Joint Transceiver Design for Secure Downlink Communications Over an Amplify-and-Forward MIMO Relay

被引:31
作者
Cai, Yunlong [1 ]
Shi, Qingjiang [2 ]
Champagne, Benoit [3 ]
Li, Geoffrey Ye [4 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Jiangsu, Peoples R China
[3] McGill Univ, Dept Elect & Comp Engn, Montreal, PQ H3A 0E9, Canada
[4] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
基金
中国国家自然科学基金;
关键词
Beamforming; transceiver design; MIMO relay; physical layer security; penalty-CCCP; PHYSICAL LAYER SECURITY; WIRELESS NETWORKS; TRANSMISSION; SECRECY;
D O I
10.1109/TCOMM.2017.2708110
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper addresses joint transceiver design for secure downlink communications over a multiple-input multiple-output relay system in the presence of multiple legitimate users and malicious eavesdroppers. Specifically, we jointly optimize the base station (BS) beamforming matrix, the relay station (RS) amplify-and-forward transformation matrix, and the covariance matrix of artificial noise, so as to maximize the system worst-case secrecy rate in the presence of the colluding eavesdroppers under power constraints at the BS and the RS, as well as quality of service constraints for the legitimate users. This problem is very challenging due to the highly coupled design variables in the objective function and constraints. By adopting a series of transformation, we first derive an equivalent problem that is more tractable than the original one. Then, we propose and fully develop a novel algorithm based on the penalty concave-convex procedure (penalty-CCCP) to solve the equivalent problem, where the difficult coupled constraint is penalized into the objective and the resulting nonconvex problem is solved at each iteration by resorting to the CCCP method. It is shown that the proposed joint transceiver design algorithm converges to a stationary solution of the original problem. Finally, our simulation results reveal that the proposed algorithm achieves better performance than other recently proposed transceiver designs.
引用
收藏
页码:3691 / 3704
页数:14
相关论文
共 43 条
[1]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[2]   Robust control via concave minimization local and global algorithms [J].
Apkarian, P ;
Tuan, HD .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2000, 45 (02) :299-305
[3]  
Bertsekas Dimitri P, 1999, NONLINEAR PROGRAMMIN, V2
[4]  
Boyd S, 2004, CONVEX OPTIMIZATION
[5]  
Brandwood D. H., 1983, IEE Proceedings H (Microwaves, Optics and Antennas), V130, P11, DOI 10.1049/ip-h-1.1983.0004
[6]   Joint Transceiver Design Algorithms for Multiuser MISO Relay Systems With Energy Harvesting [J].
Cai, Yunlong ;
Zhao, Ming-Min ;
Shi, Qingjiang ;
Champagne, Benoit ;
Zhao, Min-Jian .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (10) :4147-4164
[7]   Physical-Layer Secret Key Generation With Colluding Untrusted Relays [J].
Chan Dai Truyen Thai ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) :1517-1530
[8]   Multi-Antenna Relay Aided Wireless Physical Layer Security [J].
Chen, Xiaoming ;
Zhong, Caijun ;
Yuen, Chau ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :40-+
[9]   Joint Optimization of Source Power Allocation and Distributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks [J].
Cheng, Yong ;
Pesavento, Marius .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (06) :2962-2973
[10]   A General Relaying Transmission Protocol for MIMO Secrecy Communications [J].
Ding, Zhiguo ;
Peng, Mugen ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (11) :3461-3471