Skip to main content

Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

  • 3629 Accesses

Abstract

In this paper, a secure cooperative beamforming and artificial noise design scheme is developed for multi-pair two-way relay networks. We derive the secrecy sum rate for multi-pair two-way relaying, where each communication pair exchanges information through multiple friendly and cooperating relays while under the interception of multiple passive eavesdroppers. We formulate the secrecy sum rate maximization problem and show its non-convexity. We then propose a beamforming and artificial noise design scheme by transforming this problem into a series of convex problems by a tight semidefinite relaxation (SDR) and Taylor approximation. Simulations show that the proposed method converges fast with a high secure sum rate.

G. Li – This work was supported by the National Natural Science Foundation of China under Grant No. 61401350, 61102079 and the National 863 Program of China under Grant No. 2014AA01A707.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohapatra, P., Li, J., Gui, C.: QoS in mobile ad hoc networks. IEEE Wirel. Commun. 10(3), 44–53 (2003)

    Article  Google Scholar 

  2. Du, Q., Zhang, X.: QoS-aware base-station selections for distributed MIMO links in broadband wireless networks. IEEE J. Sel. Area Commun. 29(6), 1123–1138 (2011)

    Article  Google Scholar 

  3. Wang, Y., Ren, P., Gao, F., Su, Z.: A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical Quality-of-Service provisioning. IEEE Trans. Wirel. Commun. 13(3), 1482–1498 (2014)

    Article  Google Scholar 

  4. Du, Q., Zhang, X.: Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams. IEEE J. Sel. Area Comm. 28(3), 420–433 (2010)

    Article  Google Scholar 

  5. Khan, S., Pathan, A.S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends[M]. Springer Science and Business Media (2013)

    Google Scholar 

  6. Dong, L., Han, Z., Petropulu, A.P., et al.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)

    Article  MathSciNet  Google Scholar 

  7. Wang, H.-M., Yin, Q., Xia, X.-G.: Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Wirel. Commun. PP(99), 1 (2014)

    Article  Google Scholar 

  8. Wang, C., Wang, H.-M.: Robust joint beamforming and jamming for secure AF networks: low complexity design. IEEE Trans. Veh. Technol. PP(99), 1 (2014)

    Google Scholar 

  9. Yang, Y., Li, Q., Ma, W.-K., Ge, J., Ching, P.C.: Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 20(1), 35–38 (2013)

    Article  Google Scholar 

  10. Sun, L., Zhang, T., Li, Y., Niu, H.: Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Trans. Veh. Technol. 61(8), 3801–3807 (2012)

    Article  Google Scholar 

  11. Wang, H.-M., Yin, Q., Xia, X.-G.: Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process. 60(7), 3532–3545 (2012)

    Article  MathSciNet  Google Scholar 

  12. Yang, Y., Sun, C., Zhao, H., et al.: Algorithms for secrecy guarantee with null space beamforming in two-way relay networks. IEEE Trans. Signal Process. 62(8), 2111–2126 (2014)

    Article  MathSciNet  Google Scholar 

  13. Lin, M., Ge, J., Yang, Y., et al.: Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks. IEEE Commun. Lett. 18(2), 1–4 (2014)

    Article  Google Scholar 

  14. Long, H., Wei, X., Zhang, X., Wang, J., Wang, W.: Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node. In: Proceedings, pp. 1–4. IEEE URSI GASS, Beijing, Aug. 2014

    Google Scholar 

  15. Wang, A., Cai, Y., Guan, X., Wang, S.: Physical layer security for multiuser two-way relay using distributed auction game. In: Proceedings, pp. 1202–1207. IEEE ICIST, Yangzhou, Mar. 2013

    Google Scholar 

  16. Luo, Z.-Q., Ma, W.-K., So, A.M.-C., et al.: Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20–34 (2010)

    Article  Google Scholar 

  17. Grant, M.C., Boyd, S.P.: The CVX Users Guide Release 2.0 (beta). CVX Research Inc, Mar. 2013

    Google Scholar 

  18. Zhang, Y., Li, G., Du, Q., et al.: High-Rate Cooperative Beamforming for Physical Layer Security in Wireless Cyber-Physical Systems. IEEE ICC2015 workshop 22, to appear

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guobing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, Y., Li, G., Zhang, G., Lyu, G. (2015). Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_72

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics