1. Introduction
Underground mining promotes the economy’s growth, but the dust and poisonous gases formed during mining make it a dangerous and complex operation. Therefore, a reliable communication system is needed to monitor the mining process and communicate with external management offices to ensure the safety and maximum production of the underground mine. Wireless communication technology is applied to realize information exchange in underground mines due to its simple construction.
However, due to the complex structure of underground mines, there exists significant attenuation of radio wave transmission in wireless communications [
1]. To solve these problems, relay-aided wireless communications have been studied to improve the reliability and have also been used to enhance the coverage of a broader range of networks. According to the forwarding protocol adopted by the relay, cooperation relay can be divided into amplify-and-forward (AF) and decode-and-forward (DF) relay [
2]. AF is the simplest protocol, and it processes the received signals linearly and then forwards them to the destination [
3]. Offering a reasonable trade-off between actual implementation costs and benefits, AF is considered the most promising solution [
4].
To guarantee the communication rate in wireless communications, full-duplex (FD) relays are studied in Refs. [
5,
6]. FD technology allows radios to receive and transmit simultaneously on the same frequency band, which can improve spectrum efficiency [
7]. Furthermore, in addition to doubling the spectral efficiency of the physical layer, FD can help to solve the throughput losses due to congestion and large point-to-point delays in existing wireless networks.
In addition, due to the openness and sharing of wireless media, any wireless device connected to the communication system can access messages exchanged through the connection, making wireless channels easy to be eavesdropped on and inject with malicious information [
8]. Worse still, relay-aided wireless networks may suffer severe security risks from malicious users since they may eavesdrop on the messages from both the source and the relay. Physical layer security (PLS) can effectively protect the privacy among the transmitter and the legitimate receivers [
9]. Shannon conducted pioneering research on secret communications and established the concept of perfect secrecy [
10]. Unlike Shannon, Wyner proposed a degraded wiretap channel model in Ref. [
11]. After the degraded wiretap channel, the fading wiretap channels and multiple-input-multiple-output wiretap channels have been investigated in Refs. [
12,
13] and Refs. [
14,
15], respectively.
The work in Ref. [
5] investigated a FD communication system, and the transmission block is divided into an energy harvesting phase and an information transmission phase. Different from Ref. [
5], in Ref. [
6], an FD is designed to capture energy from the source while forwarding information to the legitimate receivers. With the presence of passive colluding wireless eavesdroppers, Ref. [
16] studied the effective secrecy throughput to the physical layer security of in-home and broadband PLC systems. In Ref. [
17], the authors investigated the optimal trunk position of FD relay systems with DF and the minimal outage probability criterion considered.
Above all, to the best of our knowledge, the existing contributions fail to ensure secure communications in the challenging FD relay-aided wireless communications scenario in the face of multiple eavesdroppers and imperfect channel state information (CSI). Therefore, in this paper, we propose a PLS scheme of cooperative jamming and precoding for FD-DF relay-assisted wireless communications system considering imperfect CSI, which combines cooperative precoding for legitimate users to improve the quality of legitimate channels and cooperative jamming for illegal users to reduce the quality of eavesdropping channels. Considering the imperfect CSI and multiple eavesdroppers, we use an effective BCD algorithm to design the precoding and jamming matrix at both the source and the relay, in which maximizing the secrecy rate of the FD-AF relay-assisted wireless communications system is emphasized.
This paper is organized as follows.
Section 2 describes the system model. The secrecy rate optimization problem is proposed and transformed into a solvable form in
Section 3, which also gives the algorithm.
Section 4 characterizes the numerical results in different scenarios. Finally, the conclusion is presented in
Section 5.
Notation: The denote the transpose, conjugate transpose, vectorization, Frobenius norm, and trace of the matrix, respectively. ⊗ denote the Kronecker product, and along with . is the identity matrix.
2. System Model
Consider a MIMO wireless system, as shown in
Figure 1, where a source, a relay, a user, and two eavesdroppers have
,
,
, and
channels, respectively. We assume that there is no direct link between the source and the user for the long-distance path loss. For simplicity, the eavesdroppers represent all the eavesdroppers eavesdropping the same legitimate in the same time phase. More specifically, in the first time phase, eavesdroppers eavesdrop
message from the source, and in the second time phase, eavesdropper eavesdrop
message from the relay.
In wireless communications system, messages are transmitted through MIMO wireless communications channels. We describe each path between two nodes by CSI as the matrix of channel coefficients, where , , and denote the transmitter, receiver, and transmission time phases, respectively. It is worth noting that refers to the self-interference matrix because of self-interference and in the process of transmission stays constant because of the short transmission time.
In this paper, the uncertainty of CSI is taken into consideration, i.e., the CSI of the wireless communications system cannot be perfectly known at the source or the relay due to factors such as the limited capacity of the feedback channel. As a result, the deterministic uncertainty model [
18] is introduced to characterize the imperfect CSI, as follows:
where
denotes the channel uncertainty as the degree of deviation from the mean CSI
.
In
Figure 1, during the first time phase, the source sends confidential signals to the relay while
eavesdrops on the signals from the source. To interrupt
, the relay emits jamming signals to
. More specifically, the message transmitted by the source is secret data symbol
precoded by the precoding vector
. Then, we can formulate the progress at the source as follows:
Next, we formulate the messages emitted by the relay. Note that the relay in this time phase only emits jamming to disrupt
so the messages can be formulated as follows:
where we utilize the jamming precoding vector
and jamming symbol
.
Considering the self-interference of the relay, we can formulate the messages received by the relay:
where
is Additive White Gaussian Noise (AWGN) at the relay and
is the self-interference matrix. Meanwhile,
eavesdrops on both of the messages from the source and the relay, so the messages eavesdropped by
can be expressed as
where
is AWGN at
.
