Skip to main content

Physical Layer Security Cognitive Decode-and-Forward Relay Beamforming Network with Multiple Eavesdroppers

  • Conference paper
  • First Online:
Intelligent Information and Database Systems (ACIIDS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11432))

Included in the following conference series:

  • 1937 Accesses

Abstract

Physical layer security (PLS) approach for wireless communication can prevent eavesdropping without upper layer data encryption. In this paper, we consider the transmission of confidential message over wireless channel with the help of multiple cooperating relays in the Decode-and-Forward cooperative scheme. Based on an information-theoretic formulation of problem we take into account a wireless network system, in which an one-way relay wireless system including a source, a legitimate destination, multiple trusted relays and multiple eavesdroppers. For decode-and-forward beamforming protocol in the presence of one eavesdropper, the closed-form optimal solution is derived for the relay weights. For another case, when the communication system has the presence of multiple eavesdroppers, it becomes more difficult to find the optimal solution of the secrecy rate maximization problem. Hence, there are several criteria were considered leading to a suboptimal but simple solution. Specifically, nulling out the message signals completely at all eavesdroppers results in a simpler form of this problem and a suboptimal solution is explicitly obtained. In this paper, we propose a new approach based on the well known method, DC programming and DCA to solve the original problem, without considering any additional constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wyner, A.D.: The Wire-tap channel. Bell Sys. Tech. J. 54, 1355–1387 (1975)

    Article  MathSciNet  Google Scholar 

  2. Csiszar, I., Korner, J.: The broadcast channels with confidential messages. IEEE Trans. Inf. Thoery IT–24(3), 339–348 (1978)

    Article  MathSciNet  Google Scholar 

  3. Leung-Yan-Cheong, S.K., Hellman, M.E.: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory IT–24, 451–456 (1978)

    Article  MathSciNet  Google Scholar 

  4. Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16, 1550–1573 (2014)

    Article  Google Scholar 

  5. Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Math. Vietnamica 22, 289–357 (1997)

    MathSciNet  MATH  Google Scholar 

  6. Pham Dinh, T., Le Thi, H.A.: Optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8, 476–505 (1998)

    Article  MathSciNet  Google Scholar 

  7. Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Nguyen, N.-T., Le-Thi, H.A. (eds.) Transactions on CCI XIII. LNCS, vol. 8342, pp. 1–37. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54455-2_1

    Chapter  Google Scholar 

  8. Tuan, N.N., Son, D.V.: DC programming and DCA for Enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. In: Le, N.-T., Van Do, T., Nguyen, N.T., Thi, H.A.L. (eds.) ICCSAMA 2017. AISC, vol. 629, pp. 23–33. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61911-8_3

    Chapter  Google Scholar 

  9. Le Thi, H.A.: DC Programming and DCA. http://www.lita.univ-lorraine.fr/lethi/

  10. Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)

    Article  MathSciNet  Google Scholar 

  11. Vishwakarma, S., Chockalingam, A.: Decode-and-Forward relay beamforming for security with finite-alphabet input. IEEE Commun. Lett. 17(5), 912–915 (2013)

    Article  Google Scholar 

  12. Thuy, T.T., Tuan, N.N., An, L.T.H., Gély, A.: DC programming and DCA for enhancing physical layer security via relay beamforming strategies. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, T.-P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9622, pp. 640–650. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49390-8_62

    Chapter  Google Scholar 

Download references

Acknowledgements

We would like to thank Prof. Hoai An Le Thi, The director of LITA, University of Lorraine, France for helping us do research in this field. We also thank the referees for leading us to improve the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nguyen Nhu Tuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tuan, N.N., Thuy, T.T. (2019). Physical Layer Security Cognitive Decode-and-Forward Relay Beamforming Network with Multiple Eavesdroppers. In: Nguyen, N., Gaol, F., Hong, TP., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2019. Lecture Notes in Computer Science(), vol 11432. Springer, Cham. https://doi.org/10.1007/978-3-030-14802-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14802-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14801-0

  • Online ISBN: 978-3-030-14802-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics