3 ( w ) ( 1 - β δ ) γ E .      
Here, R 3 ( w ) = 1 σ E 2 2 [ w H C 0 Q C 0 H w + 2 ε c 0 2 Q F w 2 2 + ε 2 w H Diag ( Q 0 ) w ] . C 0 = Diag ( c 0 ) , Δ C = Diag ( Δ c ) , Q 0 = j = 1 2 ( P j + a 0 ) h j h j H and Q = Q 0 - σ R 2 γ E I N ; 0 < β < 1 is a scalar, and δ 1 is a positive integer. β and δ are two parameters to keep the initial point as an interior point of Problem (9).
By transformation, Equation (10) is equivalent to the following QCQP subproblem.
min w C N × 1 w H A 0 w s . t . w H A j w a j , j = 1 , 2 , 3 ,
where A 0 = P 1 H 1 H 1 H + P 2 H 2 H 2 H + σ R 2 I N , A 1 = H 1 [ ( 1 + β δ ) γ 1 σ R 2 I N - P 2 h 2 h 2 H ] H 1 H , A 2 = H 2 [ ( 1 + β δ ) γ 2 σ R 2 I N - P 1 h 1 h 1 H ] H 2 H , A 3 = C 0 Q C 0 H + 2 ε c 0 2 Q F I N + ε 2 Diag ( Q 0 ) , a 3 = σ E 2 2 ( 1 - β δ ) γ E , a j = - σ j 2 ( 1 + β δ ) γ j and H j are defined below (3), j = 1 , 2 . Since Subproblem (11) only has three constraints, it is solved optimally by the Semi-Definite Relaxation (SDR) method [33,34].
Here, the constraints in Problem (9) are tightened as (10b) and (10c). The following lemma shows that solving (10) provides an initial feasible point of Problem (9).
Lemma 1.
The optimal solution of subproblem (10), w 0 , is an interior point of problem (9).
The proof is shown in Appendix C. w 0 is a strictly feasible rather than a feasible point of Problem (9), thanks to the control parameters β and δ in Subproblem (10).

3.2.2. Iterations Applying the Line Search Technique

In the k-th iteration, suppose the iterative point w k is an interior point of Problem (9) satisfying:
SNR j ( w ) ( 1 + β δ ) γ j , j = 1 , 2 ;
R 2 ( Δ c ; w ) ( 1 - β δ ) γ E ,   for   all   Δ c 2 ε .
We will update w k using the line search technique [35] and preserve its feasibility according to Problem (9).
First, we solve two QCQP subproblems to obtain the search direction. The following subproblem is formulated:
max Δ c R 2 ( Δ c ; w k ) s . t . Δ c ε .
It is equivalent to the subproblem below:
min Δ c , r σ E 2 2 + σ R 2 ( c 0 + Δ c ) T W k H W k ( c 0 + Δ c ) * r 2 s . t . j = 1 2 ( P j + a 0 ) | ( c 0 + Δ c ) T W k H h j | 2 = r 2 , Δ c ε ,
where W k = Diag ( w k ) . Let x = ( ( c 0 + Δ c ) H , 1 ) T / r , and it is further transformed into the following QCQP subproblem:
min x C N + 1 x H B 0 x s . t . x H B 1 x = 1 , x H B 2 x 0 .
Here:
B 0 = [ σ R 2 W k H W k 0 N × 1 0 1 × N σ E 2 2 ] , B 1 = [ j = 1 2 ( P j + a 0 ) W k H h j h j H W k 0 N × 1 0 1 × N 0 ] , B 2 = [ I N - c 0 * - c 0 T - c 0 2 2 - ε 2 ] .
It is solved optimally by the SDR method. Let Δ c k be the optimal solution of (13). Then, R 2 ( Δ c k ; w k ) ( 1 - β δ ) γ E , as w k satisfies (12b).
Taking Δ c k into Problem (9) and introducing the parameters β and δ , we obtain the subproblem below:
min w C N × 1 P R ( w ) s . t . SNR j ( w ) ( 1 + β δ ) γ j , j = 1 , 2 ; R 2 ( Δ c k ; w ) ( 1 - β δ ) γ E .
It is equivalent to the QCQP subproblem with three constraints:
min w C N × 1 w H A 0 w s . t . w H A j w a j , j = 1 , 2 ; w H C k Q C k H w a 3 ,
where C k = Diag ( c k ) and c k = c 0 + Δ c k . A 0 , a 3 , A j and a j , j = 1 , 2 are defined below (11). It is solved optimally by the SDR method. Let w ˜ k + 1 be the optimal solution of Subproblem (15). Apparently w ˜ k + 1 satisfies (12a), but it may not satisfy (12b). Thus, we search along the line ( w ˜ k + 1 - w k ) to find a new iterative point w k + 1 , which satisfies (12).
Next, we solve a one-dimensional subproblem to obtain the stepsize. Denote t as the stepsize. We calculate the stepsize t, so that the new iterative point w k + 1 ( t ) : = w k + t ( w ˜ k + 1 - w k ) satisfies (12) and improves the objective function value of (9). The corresponding subproblem to obtain the stepsize is as follows:
min t R P R ( w k + 1 ( t ) )             
s . t . SNR j ( w k + 1 ( t ) ) ( 1 + β δ ) γ j , j = 1 , 2 ;
g k ( t ) = m 1 t 2 + m 2 t + m 3 | t | + m 4 0 ,
For simplicity, we let v 0 and v 1 represent w k and w ˜ k + 1 , respectively. Denote V i = Diag ( v i ) , for i = 0 , 1 . Then, the parameters are defined as:
m 1 = c 0 T ( V 1 - V 0 ) H Q ( V 1 - V 0 ) c 0 * + 2 ε ( V 1 - V 0 ) H Q ( V 1 - V 0 ) c 0 * + ε 2 λ max [ ( V 1 - V 0 ) H Q ( V 1 - V 0 ) ] , m 2 = 2 Re [ c 0 T V 0 H Q ( V 1 - V 0 ) c 0 * ] , m 3 = 2 ε [ V 0 H Q ( V 1 - V 0 ) c 0 * + ( V 1 - V 0 ) H Q V 0 c 0 * ] + ε 2 λ max [ V 0 H Q ( V 1 - V 0 ) + ( V 1 - V 0 ) H Q V 0 ] , m 4 = c 0 T V 0 H Q V 0 c 0 * + 2 ε V 0 H Q V 0 c 0 * + ε 2 λ max ( V 0 H Q V 0 ) - ( 1 - β δ ) σ E 2 2 γ E .
Theorem 1.
For any t satisfying Constraints (16b) and (16c), w k + 1 ( t ) satisfies (12). Let t k be the optimal stepsize obtained from Subproblem (16), then the iterative point is updated as w k + 1 : = w k + 1 ( t k ) . By such an update strategy, w k + 1 is a feasible point of Problem (9), and the objective function of (9) decreases monotonically in each iteration.
The detailed proof is shown in Appendix D. As a one-dimensional QCQP problem, Subproblem (16) is solved optimally by the analysis of line segment intersections, which is omitted due to the limited space. We might encounter the situation that t k = 0 , where the iterative point gets stuck at some point. In this case, we increase the parameter δ in Subproblem (16), hoping that the iterations continue, and the objective function is further improved.

