Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors

被引:6
作者
Gong, Lihua [1 ]
Ding, Xiaoxiu [1 ]
Zhu, Qibiao [1 ]
Zhou, Nanrun [1 ,2 ]
机构
[1] Nanchang Univ, Dept Elect Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai Key Lab Integrate Adm Technol Informat S, Shanghai 200240, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Untrusted relay network; imperfect channel state information; physical layer security; cooperative interference; power allocation; PHYSICAL LAYER SECURITY; WIRE-TAP CHANNEL; ARTIFICIAL NOISE; COMMUNICATION;
D O I
10.1109/ACCESS.2018.2868500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each source signal. The total and the individual power constraint conditions are considered. To maximize the attainable secrecy rate, an iterative power allocation algorithm is designed under the total power constraint. As a more practical system design, a suboptimal power allocation scheme is proposed. For the sake of comparison, the security performances of the noncooperative interference strategy and the one-way cooperative interference strategy are also investigated. Simulation results demonstrate that the proposed bidirectional cooperative interference schemes perform better in the secrecy rate of communication system.
引用
收藏
页码:50950 / 50958
页数:9
相关论文
共 32 条
[1]   Relay selection schemes for secure transmission in cognitive radio networks [J].
Al-Jamali, Mukarram ;
Al-nahari, Azzam ;
AlKhawlani, Mohammed .
WIRELESS NETWORKS, 2018, 24 (03) :911-923
[2]  
[Anonymous], 1999, SPRINGER SCI
[3]  
[Anonymous], 2009, CONVEX OPTIMIZATION
[4]  
[Anonymous], 1987, Unconstrained Optimization: Practical Methods of Optimization
[5]  
[Anonymous], 2017 26 WIR OPT
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]  
Dong L, 2009, 2009 IEEE/SP 15TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2, P417, DOI 10.1109/EIT.2009.5189653
[8]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[9]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[10]   Cooperation With an Untrusted Relay: A Secrecy Perspective [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3807-3827