Skip to main content
Top
Published in: Wireless Personal Communications 3/2018

16-04-2018

Optimal Power Allocation in an Amplify-and-Forward Untrusted Relay Network with Imperfect Channel State Information

Authors: Tamer Mekkawy, Rugui Yao, Fei Xu, Ling Wang

Published in: Wireless Personal Communications | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The characteristics of the wireless medium create difficulty to shield the data transmission from unauthorized recipients. In this paper, power optimization in an amplify-and-forward untrusted relay network is presented, using cooperative jamming transmission to prevent the untrusted relay from intercepting the confidential signals. Considering imperfect channel estimation error at the destination, an optimal power allocation (OPA) is designed to maximize the achievable secrecy rate for the network. Simplified OPA is derived for high signal-to-noise ratio regime with imperfect CSI and the ergodic secrecy rate is also analyzed to evaluate the achievable average secrecy rate for different scenarios as a common performance metric. The numerical results show that when the error of CSI is considered, the proposed OPA generates limited and acceptable degradation on the secrecy rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhao, N., Yu, F. R., Li, M., & Yan, Q. (2016). Physical layer security issues in interference-alignment-based wireless networks. IEEE Communications Magazine, 54, 162–168.CrossRef Zhao, N., Yu, F. R., Li, M., & Yan, Q. (2016). Physical layer security issues in interference-alignment-based wireless networks. IEEE Communications Magazine, 54, 162–168.CrossRef
2.
go back to reference Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180–2189.CrossRef Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180–2189.CrossRef
3.
go back to reference Wang, H. M., Zheng, T., & Xia, X. G. (2015). Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise versus artificial fast fading. IEEE Transactions on Wireless Communications, 14, 94–106.CrossRef Wang, H. M., Zheng, T., & Xia, X. G. (2015). Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise versus artificial fast fading. IEEE Transactions on Wireless Communications, 14, 94–106.CrossRef
4.
go back to reference Yao, R., Liu, Y., Lu, L., & Li, G. (2016). Cooperative precoding for cognitive transmission in two-tier networks. IEEE Transactions on Communications, 64, 1423–1436.CrossRef Yao, R., Liu, Y., Lu, L., & Li, G. (2016). Cooperative precoding for cognitive transmission in two-tier networks. IEEE Transactions on Communications, 64, 1423–1436.CrossRef
5.
go back to reference Yao, R., Xu, J., Li, G., & Wang, L. (2016). Optimized BD-ZF precoder for multiuser MIMO–VFDM cognitive transmission. ETRI Journal, 38, 291–301.CrossRef Yao, R., Xu, J., Li, G., & Wang, L. (2016). Optimized BD-ZF precoder for multiuser MIMO–VFDM cognitive transmission. ETRI Journal, 38, 291–301.CrossRef
6.
go back to reference Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875–1888.MathSciNetCrossRef Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875–1888.MathSciNetCrossRef
7.
go back to reference Li, J., Petropulu, A. P., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing, 59, 4985–4997.MathSciNetCrossRef Li, J., Petropulu, A. P., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing, 59, 4985–4997.MathSciNetCrossRef
8.
go back to reference Wang, C., Wang, H. M., & Xia, X. G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14, 589–605.CrossRef Wang, C., Wang, H. M., & Xia, X. G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14, 589–605.CrossRef
9.
go back to reference Nguyen, S. Q., & Kong, H. Y. (2017). Secrecy enhancement in two-hop DF relaying system under hardware impairment. International Journal of Electronics, 104, 442–461.CrossRef Nguyen, S. Q., & Kong, H. Y. (2017). Secrecy enhancement in two-hop DF relaying system under hardware impairment. International Journal of Electronics, 104, 442–461.CrossRef
10.
go back to reference Zhou, N., Chen, X., Li, C., & Xue, Z. (2014). Secrecy rate of two-hop AF relaying networks with an untrusted relay. Wireless Personal Communications, 75, 119–129.CrossRef Zhou, N., Chen, X., Li, C., & Xue, Z. (2014). Secrecy rate of two-hop AF relaying networks with an untrusted relay. Wireless Personal Communications, 75, 119–129.CrossRef
11.
go back to reference He, X., & Yener, A. (2009). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56, 3807–3827.MathSciNetCrossRefMATH He, X., & Yener, A. (2009). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56, 3807–3827.MathSciNetCrossRefMATH
12.
go back to reference Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61, 3693–3704.CrossRef Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61, 3693–3704.CrossRef
13.
go back to reference Mo, J., Tao, M., Liu, Y., & Wang, R. (2013). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62, 2185–2199.MathSciNetCrossRef Mo, J., Tao, M., Liu, Y., & Wang, R. (2013). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62, 2185–2199.MathSciNetCrossRef
14.
go back to reference El-Bardan, R., Brahma, S., & Varshney, P. K. (2016). Strategic power allocation with incomplete information in the presence of a jammer. IEEE Transactions on Communications, 64, 3467–3479.CrossRef El-Bardan, R., Brahma, S., & Varshney, P. K. (2016). Strategic power allocation with incomplete information in the presence of a jammer. IEEE Transactions on Communications, 64, 3467–3479.CrossRef
15.
go back to reference Taki, M., & Sadeghi, M. (2016). Optimised secure transmission through untrusted AF relays using link adaptation. International Journal of Electronics, 103, 831–840. Taki, M., & Sadeghi, M. (2016). Optimised secure transmission through untrusted AF relays using link adaptation. International Journal of Electronics, 103, 831–840.
16.
go back to reference Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61, 3801–3807.CrossRef Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61, 3801–3807.CrossRef
17.
go back to reference Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3, 289–292.CrossRef Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3, 289–292.CrossRef
18.
go back to reference Khattabi, Y. & Matalgah, M. M. (2015). Conventional and best-relay-selection cooperative protocols under nodes-mobility and imperfect-CSI impacts: BER performance. In Proceedings of IEEE wireless communications and networking conference (WCNC2015) (pp. 105–110). Khattabi, Y. & Matalgah, M. M. (2015). Conventional and best-relay-selection cooperative protocols under nodes-mobility and imperfect-CSI impacts: BER performance. In Proceedings of IEEE wireless communications and networking conference (WCNC2015) (pp. 105–110).
19.
go back to reference Salari, S., Amirani, M. Z., Kim, I.-M., Kim, D. I., & Yang, J. (2016). Distributed beamforming in two-way relay networks with interference and imperfect CSI. IEEE Transactions on Wireless Communications, 15, 4455–4469.CrossRef Salari, S., Amirani, M. Z., Kim, I.-M., Kim, D. I., & Yang, J. (2016). Distributed beamforming in two-way relay networks with interference and imperfect CSI. IEEE Transactions on Wireless Communications, 15, 4455–4469.CrossRef
20.
go back to reference Bletsas, A., Shin, H., & Win, M. Z. (2007). Cooperative communications with outage-optimal opportunistic relaying. IEEE Transactions on Wireless Communications, 6, 3450–3460.CrossRef Bletsas, A., Shin, H., & Win, M. Z. (2007). Cooperative communications with outage-optimal opportunistic relaying. IEEE Transactions on Wireless Communications, 6, 3450–3460.CrossRef
21.
go back to reference Jeffrey, A., & Zwillinger, D. (2007). Table of integrals, series, and products. Cambridge, MA: Academic Press. Jeffrey, A., & Zwillinger, D. (2007). Table of integrals, series, and products. Cambridge, MA: Academic Press.
Metadata
Title
Optimal Power Allocation in an Amplify-and-Forward Untrusted Relay Network with Imperfect Channel State Information
Authors
Tamer Mekkawy
Rugui Yao
Fei Xu
Ling Wang
Publication date
16-04-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5762-x

Other articles of this Issue 3/2018

Wireless Personal Communications 3/2018 Go to the issue