3.2.3. Algorithm Framework and Optimality Analysis

The complete algorithm framework is described in Algorithm 1 on the next page.
Algorithm 1: Robust optimization algorithm
Entropy 19 00522 i001
In Algorithm 1, since the iterative points are all feasible for Problem (9) and the objective function decreases monotonically, the objective function value converges eventually. The obtained solution of Algorithm 1 is at least a feasible point of Problem (9) and, thus, is a feasible point of Problem (7). The following theorem shows the optimality property of Problem (9), whose proof is given in Appendix E.
Theorem 2.
If δ goes to infinity and w ˜ k + 1 = w k , then w k is the optimal solution of Problem (9).
Further numerical analysis for the optimality property is shown in Section 4.

4. Simulations

In this section, the performance of the proposed algorithm is evaluated. Each element of the channel coefficients between each user and relays h j , j = 1 , 2 is randomly generated according to the complex Gaussian distribution CN ( 0 , 1 ) . The channel coefficients from users to Eve f j 0 , j = 1 , 2 , obey CN ( 0 , 0 . 01 ) . The channel coefficient from each relay to Eve is randomly generated according to CN ( 0 , σ c 2 ) , where different values of σ c 2 represent different distances between relays and Eve. The CSI estimated error bound from relays to Eve is ε = 0 . 1 , and that from each user to Eve is ε j = 0 . 01 , j = 1 , 2 . Let all the local noise covariance be the same: σ j = σ E 1 = σ E 2 = 1 . Let the SNR thresholds for both legitimate users be the same: γ j = γ , j = 1 , 2 . In the proposed algorithm, the stopping parameter η and the initial value of the parameter δ are set as 10 - 4 and one, respectively; if there is no specific explanation, the stopping parameter δ 0 and the parameter β are set as 15 and 0 . 1 , respectively. In the proposed algorithm, parameters β and δ are used to keep the iterative points as the interior points of Problem (9). For each plotted point, 1000 realizations are generated, and the average result is shown. Each QCQP subproblem with dimension higher than one is solved by the SDR method, which is implemented based on the software CVX (Version 2.0) [36].
First we compare our proposed algorithm and the non-robust model with perfect CSI. The non-robust model is problem (7) with given Δ c , Δ f j , for j = 1 , 2 , which is a QCQP problem and solved optimally by the SDR method. In Figure 2, the relay transmit power obtained by both algorithms are depicted, with respect to different relay numbers and different SNR thresholds γ . It indicates that the performance of the proposed algorithm is very close to the non-robust model, which verifies the efficiency of the proposed algorithm. Our proposed model works better to balance the performance and the feedback overhead, because the perfect CSI requires more feedback. It is observed that relays use less total power when more relays are involved in the transmission process. This illustrates the effectiveness of node cooperation. Also, more relay transmit power is used when γ increases.
Second, we compare our proposed algorithm with the model in [31] (Section V), where both algorithms are designed for the same communication model. In [31], no CSI of Eve is assumed, and the artificial noise technique is applied. Assuming that the total relay power is fixed, the model in [31] is to minimize the relay transmit power for signals and let relays use the rest of the power to send the artificial noise. The corresponding optimization problem is just Problem (7) without Constraint (7c):
min w C N × 1 P R ( w ) s . t . ( 7 b ) .
Let P a and P b be the relay power for signals obtained by our proposed algorithm solving (7) and by the method in [31] solving (17), respectively. Apparently, P a P b . In the comparison, for fairness, we suppose that both algorithms use the same total relay transmit power P a : the proposed algorithm uses all the power to transmit signals; Wang et al. uses power P b to transmit signals and power P a - P b to transmit the artificial noise [31]. This is illustrated in Table 1.
In this case, the achievable rate of Eve by [31] is calculated as:
1 2 log 2 | I 2 + K ˜ E - 1 H E H E H | ,
where K ˜ E = Diag ( σ E 1 2 , σ E 2 2 + σ R 2 w H C C H w + ( P a - P b ) c 2 ) and H E is defined below (6). Based on the above assumptions, we plot the achieved secrecy rate S R = j = 1 2 1 2 log 2 ( 1 + SNR j ) - R E by the two algorithms with respect to different relay numbers and different r E in Figure 3. The parameter r E is the upper bound of the achievable rate of Eve in Algorithm 1. It does not appear in the model of [31], but affects its achieved secrecy rate through P a . We observe that the achieved secrecy rate by the proposed algorithm is higher than that of [31], and the difference becomes larger with the increment of relay numbers. This shows the beneficial effect of using CSI.
Third, we test the sensitivity of the proposed algorithm according to parameters β and δ 0 . The two parameters are used to keep the iterative points as the interior point of Problem (9) and control the accuracy of the achieved solution. Figure 4 shows the results by the proposed algorithm with three groups of parameters: β = 0.1, δ 0 = 15; β = 0.1, δ 0 = 20; β = 0.01, δ 0 = 15. The three curves representing the three groups are close to each other, which implies that the algorithm is not sensitive to the parameters.
Fourth, the achieved relay transmit power with respect to the iterations is plotted in Figure 5. From top to bottom are the curves representing the relay number N = 4, 8 and 12. The three convergence curves show similar trends, regardless of N. Figure 5 shows that the objective function reduces rapidly in the first three iterations and converges in about five iterations. The observation coincides with the conclusion in Theorem 1 that the objective function value decreases monotonically. It also provides numerical evidence that our proposed algorithm converges very quickly.
Fifth, we analyze the optimality of the achieved solutions by our proposed algorithm. In the algorithm framework, there are two stopping criteria. The first criterion is that δ δ 0 , and w k and w ˜ k + 1 are sufficiently close to each other. According to Theorem 2, the iterative point satisfying this criterion is roughly the optimal solution of Problem (9). The second stopping criterion is simply that δ δ 0 . It only guarantees feasibility rather than optimality. In Table 2, we list the number of realizations out of the 1000 that exit the algorithm by satisfying the first stopping criterion, with respect to different relay numbers. It indicates that more than 85% of the realizations obtain the optimal solution of Problem (9). This shows that our proposed algorithm is efficient to solve the problem.
From the above simulation results, we can see that our proposed algorithm is efficient and converges very quickly.

5. Conclusions

In this paper, we consider the two-way relay wiretap channel, with two users, N relays and one eavesdropper. The CSI from users and from relays to Eve is estimated with bounded error. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the users’ SNRs to be higher than the given thresholds and guaranteeing Eve’s worst case rate to be upper bounded. For the robust optimization problem, we propose an algorithm to solve it iteratively and preserve feasibility during iterations. In each iteration, the line search technique is applied. We update the search direction and the stepsize by optimally solving two QCQP subproblems and a one-dimensional subproblem, respectively. The optimality property of the robust optimization problem is analyzed, as well. Simulations show that our proposed algorithm obtains very close relay transmit power to the non-robust model; compared to [31], the proposed algorithm achieves higher secrecy rate. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally.

Acknowledgments

This work is partly supported by the the National Natural Science Foundation of China (NSFC) 11771056, 11471052, 11401039, 91630202 and 11331012.

Author Contributions

Wenbao Ai and Cong Sun conceived of and designed the model and the algorithm. Ke Liu and Dahu Zheng performed the experiments. Cong Sun and Ke Liu analyzed the data. Cong Sun wrote the paper. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analysis or interpretation of data; in the writing of the manuscript; nor in the decision to publish the results.