In the second time phase, the source emits the jamming signals
to
where
,
represent the jamming precoding vector and jamming symbol, respectively.
Then, the relay amplifies the messages it received in the first time phase and forwards them to the user,
where
is the amplifying matrix at the relay and
is AWGN at the users, and
represent the messages transmitted by the relay and received by the users, respectively.
receive both the signals from the relay and the jamming signals from the source, i.e.,
where
is AWGN at
.
Above all, to formulate the problem in a mathematical form, we calculate the signal-noise ratio (SNR) at the users,
and
, respectively.
where
.
where
.
where
and
is the noise amplitude of the corresponding AWGN
.
Then, we can arrive at the achievable secrecy rate of the legitimate users [
11]:
In the non-colluding strategy, each eavesdropper processes messages individually. Therefore, the achievable secrecy rate of the non-colluding [
11] eavesdroppers is
Finally, we can gain the achievable secrecy rate of the wireless communications system,
3. Optimization Problem Transformation
In this part, the goal is to maximize the secrecy rate of the communication system. Then according to the system model, we can formulate the optimization problem of the secrecy rate with the transmit power constraint as follows.
However, due to the non-convexity of the optimization problem, it is difficult to solve. To deal with the high non-convexity of the function
, the objective function in (
16a) is transformed into an equivalent counterpart through the WMMSE algorithm, which can be solved by the BCD method. The following introduces the WMMSE algorithm.
Lemma 1. Define the mean-square error (MSE) matrixwhere . Then we have To reformulate the parts of
in the objective function, we apply Lemma 1 on (
13) and introduce the MSE matrix
and auxiliary matrices
, which have been defined in (
17) and (
19). So, the achievable secrecy rate of the legitimate can be reorganized as
where
Applying Lemma 1 on (
14), the achievable rates of
and
can be transformed as (
22) and (
23).
Then, the auxiliary variables
,
,
and
can be rewritten according to Lemma 1 as
where
and note the decomposition
and
.
After substituting (
24)–(
27) into (
16a), the secrecy rate of the system is equivalently rewritten as
where the function
is defined in (30).
To solve the proposed problem and constraint (16c), the slack variables
(
) are introduced to transform (
28) into an optimization problem.
We can further rewrite the problem (
28) as
where
is defined in (
34), respectively. However, the semi-infinite inequalities (
31) are non-convex and need further transformation. In the next step, (
31) is transformed into a convex form. In fact, all the inequalities
can be transformed into a convex form in a similar way. Such as, when
, the semi-definite constraint
can be rewritten as
by applying
and the equality
.
Then we need to extract the uncertain CSI from (
35).
where the identity
is applied and
. Note that
denote the coupling parts of CSI in
in the
part. In fact, the uncertainty of the CSI is small enough to make its quadratic forms negligible. As a result, the
can be represented as its asymptotic form as
where
Then, we exploit the Schur complement lemma to recast the constraint (
31) as a matrix inequality by substituting (
35) and (
37).
To eliminate the
, the sign-definiteness lemma is applied.
Lemma 2. Defined matrix and with , the semi-infinite Linear Matrix Inequality (LMI) of the form Holds if and only if there exist nonnegative real numbers
such that
Appropriately choose the parameters below
Apply Lemma 2 to transform (
42) as
where
. Similarly, the other constraint
is written as follows.
By assembling all the components, the problem can now be written as
where the function
is defined in (
54). The problem (
52) remains non-convex. However, it becomes a convex optimization problem when fixing some of the optimization variables. In other words, after proper manipulations, its sub-problems can become convex, which are readily solvable. Therefore, a BCD algorithm is employed to solve the nonconvex problem (
52), which is summarized in Algorithm 1.
Algorithm 1 AN-BF scheme to solve the optimization problem |
; repeat 1: Begin BCD to deal with the ( 52) with , and gain the ; 2: Solve ( 52) with , and gain the ; 3: Solve ( 52) to attain with ; 4: Solve ( 52) to gain with ; until.
|
4. Results
In this section, numerical simulations are provided to evaluate the performance of the proposed scheme in terms of the average secrecy rate. In this part, we consider a wireless communications system with . Besides, for simplicity, the CSI uncertainty bound is represented as the corresponding determinant of mean CSI multiplied by one certain coefficient, or .
Figure 2 portrays the average secrecy rate versus numbers of iterations with
dB. By the proposed scheme, the average secrecy rate always converges within about 40 iterations. It indicates that the CSI uncertainty has a destructive effect on the secrecy rate and the BCD algorithm converges faster with larger uncertainty. Additionally, the proposed scheme achieves a better average secrecy rate with more ports of legitimate users and fewer ports of eavesdroppers, which is especially obvious in small uncertainty scenarios. It can be explained that the number of ports suggests the ability to receive or intercept the information.
Figure 3 shows the impact of a different transmit power of the proposed scheme. It can be observed that the average secrecy rate increases with the increase of transmitting power. In addition, it is observed that the security rate does not improve significantly when the transmitted power is more than 10 dB under the condition of more ports of eavesdroppers and greater CSI uncertainty. It can be explained that the increase in transmitting power increases the capacity of not only legitimate users but also eavesdroppers, resulting in a slight change in the security rate.
We compare the proposed schemes with a similar one without jamming by presenting the numerical results in
Figure 4. Our proposed scheme achieves better performance in terms of the average secrecy rate, especially with lower uncertainty and higher transmit power. Therefore, to some extent, jamming can disturb the interception of eavesdroppers even with higher uncertainty.