On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks

被引:41
作者
Hanif, Muhammad Fainan [1 ]
Le-Nam Tran [1 ]
Juntti, Markku [1 ]
Glisic, Savo [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, Dept Commun Engn, FI-90014 Oulu, Finland
基金
芬兰科学院;
关键词
Beamforming; channel uncertainties; degrees-of-freedom; interference alignment; multiantenna downlink; multicast systems; robust convex optimization; secrecy capacity; CAPACITY REGION; POWER-CONTROL; OPTIMIZATION; CHANNELS; ALGORITHM;
D O I
10.1109/TSP.2014.2326617
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Revived interest in physical layer security has led to a cascade of information theoretic results for various system topologies under different constraints. In the present paper, we provide practically oriented solutions to the problem of maximizing achievable secrecy rates in an environment consisting of multiple legitimate and eavesdropping radio nodes. By assuming "genie" aided perfect channel state information (CSI) feedback for both types of nodes, we first study two scenarios of interest. When independent messages are intended for all legitimate users (called "broadcast" mode), provably convergent second-order cone programming (SOCP)-based iterative procedure is used for designing secrecy rate maximizing beamformers. In the same manner, when a common message is intended only for legitimate nodes (dubbed "multicast" mode), SOCP-based design is proposed for obtaining linear precoders that maximize the achievable secrecy rate. Subsequently, we leverage the analysis to the more real-world scenario, where the CSI of the malicious nodes has to be somehow estimated and that of the legitimate users is corrupted with unavoidable errors. For this case, we devise provably convergent iterative semidefinite programming (SDP) procedures that maximize the achievable secrecy rates for both the beamforming-based broadcast and the linearly precoded multicast modes. Finally, numerical results are reported that evaluate the performance of the proposed solutions as a function of different system parameters. The results presented in the paper are demonstrated to outperform the ones based on interference alignment strategies. We also ascertain superior performance of the proposed schemes in the realms of real world.
引用
收藏
页码:3536 / 3551
页数:16
相关论文
共 40 条
[1]  
[Anonymous], 2010, P 24 FIG INT C
[2]  
[Anonymous], 2004, CACSD C TAIP TAIW
[3]   Pilot Design for OFDM with Null Edge Subcarriers [J].
Baxley, Robert J. ;
Kleider, John E. ;
Zhou, G. Tong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (01) :396-405
[4]   Strong duality in nonconvex quadratic optimization with two quadratic constraints [J].
Beck, Amir ;
Eldar, Yonina C. .
SIAM JOURNAL ON OPTIMIZATION, 2006, 17 (03) :844-860
[5]   A sequential parametric convex approximation method with applications to nonconvex truss topology design problems [J].
Beck, Amir ;
Ben-Tal, Aharon ;
Tetruashvili, Luba .
JOURNAL OF GLOBAL OPTIMIZATION, 2010, 47 (01) :29-51
[6]   Theory and Applications of Robust Optimization [J].
Bertsimas, Dimitris ;
Brown, David B. ;
Caramanis, Constantine .
SIAM REVIEW, 2011, 53 (03) :464-501
[7]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[8]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[9]   Secure Network Coding on a Wiretap Network [J].
Cai, Ning ;
Yeung, Raymond W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) :424-435
[10]   Power control by geometric programming [J].
Chiang, Mung ;
Tan, Chee Wei ;
Palomar, Daniel P. ;
O'Neill, Daniel ;
Julian, David .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (07) :2640-2651