Appendix A. Deduction of (6)

R E = 1 2 log 2 | I 2 + K E - 1 H E H E H | = 1 2 log 2 ( 1 + j = 1 2 P j | f j | 2 σ E 1 2 ) ( 1 + j = 1 2 P j | w H C h j | 2 σ E 2 2 + σ R 2 w H C C H w ) - | j = 1 2 P j f j h j H C H w | 2 σ E 1 2 ( σ E 2 2 + σ R 2 w H C C H w ) = 1 2 log 2 { 1 + j = 1 2 P j | f j | 2 σ E 1 2 + j = 1 2 P j | w H C h j | 2 σ E 2 2 + σ R 2 w H C C H w + ( P 1 | f 1 | 2 + P 2 | f 2 | 2 ) ( P 1 | w H C h 1 | 2 + P 2 | w H C h 2 | 2 ) σ E 1 2 ( σ E 2 2 + σ R 2 w H C C H w ) - | P 1 f 1 h 1 H C H w + P 2 f 2 h 2 H C H w | 2 σ E 1 2 ( σ E 2 2 + σ R 2 w H C C H w ) } = 1 2 log 2 ( 1 + R 0 )
The last equality holds due to the following lemma:
Lemma A1.
The following equality holds for any a j C and b j C , j = 1 , 2 :
( | a 1 | 2 + | a 2 | 2 ) ( | b 1 | 2 + | b 2 | 2 ) - | a 1 b 1 * + a 2 b 2 * | 2 = | a 1 b 2 - a 2 b 1 | 2 .
It is trivial to prove this lemma by expanding the left term.

Appendix B. Deduction of (8)

First, we show a lemma that will be used next.
Lemma A2.
Suppose x and y are two n-dimensional complex vectors. Then, Re ( x H y ) η y 2 holds for any x 2 η . The equality holds if and only if x = η y / y 2 .
Proof. 
Let x R and x I be the real and imaginary part of x , respectively, and define y R and y I similarly.
Then:
x H y = ( x R + i x I ) H ( y R + i y I ) = ( x R T y R + x I T y I ) + i ( x R T y I - x I T y R ) .
Thus, Re ( x H y ) = x R T y R + x I T y I . The necessary condition to maximize Re ( x H y ) is that x R and x I are parallel to y R and y I , respectively. This means that x should be parallel to y . Further with the condition x 2 η , we can deduce the conclusion. ☐
From Lemma A2, we deduce that:
| f j | 2 = | f j 0 + Δ f j | 2 = | f j 0 | 2 + 2 Re [ ( Δ f j ) * f j 0 ] + | Δ f j | 2 | f j 0 | 2 + 2 ε j | f j 0 | + ε j 2 = ( | f j 0 | + ε j ) 2
holds for all | Δ f j | ε j , j = 1 , 2 , and that:
| f 1 w H C h 2 - f 2 w H C h 1 | 2 = | ( f 1 , f 2 ) w H C h 2 - w H C h 1 | 2 ( f 1 , f 2 ) 2 · w H C h 2 - w H C h 1 2 = ( | f 1 | 2 + | f 2 | 2 ) ( | w H C h 1 | 2 + | w H C h 2 | 2 )
Then, we have:
R 0 = P 1 | f 1 | 2 + P 2 | f 2 | 2 σ E 1 2 + P 1 | w H C h 1 | 2 + P 2 | w H C h 2 | 2 σ E 2 2 + σ R 2 w H C C H w + P 1 P 2 | f 1 w H C h 2 - f 2 w H C h 1 | 2 σ E 1 2 ( σ E 2 2 + σ R 2 w H C C H w ) j = 1 2 P j ( | f j 0 | + ε j ) 2 σ E 1 2 + P 1 | w H C h 1 | 2 + P 2 | w H C h 2 | 2 σ E 2 2 + σ R 2 w H C C H w + P 1 P 2 j = 1 2 ( | f j 0 | + ε j ) 2 σ E 1 2 · | w H C h 1 | 2 + | w H C h 2 | 2 σ E 2 2 + σ R 2 w H C C H w = j = 1 2 P j ( | f j 0 | + ε j ) 2 σ E 1 2 + j = 1 2 ( P j + a 0 ) | w H C h j | 2 σ E 2 2 + σ R 2 w H C C H w = j = 1 2 P j ( | f j 0 | + ε j ) 2 σ E 1 2 + R 2 = R 1 ,
which holds for any | Δ f j | ε j , j = 1 , 2 .

Appendix C. Proof of Lemma 1

We prove the conclusion by showing that any feasible point of Subproblem (10) is a strictly feasible point of Problem (9). Suppose w is a feasible point of Subproblem (10), which satisfies Constraints (10b) and (10c).
1. It holds that:
SNR j ( w ) ( 1 + β δ ) γ j > γ j ,
for j = 1 , 2 . Thus, w strictly satisfies Constraint (9b).
2. First, we prove that w H C Q C H w σ E 2 2 R 3 ( w ) holds for all Δ c 2 ε . Given that C = Diag ( c ) and c = c 0 + Δ c , it holds that:
w H C Q C H w = w H ( C 0 + Δ C ) Q ( C 0 + Δ C ) H w = w H C 0 Q C 0 H w + c 0 T W H Q W ( Δ c ) * + ( Δ c ) T W H QW c 0 * + ( Δ c ) T W H Q W ( Δ c ) * w H C 0 Q C 0 H w + 2 Δ c 2 c 0 2 Q F W F 2 + ε 2 λ max ( W H QW ) w H C 0 Q C 0 H w + 2 ε c 0 2 Q F w 2 2 + ε 2 w H Diag ( Q 0 ) w = σ E 2 2 R 3 ( w ) ,
for all Δ c 2 ε . Here, W = Diag ( w ) ; the first inequality applies the norm inequality and the property of the Rayleigh quotient; the second inequality comes from that:
λ max ( W H QW ) λ max ( W H Q 0 W ) tr ( W H Q 0 W ) = w H Diag ( Q 0 ) w ,
with Q and Q 0 defined below (10).
As w satisfies Constraints (10c), it holds that:
w H C Q C H w σ E 2 2 R 3 ( w ) σ E 2 2 ( 1 - β δ ) γ E < σ E 2 2 γ E ,
for all Δ c 2 ε . (A2) is an equivalent form as R 2 ( w ) < γ E . Thus, w strictly satisfies Constraint (9c).
Summarizing the two points, we obtain the conclusion that any feasible point of Subproblem (10) is a strictly feasible point of Problem (9). Consequently, Lemma 1 holds.  ☐

Appendix D. Proof of Theorem 1

Our proof is divided into two parts. The first part is to prove that w k + 1 ( t ) satisfies (12), for any stepsize satisfying (16b) and (16c); w k + 1 is an interior point of Problem (9). Suppose t is any stepsize satisfying (16b) and (16c). Due to Constraint (16b), w k + 1 ( t ) satisfies Constraint (12a).
Next, we prove that w k + 1 ( t ) satisfies Constraint (12b). Let:
[ v 0 + t ( v 1 - v 0 ) ] H C QC H [ v 0 + t ( v 1 - v 0 ) ] = t 2 s 1 + t s 2 + s 3 ,
where v 0 and v 1 are defined below (16), s 1 = ( v 1 - v 0 ) H C QC H ( v 1 - v 0 ) , s 2 = 2 Re [ v 0 H C QC H ( v 1 - v 0 ) ] and s 3 = v 0 H C QC H v 0 .
1. For all Δ c 2 ε , we deduce that:
s 1 = c 0 T ( V 1 - V 0 ) H Q ( V 1 - V 0 ) c 0 * + 2 Re [ c 0 T ( V 1 - V 0 ) H Q ( V 1 - V 0 ) ( Δ c ) * ] + ( Δ c ) T ( V 1 - V 0 ) H Q ( V 1 - V 0 ) ( Δ c ) * c 0 T ( V 1 - V 0 ) H Q ( V 1 - V 0 ) c 0 * + 2 ε ( V 1 - V 0 ) H Q ( V 1 - V 0 ) c 0 * + ε 2 λ max [ ( V 1 - V 0 ) H Q ( V 1 - V 0 ) ] = m 1 .
Here, V 0 and V 1 are defined below (16). The inequality applies Lemma A2 and the property of the Rayleigh quotient.
2. Similarly, we deduce that:
