Robust Chance-Constrained Secure Transmission for Cognitive Satellite-Terrestrial Networks

被引:134
作者
Li, Bin [1 ]
Fei, Zesong [1 ]
Chu, Zheng [2 ]
Zhou, Fuhui [3 ,4 ]
Wong, Kai-Kit [5 ]
Xiao, Pei [2 ]
机构
[1] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[2] Univ Surrey, Innovat Ctr 5G, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[3] Nanchang Univ, Sch Informat Engn & Postdoctoral Res Stn Environm, Nanchang 330031, Jiangxi, Peoples R China
[4] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
[5] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Satellite-terrestrial networks; physical-layer security; robust beamforming; outage probability; power minimization; RELAY NETWORKS; PERFORMANCE; APPROXIMATIONS; ALLOCATION; RADIO;
D O I
10.1109/TVT.2018.2791859
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cognitive satellite-terrestrial networks (CSTNs) have been recognized as a promising network architecture for addressing spectrum scarcity problem in next-generation communication networks. In this paper, we investigate the secure transmission for CSTNs where the terrestrial base station serving as a green interference resource is introduced to enhance the security of the satellite link. Adopting a stochastic model for the channel state information uncertainty, we propose a secure and robust beam-forming framework to minimize the transmit power, while satisfying a range of outage (probabilistic) constraints concerning the signal-to-interference-plus-noise ratio (SINR) recorded at the satellite user and the terrestrial user, the leakage-SINR recorded at the eavesdropper, as well as the interference power recorded at the satellite user. The resulting robust optimization problem is highly intractable and the key observation is that the highly intractable probability constraints can be equivalently reformulated as the deterministic versions with Gaussian statistics. In this regard, we develop two robust reformulation methods, namely S-procedure and Bernstein-type inequality restriction techniques, to obtain a safe approximate solution. In the meantime, the computational complexities of the proposed schemes are analyzed. Finally, the effectiveness of the proposed schemes are demonstrated by numerical results with different system parameters.
引用
收藏
页码:4208 / 4219
页数:12
相关论文
共 46 条
[11]  
Boyd L., 2004, CONVEX OPTIMIZATION
[12]   Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers [J].
Chu, Zheng ;
Xing, Hong ;
Johnston, Martin ;
Le Goff, Stephane .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :283-297
[13]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane Y. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) :1833-1847
[14]   Integration of satellite and terrestrial systems in future multimedia communications [J].
Evans, B ;
Werner, M ;
Lutz, E ;
Bousquet, M ;
Corazza, GE ;
Maral, G ;
Rumeau, R ;
Ferro, E .
IEEE WIRELESS COMMUNICATIONS, 2005, 12 (05) :72-80
[15]  
Gharanjik A, 2015, INT CONF ACOUST SPEE, P3083, DOI 10.1109/ICASSP.2015.7178538
[16]   BROADBAND HYBRID SATELLITE-TERRESTRIAL COMMUNICATION SYSTEMS BASED ON COGNITIVE RADIO TOWARD 5G [J].
Jia, Min ;
Gu, Xuemai ;
Guo, Qing ;
Xiang, Wei ;
Zhang, Naitong .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (06) :96-106
[17]   Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security [J].
Kalantari, Ashkan ;
Soltanalian, Mojtaba ;
Maleki, Sina ;
Chatzinotas, Symeon ;
Ottersten, Bjorn .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1478-1493
[18]   Joint Power Control in Wiretap Interference Channels [J].
Kalantari, Ashkan ;
Maleki, Sina ;
Zheng, Gan ;
Chatzinotas, Symeon ;
Ottersten, Bjoern .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (07) :3810-3823
[19]   Prospects and Challenges of Context-Aware Multimedia Content Delivery in Cooperative Satellite and Terrestrial Networks [J].
Kawamoto, Yuichi ;
Fadlullah, Zubair Md ;
Nishiyama, Hiroki ;
Kato, Nei ;
Toyoshima, Morio .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (06) :55-61
[20]   Probabilistically Robust SWIPT for Secrecy MISOME Systems [J].
Khandaker, Muhammad R. A. ;
Wong, Kai-Kit ;
Zhang, Yangyang ;
Zheng, Zhongbin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) :211-226