Total transmit power minimization with physical layer security in multiuser peer-to-peer two-way relay networks

被引:0
作者
Cheraghi M. [1 ]
Darmani Y. [1 ]
机构
[1] Faculty of Electrical Engineering, K.N. Toosi University of Technology, Tehran
关键词
Multi-antenna eavesdropper; Multiuser peer-to-peer; Null space beamforming; Physical layer security; Power minimization; Two-way relay network;
D O I
10.1016/j.aeue.2020.153317
中图分类号
学科分类号
摘要
In this paper, we investigate a multiuser peer-to-peer (MUP2P) two-way relay network (TWRN) in the presence of an eavesdropper. In this network, only the k∗th pair of users demand secure communication. Also, a multi-antenna eavesdropper aim to wiretap the confidential data of the k∗th pair in both cooperative phases. Our goal is to minimize the total transmit power provided that the secrecy rate for two secure users and the quality of service constraints of each user are met. For simplifying the problem and also omitting the confidential information leakage in the second phase, a null space beamforming (NSBF) scheme is employed. Despite this, the problem is still non-convex. We divided the problem into two subproblems to solve beamforming and users’ power formulated in two iterations, respectively. Three different methods are proposed to solve the first subproblem, semi-definite programming (SDP), second-order cone programming (SOCP), and sequential quadratic programming (SQP). We employ a sequential parametric convex approximation (SPCA) method to convert the users’ power subproblem into inequality form a linear programming (LP) problem to solve it. In the following, we evaluate the computational complexity of these methods. Simulation results confirmed the validity of the proposed methods. © 2020 Elsevier GmbH
引用
收藏
相关论文
共 61 条
[1]  
Wang B., Huang K., Xu X., Wang Y., Secure spectral-energy efficiency tradeoff in random cognitive relay networks, China Commun, 14, 12, pp. 45-58, (2017)
[2]  
Perrig A., Stankovic J., Wagner D., Security in wireless sensor networks, Commun ACM, 47, 6, pp. 53-57, (2004)
[3]  
Mpitziopoulos A., Gavalas D., Konstantopoulos C., Pantziou G., A survey on jamming attacks and countermeasures in wsns, IEEE Commun Surv Tutorials, 11, 4, pp. 42-56, (2009)
[4]  
Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun Surv Tutorials, 16, 3, pp. 1550-1573, (2014)
[5]  
Bhoyar P., Sahare P., Dhok S., Deshmukh R., Communication technologies and security challenges for internet of things: A comprehensive review, Int J Electron Commun (AE AIJ), 99, pp. 81-99, (2019)
[6]  
Wyner A.D., The wire-tap channel, Bell Syst Techn J, 54, 8, pp. 1355-1387, (1975)
[7]  
Hamamreh J.M., Furqan H.M., Arslan H., Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey, IEEE Commun Surv Tutorials, 21, 2, pp. 1773-1828, (2018)
[8]  
Ji B., Xing B., Song K., Li C., Wen H., Yang L., The efficient backfi transmission design in ambient backscatter communication systems for iot, IEEE Access, 7, pp. 31397-31408, (2019)
[9]  
Ji B., Chen Z., Chen S., Zhou B., Li C., Wen H., Joint optimization for ambient backscatter communication system with energy harvesting for iot, Mech Syst Signal Process, 135, (2020)
[10]  
Liu Y., Chen H.-H., Wang L., Physical layer security for next generation wireless networks: Theories, technologies, and challenges, IEEE Commun Surv Tutorials, 19, 1, pp. 347-376, (2016)