s 3 c 0 T V 0 H Q V 0 c 0 * + 2 ε V 0 H Q V 0 c 0 * + ε 2 λ max ( V 0 H Q V 0 ) = m 4 + ( 1 - β δ ) σ E 2 2 γ E .
for all Δ c 2 ε .
3. For simplicity, denote Q v = V 0 H Q ( V 1 - V 0 ) . Then, we have:
t s 2 = t · 2 Re ( c 0 T Q v c 0 * ) + t · 2 Re [ ( Δ c ) T Q v c 0 * ] + t · 2 Re [ c 0 T Q v ( Δ c ) * ] + t · 2 Re [ ( Δ c ) T Q v ( Δ c ) * ] .
Then, we deduce that:
t · 2 Re [ ( Δ c ) T Q v c 0 * ] = t [ ( Δ c ) T Q v c 0 * + c 0 T Q v H ( Δ c ) * ] | t | · 2 ε Q v c 0 * 2 , t · 2 Re [ c 0 T Q v ( Δ c ) * ] | t | · 2 ε Q v H c 0 * 2 , t · 2 Re [ ( Δ c ) T Q v ( Δ c ) * ] = t ( Δ c ) T ( Q v + Q v H ) ( Δ c ) * | t | ε 2 λ max ( Q v + Q v H ) .
Thus, t s 2 t m 2 + | t | m 3 , for all Δ c 2 ε .
Due to Constraint (16c), we have that g k ( t ) 0 . Besides, combining 1–3, we can deduce that:
t 2 s 1 + t s 2 + s 3 t 2 m 1 + t m 2 + | t | m 3 + m 4 + ( 1 - β δ ) σ E 2 2 γ E = g k ( t ) + ( 1 - β δ ) σ E 2 2 γ E ( 1 - β δ ) σ E 2 2 γ E .
That is, [ v 0 + t ( v 1 - v 0 ) ] H C QC H [ v 0 + t ( v 1 - v 0 ) ] ( 1 - β δ ) σ E 2 2 γ E , for all Δ c 2 ε . Through equivalent reformulation, we deduce that w k + 1 ( t ) satisfies Constraint (12b). Thus, it satisfies (12), and it is an interior point of Problem (9). Let t be t k , then w k + 1 : = w k + 1 ( t k ) is an interior point of Problem (9).
In the second part, we prove that the objective function of Problem (9) decreases monotonically in each iteration. First, we prove that t = 0 is always feasible for Subproblem (16) in any iteration. Let k be the iteration index. In the initial iteration ( k = 0 ), t = 0 corresponds to w 0 , which is the optimal solution of the initial Subproblem (10). As w 0 satisfies (10b), we have that t = 0 satisfies Constraint (16b). Since w 0 satisfies (10c), we deduce that:
m 4 + ( 1 - β δ ) σ E 2 2 γ E = c 0 T W 0 H Q W 0 c 0 * + 2 ε W 0 H Q W 0 c 0 * + ε 2 λ max ( W 0 H Q W 0 ) c 0 T W 0 H Q W 0 c 0 * + 2 ε c 0 2 Q F w 0 2 2 + ε 2 w 0 H Diag ( Q 0 ) w 0 ( 1 - β δ ) σ E 2 2 γ E .
Here, W 0 = Diag ( w 0 ) . The deduction is similar to (A1). Then, we have g 0 ( 0 ) = m 4 0 , that is t = 0 satisfies (16c). Thus, t = 0 is feasible for Subproblem (16) in the initial iteration ( k = 0 ) .
When k > 0 , t = 0 represents w k + 1 ( 0 ) = w k , which was updated in the ( k - 1 ) -th iteration: w k = w k - 1 + t k - 1 w ˜ k . In this case, it is trivial to show that t = 0 satisfies Constraints (16b) and (16c). The detailed proof is omitted.
Thus, t = 0 is always feasible for Subproblem (16) in any iteration. Since t k is the optimal solution of (16), it holds that P R ( w k + 1 ( t k ) ) P R ( w k + 1 ( 0 ) ) , that is P R ( w k + 1 ) P R ( w k ) . This means the objective function of Problem (9) decreases monotonically in each iteration.  ☐

