Skip to main content

2018 | OriginalPaper | Buchkapitel

A DC Programming Approach for Worst-Case Secrecy Rate Maximization Problem

verfasst von : Phuong Anh Nguyen, Hoai An Le Thi

Erschienen in: Computational Collective Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper is concerned with the problem of secure transmission for amplify-and-forward multi-antenna relay systems in the presence of multiple eavesdroppers. Specifically, spatial beamforming and artificial noise broadcasting are chosen as the strategy for secure transmission with robustness against imperfect channel state information of the intended receiver and the eavesdroppers. In such a scenario, the objective is to maximize the worst-case secrecy rate while guaranteeing the transmit power constraint at the relay and the norm-bounded channel uncertainty. We reformulate the problem as a general DC (Difference-of-Convex functions) program (i.e. minimizing a DC function under DC constraints) and develop a very inexpensive DCA based algorithm for solving it. Numerical results illustrate the effectiveness of the proposed algorithm and its superiority versus the existing approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Ruppp, A., Schimmler, M.: How to break DES for euro 8,980. In: Workshop on Special purpose Hardware for Attacking Cryptographic Systems – SHARCS 2006, Colgne, Germany (2006) Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Ruppp, A., Schimmler, M.: How to break DES for euro 8,980. In: Workshop on Special purpose Hardware for Attacking Cryptographic Systems – SHARCS 2006, Colgne, Germany (2006)
2.
Zurück zum Zitat Li, Q., Song, H., Huang, K.: Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels. IEEE Commun. Lett. 17(5), 892–895 (2013)CrossRef Li, Q., Song, H., Huang, K.: Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels. IEEE Commun. Lett. 17(5), 892–895 (2013)CrossRef
4.
Zurück zum Zitat Leung-Yan-Cheong, S., Hellman, M.E.: The Gaussian wiretap channel. IEEE Trans. Inf. Theory 24(7), 451–456 (1978)CrossRef Leung-Yan-Cheong, S., Hellman, M.E.: The Gaussian wiretap channel. IEEE Trans. Inf. Theory 24(7), 451–456 (1978)CrossRef
5.
Zurück zum Zitat Zou, Y., Wang, X., Shen, W.: Eavesdropping attack in collaborative wireless networks: security protocols and intercept behavior. In: Proceedings of the 17th IEEE International Conference on Computer Supported Cooperative Work in Design, Whistler, Canada, pp. 704–709 (2013) Zou, Y., Wang, X., Shen, W.: Eavesdropping attack in collaborative wireless networks: security protocols and intercept behavior. In: Proceedings of the 17th IEEE International Conference on Computer Supported Cooperative Work in Design, Whistler, Canada, pp. 704–709 (2013)
6.
Zurück zum Zitat Zhang, J., Gursoy, M.: Collaborative relay beamforming for secrecy. In: Proceedings of the IEEE Wireless Communication Symposium (ICC), Cape Town, South Africa, pp. 1–5 (2010) Zhang, J., Gursoy, M.: Collaborative relay beamforming for secrecy. In: Proceedings of the IEEE Wireless Communication Symposium (ICC), Cape Town, South Africa, pp. 1–5 (2010)
7.
Zurück zum Zitat Jeong, C., Kim, I., Dong, K.: Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Trans. Signal Process. 60(1), 310–325 (2012)MathSciNetCrossRef Jeong, C., Kim, I., Dong, K.: Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Trans. Signal Process. 60(1), 310–325 (2012)MathSciNetCrossRef
8.
Zurück zum Zitat Mukherjee, A., Swindlehurst, A.: Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Trans. Signal Process. 59(1), 351–361 (2011)MathSciNetCrossRef Mukherjee, A., Swindlehurst, A.: Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Trans. Signal Process. 59(1), 351–361 (2011)MathSciNetCrossRef
9.
Zurück zum Zitat Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE. Trans. Wireless Commun. 7(6), 2180–2189 (2008)CrossRef Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE. Trans. Wireless Commun. 7(6), 2180–2189 (2008)CrossRef
10.
Zurück zum Zitat Li, Q., Yang, Y., Ma, W.K., Lin, M., Ge, J., Lin, J.: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 63(1), 206–220 (2015)MathSciNetCrossRef Li, Q., Yang, Y., Ma, W.K., Lin, M., Ge, J., Lin, J.: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 63(1), 206–220 (2015)MathSciNetCrossRef
11.
Zurück zum Zitat Zhang, C., Gao, H., Liu, H., Lv, T.: Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers. In: IEEE Military Communications Conference (MILCOM), pp. 495–500 (2014) Zhang, C., Gao, H., Liu, H., Lv, T.: Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers. In: IEEE Military Communications Conference (MILCOM), pp. 495–500 (2014)
12.
Zurück zum Zitat Zhang, L., Jin, L., Luo, W., Tang, Y., Yu, D.: Robust joint beamforming and artificial noise design for amplify-and-forward multi-antenna relay systems. In: IEEE Speech and Signal Processing (ICASSP), pp. 1732–1736 (2015) Zhang, L., Jin, L., Luo, W., Tang, Y., Yu, D.: Robust joint beamforming and artificial noise design for amplify-and-forward multi-antenna relay systems. In: IEEE Speech and Signal Processing (ICASSP), pp. 1732–1736 (2015)
13.
Zurück zum Zitat Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Mathematica Vietnamica 22, 289–355 (1997)MathSciNetMATH Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Mathematica Vietnamica 22, 289–355 (1997)MathSciNetMATH
14.
Zurück zum Zitat Pham Dinh, T., Le Thi, H.A.: DC optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8, 476–505 (1998)MathSciNetCrossRef Pham Dinh, T., Le Thi, H.A.: DC optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8, 476–505 (1998)MathSciNetCrossRef
15.
Zurück zum Zitat Pham Dinh, T., Le Thi, H.A.: The DC (difference of convex functions) programming and DCA revisited with DC models of real world non convex optimization problems. Ann. Oper. Res. 133, 23–46 (2005)MathSciNetCrossRef Pham Dinh, T., Le Thi, H.A.: The DC (difference of convex functions) programming and DCA revisited with DC models of real world non convex optimization problems. Ann. Oper. Res. 133, 23–46 (2005)MathSciNetCrossRef
16.
Zurück zum Zitat Le Thi, H.A., Huynh, V.N., Pham Dinh, T.: DC Programming and DCA for General DC Programs. In: van Do T., Thi H., Nguyen N. (eds) Advanced Computational Methods for Knowledge Engineering. Advances in Intelligent Systems and Computing, pp. 15–35 (2014) Le Thi, H.A., Huynh, V.N., Pham Dinh, T.: DC Programming and DCA for General DC Programs. In: van Do T., Thi H., Nguyen N. (eds) Advanced Computational Methods for Knowledge Engineering. Advances in Intelligent Systems and Computing, pp. 15–35 (2014)
17.
Zurück zum Zitat Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. Trans. Comput. Intell. 13, 1–37 (2014) Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. Trans. Comput. Intell. 13, 1–37 (2014)
18.
Zurück zum Zitat Le Thi, H.A., Pham Dinh, T.: DC programming and DCA: thirty years of developments. Math. Program. 169(1), 5–68 (2018). Special Issue: DC Programming - Theory, Algorithms and ApplicationsMathSciNetCrossRef Le Thi, H.A., Pham Dinh, T.: DC programming and DCA: thirty years of developments. Math. Program. 169(1), 5–68 (2018). Special Issue: DC Programming - Theory, Algorithms and ApplicationsMathSciNetCrossRef
Metadaten
Titel
A DC Programming Approach for Worst-Case Secrecy Rate Maximization Problem
verfasst von
Phuong Anh Nguyen
Hoai An Le Thi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-98443-8_38