DC programming and DCA for enhancing physical layer security via cooperative jamming

被引:5
作者
Thi Thuy Tran [1 ,2 ,3 ]
Hoai An Le Thi [3 ]
Tao Pham Dinh [4 ]
机构
[1] Ton Duc Thang Univ, Dept Management Sci & Technol Dev, Ho Chi Minh City, Vietnam
[2] Ton Duc Thang Univ, Fac Math & Stat, Ho Chi Minh City, Vietnam
[3] Univ Lorraine, Lab Theoret & Appl Comp Sci EA 3097, F-57045 Metz 01, France
[4] Univ Normandie, Lab Math, INSA Rouen, F-76801 St Etienne Du Rouvray, France
关键词
Physical layer security; Cooperative jamming; Resource allocation; DC programming and DCA; ALLOCATION;
D O I
10.1016/j.cor.2016.11.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The explosive development of computational tools these days is threatening security of cryptographic algorithms, which are regarded as primary traditional methods for ensuring information security. The physical layer security approach is introduced as a method for both improving confidentiality of the secret key distribution in cryptography and enabling the data transmission without relaying on higher-layer encryption. In this paper, the cooperative jamming paradigm - one of the techniques used in the physical layer is studied and the resulting power allocation problem with the aim of maximizing the sum of secrecy rates subject to power constraints is formulated as a nonconvex optimization problem. The objective function is a so-called DC (Difference of Convex functions) function, and some constraints are coupling. We propose a new DC formulation and develop an efficient DCA (DC Algorithm) to deal with this nonconvex program. The DCA introduces the elegant concept of approximating the original non convex program by a sequence of convex ones: at each iteration of DCA requires solution of a convex subproblem. The main advantage of the proposed approach is that it leads to strongly convex quadratic subproblems with separate variables in the objective function, which can be tackled by both distributed and centralized methods. One of the major contributions of the paper is to develop a highly efficient distributed algorithm to solve the convex subproblem. We adopt the dual decomposition method that results in computing iteratively the projection of points onto a very simple structural set which can be determined by an inexpensive procedure. The numerical results show the efficiency and the superiority of the new DCA based algorithm compared with existing approaches. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:235 / 244
页数:10
相关论文
共 42 条
  • [1] Achieving the Maximum Sum Rate Using DC Programming in Cellular Networks
    Al-Shatri, Hussein
    Weber, Tobias
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (03) : 1331 - 1341
  • [2] A New Decomposition Method for Multiuser DC-Programming and Its Applications
    Alvarado, Alberth
    Scutari, Gesualdo
    Pang, Jong-Shi
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (11) : 2984 - 2998
  • [3] The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems
    An, LTH
    Tao, PD
    [J]. ANNALS OF OPERATIONS RESEARCH, 2005, 133 (1-4) : 23 - 46
  • [4] SOLVING PARTITIONING-HUB LOCATION-ROUTING PROBLEM USING DCA
    Anh Son Ta
    Hoai An Le Thi
    Khadraoui, Djamel
    Tao Pham Dinh
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2012, 8 (01) : 87 - 102
  • [5] [Anonymous], 1997, ACTA MATH VIETNAM
  • [6] [Anonymous], 1998, SIAM J OPTIMIZ
  • [7] Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures
    Barenghi, Alessandro
    Breveglieri, Luca
    Koren, Israel
    Naccache, David
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (11) : 3056 - 3076
  • [8] An O(1/k) Gradient Method for Network Resource Allocation Problems
    Beck, Amir
    Nedic, Angelia
    Ozdaglar, Asuman
    Teboulle, Marc
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2014, 1 (01): : 64 - 73
  • [9] The NEOS Server
    Czyzyk, J
    Mesnier, MP
    More, JJ
    [J]. IEEE COMPUTATIONAL SCIENCE & ENGINEERING, 1998, 5 (03): : 68 - 75
  • [10] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888