Appendix E. Proof of Theorem uid26

For w 0 , as any feasible point of Problem (9), there exists a vector Δ c 0 , such that R 2 ( Δ c ; w 0 ) R 2 ( Δ c 0 ; w 0 ) γ E holds for all Δ c 2 ε . We define such w 0 and Δ c 0 as “a robust pair”.
Obviously, in Algorithm 1, w k and Δ c k consist of a robust pair, for any k. If δ goes to infinity and w ˜ k + 1 = w k , then β δ goes to zero, and w k is the optimal solution of the following subproblem:
min w C N × 1 P R ( w ) s . t . SNR j ( w ) γ j , j = 1 , 2 ; R 2 ( Δ c k ; w ) γ E .
Next, we shall prove the conclusion by contradiction. Suppose w k is not the optimal solution of Problem (9), then there must exist another feasible point of (9), w * , and P R ( w * ) < P R ( w k ) . Let w * and Δ c * be a robust pair. Then, the following inequalities hold:
SNR j ( w * ) γ j , j = 1 , 2 ; R 2 ( Δ c k ; w * ) R 2 ( Δ c * ; w * ) γ E .
This shows that w * is a feasible point of Subproblem (A3). Further the relation P R ( w * ) < P R ( w k ) shows that w * has a lower objective function value of (A3) compared to w k .
This contradicts the fact that w k is the optimal solution of (A3). Thus, the assumption is incorrect. w k must be the optimal solution of Problem (9). ☐

References

  1. Oggier, F.; Hassibi, B. The Secrecy Capacity of the MIMOWiretap Channel. IEEE Trans. Inf. Theor. 2011, 57, 4961–4972. [Google Scholar] [CrossRef]
  2. Lin, P.H.; Lai, S.H.; Lin, S.C.; Su, H.J. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [Google Scholar] [CrossRef]
  3. Wang, H.M.; Zheng, T.; Xia, X.G. Secure MISO Wiretap Channels with Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading. IEEE Trans. Wirel. Commun. 2015, 14, 94–106. [Google Scholar] [CrossRef]
  4. Chen, X.; Zhang, Y. Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective. IEEE Syst. J. 2015, 11, 1128–1136. [Google Scholar] [CrossRef]
  5. Kapetanovic, D.; Zheng, G.; Rusek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [Google Scholar] [CrossRef] [Green Version]
  6. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.Y.; Leung, K.K. Secrecy Rate Optimizations for a MIMO Secrecy Channel with a Multiple-Antenna Eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
  7. Zappone, A.; Lin, P.H.; Jorswieck, E.A. Energy efficiency in secure multi-antenna systems. arXiv 2015, arXiv:1505.02385. [Google Scholar]
  8. Zhang, J.; Yuen, C.; Wen, C.K.; Jin, S.; Wong, K.K. Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels. IEEE Trans. Inf. Forensics Secur. 2015, 11, 74–85. [Google Scholar] [CrossRef]
  9. Zheng, C.; Cumanan, K.; Ding, Z.; Johnston, M.; Goff, S.L. Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel. IEEE Wirel. Commun. Lett. 2015, 4, 86–89. [Google Scholar]
  10. Jimenez Rodriguez, L.; Tran, N.H.; Duong, T.Q.; Tho, L.N.; Elkashlan, M.; Shetty, S. Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Commun. Mag. 2015, 12, 32–39. [Google Scholar] [CrossRef]
  11. Liu, Y.; Li, L.; Alexandropoulos, G.C.; Pesavento, M. Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach. Entropy 2017, 19, 384. [Google Scholar] [CrossRef]
  12. Sun, L.; Zhang, T.; Li, Y.; Niu, H. Performance Study of Two-Hop Amplify-and-Forward Systems with Untrustworthy Relay Nodes. IEEE Trans. Veh. Technol. 2012, 61, 3801–3807. [Google Scholar] [CrossRef]
  13. Jeong, C.; Kim, I.M.; Kim, D.I. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System. IEEE Trans. Signal Process. 2012, 60, 310–325. [Google Scholar] [CrossRef]
  14. Wang, H.M.; Luo, M.; Xia, X.G.; Yin, Q.Y. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper CSI. IEEE Signal Process. Lett. 2013, 20, 39–42. [Google Scholar] [CrossRef]
  15. Salem, A.; Hamdi, K.A. Improving Physical Layer Security of AF Relay Networks via Beam-forming and Jamming. In Proceedings of the Vehicular Technology Conference, Montreal, QC, Canada, 18–21 September 2016. [Google Scholar]
  16. Lee, J.H. Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks. IEEE Trans. Wirel. Commun. 2016, 15, 28–38. [Google Scholar] [CrossRef]
  17. Kolokotronis, N.; Athanasakos, M. Improving physical layer security in DF relay networks via two-stage cooperative jamming. In Proceedings of the European Signal Processing Conference, Budapest, Hungary, 29 August–2 September 2016; pp. 1173–1177. [Google Scholar]
  18. Dong, L.; Han, Z.; Petropulu, A.P.; Vincent Poor, H. Improving Wireless Physical Layer Security via Cooperating Relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  19. Li, J.Y.; Petropulu, A.P.; Weber, S. On Cooperative Relaying Schemes for Wireless Physical Layer Security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar] [CrossRef]
  20. Hui, H.; Swindlehurst, A.L.; Li, G.B.; Liang, J.L. Secure Relay and Jammer Selection for Physical Layer Security. IEEE Signal Process. Lett. 2015, 22, 1147–1151. [Google Scholar] [CrossRef]
  21. Chen, G.; Yu, G.; Xiao, P.; Chambers, J. Physical Layer Network Security in the Full-Duplex Relay System. IEEE Trans. Inf. Forensics Secur. 2015, 10, 574–583. [Google Scholar] [CrossRef] [Green Version]
  22. Zou, Y.L.; Wang, X.B.; Shen, W.M. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks. IEEE J. Sel. Areas Commun. 2013, 10, 2099–2111. [Google Scholar] [CrossRef]
  23. Wang, D.; Bai, B.; Chen, W.; Han, Z. Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying. IEEE Trans. Wirel. Commun. 2016, 15, 740–752. [Google Scholar] [CrossRef]
  24. Chen, X.; Lei, L.; Zhang, H.; Yuen, C. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? IEEE Int. Conf. Commun. 2015, 14, 5135–5146. [Google Scholar] [CrossRef]
  25. Yang, Y.C.; Sun, C.; Zhao, H.; Long, H.; Wang, W.B. Algorithms for Secrecy Guarantee with Null Space Beamforming in Two-Way Relay Networks. IEEE Trans. Signal Process. 2014, 62, 2111–2126. [Google Scholar] [CrossRef]
  26. Chen, X.; Chen, J.; Zhang, H.; Zhang, Y.; Yuen, C. On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications with Imperfect CSI. IEEE Trans. Veh. Technol. 2016, 65, 8014–8024. [Google Scholar] [CrossRef]
  27. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.W.; Chen, W. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1812–1823. [Google Scholar] [CrossRef]
  28. Wang, X.; Zhang, Z.; Long, K. Robust relay beamforming for multiple-antenna amplify-and-forward relay system in the presence of eavesdropper. IEEE Int. Conf. Acoust. Speech Signal Process. 2014, 5710–5714. [Google Scholar]
  29. Lin, Z.; Cai, Y.; Yang, W.; Wang, L. Robust secure switching transmission in multi-antenna relaying systems: Cooperative jamming or decode-and-forward beamforming. IET Commun. 2016, 10, 1673–1681. [Google Scholar] [CrossRef]
  30. Zhang, M.; Huang, J.; Yu, H.; Luo, H.W.; Chen, W. QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty. IEEE Commun. Lett. 2013, 17, 1544–1547. [Google Scholar] [CrossRef]
  31. Wang, H.M.; Yin, Q.Y.; Xia, X.G. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
  32. López, M.; Still, G. Semi-infinite programming. Eur. J. Oper. Res. 2007, 180, 491–518. [Google Scholar] [CrossRef]
  33. Luo, Z.Q.; Ma, W.K.; So, M.C.; Ye, Y.Y. Semidefinite Relaxation of Quadratic Optimization Problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  34. Ai, W.B.; Huang, Y.; Zhang, S.Z. New results on Hermitian matrix rank-one decomposition. Math. Progr. 2011, 128, 253–283. [Google Scholar] [CrossRef]
  35. Sun, W.Y.; Yuan, Y.X. Optimization theory and methods: Nonlinear programming. In Sringer Optimization and its Applications; Pardalos, P.M., Ed.; Springer: New York, NY, USA, 2006. [Google Scholar]
  36. CVX: Matlab Software for Disciplined Convex Programming. Available online: http://cvxr.com/cvx/ (accessed on 29 September 2017).
Figure 1. Secure communication model for the two-way relay network.
Figure 1. Secure communication model for the two-way relay network.
Entropy 19 00522 g001
Figure 2. Comparison between the proposed algorithm and the non-robust model with perfect CSI, with respect to different relay numbers and different γ . The same colored circle and star marks represent for the proposed algorithm and the non-robust model, respectively. Here, σ c = 1 and r E = 1 . 5 .
Figure 2. Comparison between the proposed algorithm and the non-robust model with perfect CSI, with respect to different relay numbers and different γ . The same colored circle and star marks represent for the proposed algorithm and the non-robust model, respectively. Here, σ c = 1 and r E = 1 . 5 .
Entropy 19 00522 g002
Figure 3. Comparison between Algorithm 1 and [31] which has no CSI, with respect to different relay numbers and different r E . Here, σ c = 0 . 1 and γ = 6 .
Figure 3. Comparison between Algorithm 1 and [31] which has no CSI, with respect to different relay numbers and different r E . Here, σ c = 0 . 1 and γ = 6 .
Entropy 19 00522 g003
Figure 4. Achieved relay transmit power by the proposed algorithm with different parameters. Here, σ c = 0 . 5 , γ = 6 , r E = 0 . 8 .
Figure 4. Achieved relay transmit power by the proposed algorithm with different parameters. Here, σ c = 0 . 5 , γ = 6 , r E = 0 . 8 .
Entropy 19 00522 g004
Figure 5. Convergence curves for N = 4 , 8 , 12 . Here, σ c = 1 , γ = 6 and r E = 1 . 5 .
Figure 5. Convergence curves for N = 4 , 8 , 12 . Here, σ c = 1 , γ = 6 and r E = 1 . 5 .
Entropy 19 00522 g005
Table 1. Illustration of relay power allocation of Algorithm 1 and [31].
Table 1. Illustration of relay power allocation of Algorithm 1 and [31].
MethodRelay Power for SignalsRelay Power for the Artificial NoiseTotal Relay Power
Algorithm 1 P a 0 P a
Reference [31] P b P a - P b P a
Table 2. Number of realizations out of 1000 to exit Algorithm 1 by satisfying the first stopping criterion, with σ c = 0 . 1 , γ = 4 and r E = 0 . 2 .
Table 2. Number of realizations out of 1000 to exit Algorithm 1 by satisfying the first stopping criterion, with σ c = 0 . 1 , γ = 4 and r E = 0 . 2 .
relay number48121620
number of realizations882863870861877

Share and Cite

MDPI and ACS Style

Sun, C.; Liu, K.; Zheng, D.; Ai, W. Secure Communication for Two-Way Relay Networks with Imperfect CSI. Entropy 2017, 19, 522. https://doi.org/10.3390/e19100522

AMA Style

Sun C, Liu K, Zheng D, Ai W. Secure Communication for Two-Way Relay Networks with Imperfect CSI. Entropy. 2017; 19(10):522. https://doi.org/10.3390/e19100522

Chicago/Turabian Style

Sun, Cong, Ke Liu, Dahu Zheng, and Wenbao Ai. 2017. "Secure Communication for Two-Way Relay Networks with Imperfect CSI" Entropy 19, no. 10: 522. https://doi.org/10.3390/e19100522

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop