Skip to main content
Top
Published in: Wireless Personal Communications 4/2015

01-12-2015

Secure Communication in Amplify-and-Forward Networks with Multiple Eavesdroppers: Decoding with SNR Thresholds

Authors: Siddhartha Sarma, Samar Agnihotri, Joy Kuri

Published in: Wireless Personal Communications | Issue 4/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The problem of secure unicast communication over a two hop Amplify-and-Forward wireless relay network with multiple eavesdroppers is considered. Assuming that a receiver (destination or eavesdropper) can decode a message only if the received SNR is above a predefined threshold, we consider this problem in two scenarios. In the first scenario, we maximize the SNR at the legitimate destination, subject to the condition that the received SNR at each eavesdropper is below the target threshold. Due to the non-convex nature of the objective function and eavesdroppers’ constraints, we transform variables and obtain a quadratically constrained quadratic program (QCQP) with convex constraints, which can be solved efficiently. When the constraints are not convex, we consider a semidefinite relaxation (SDR) to obtain computationally efficient approximate solution. In the second scenario, we minimize the total power consumed by all relay nodes, subject to the condition that the received SNR at the legitimate destination is above the threshold and at every eavesdropper, it is below the corresponding threshold. We propose a semidefinite relaxation of the problem in this scenario and also provide an analytical lower bound.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For general non-layered networks, such logarithmic dependence may not hold due to intersymbol interference [9].
 
Literature
1.
go back to reference Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press.CrossRef Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press.CrossRef
2.
go back to reference Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRefMATH Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRefMATH
3.
go back to reference Lai, L., & El Gamal, H. (2007). Cooperative secrecy: The relay-eavesdropper channel. In IEEE international symposium on information theory (ISIT) (pp. 931–935). Lai, L., & El Gamal, H. (2007). Cooperative secrecy: The relay-eavesdropper channel. In IEEE international symposium on information theory (ISIT) (pp. 931–935).
4.
go back to reference Dong, L., Han, Z., Petropulu, A., & Poor, H. (2009). Amplify-and-forward based cooperation for secure wireless communications. In IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 2613–2616 Dong, L., Han, Z., Petropulu, A., & Poor, H. (2009). Amplify-and-forward based cooperation for secure wireless communications. In IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 2613–2616
5.
go back to reference Zhang, J., & Gursoy, M. (2010). Relay beamforming strategies for physical-layer security. In 44th annual conference on information sciences and systems (CISS), pp. 1–6 Zhang, J., & Gursoy, M. (2010). Relay beamforming strategies for physical-layer security. In 44th annual conference on information sciences and systems (CISS), pp. 1–6
6.
go back to reference Yang, Y., Li, Q., Ma, W. K., Ge, J., & Ching, P. (2013). Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Processing Letters, 20(1), 35–38.CrossRef Yang, Y., Li, Q., Ma, W. K., Ge, J., & Ching, P. (2013). Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Processing Letters, 20(1), 35–38.CrossRef
8.
go back to reference He, S., Luo, Z. Q., Nie, J., & Zhang, S. (2008). Semidefinite relaxation bounds for indefinite homogeneous quadratic optimization. SIAM Journal on Optimization, 19(2), 503–523.MathSciNetCrossRefMATH He, S., Luo, Z. Q., Nie, J., & Zhang, S. (2008). Semidefinite relaxation bounds for indefinite homogeneous quadratic optimization. SIAM Journal on Optimization, 19(2), 503–523.MathSciNetCrossRefMATH
9.
go back to reference Agnihotri, S., Jaggi, S., & Chen, M. (2011). Amplify-and-forward in wireless relay networks. In IEEE information theory workshop (ITW) (pp. 311–315). Agnihotri, S., Jaggi, S., & Chen, M. (2011). Amplify-and-forward in wireless relay networks. In IEEE information theory workshop (ITW) (pp. 311–315).
10.
go back to reference Zhao, Y., Adve, R., & Lim, T. J. (2006). Improving amplify-and-forward relay networks: Optimal power allocation versus selection. In IEEE international symposium on information theory (ISIT) (pp. 1234–1238). Zhao, Y., Adve, R., & Lim, T. J. (2006). Improving amplify-and-forward relay networks: Optimal power allocation versus selection. In IEEE international symposium on information theory (ISIT) (pp. 1234–1238).
11.
go back to reference Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.MathSciNetCrossRef Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.MathSciNetCrossRef
12.
go back to reference Swindlehurst, A. (2009). Fixed SINR solutions for the MIMO wiretap channel. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2437–2440). Swindlehurst, A. (2009). Fixed SINR solutions for the MIMO wiretap channel. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2437–2440).
13.
go back to reference Liao, W. C., Chang, T. H., Ma, W. K., & Chi, C. Y. (2011). QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Transactions on Signal Processing, 59(3), 1202–1216.MathSciNetCrossRef Liao, W. C., Chang, T. H., Ma, W. K., & Chi, C. Y. (2011). QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Transactions on Signal Processing, 59(3), 1202–1216.MathSciNetCrossRef
14.
go back to reference Qian, L. P., Zhang, Y., & Huang, J. (2009). MAPEL: Achieving global optimality for a non-convex wireless power control problem. IEEE Transactions on Wireless Communications, 8(3), 1553–1563.CrossRef Qian, L. P., Zhang, Y., & Huang, J. (2009). MAPEL: Achieving global optimality for a non-convex wireless power control problem. IEEE Transactions on Wireless Communications, 8(3), 1553–1563.CrossRef
15.
go back to reference Wang, H. M., Luo, M., Xia, X. G., & Yin, Q. (2013). Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI. IEEE Signal Processing Letters, 20(1), 39–42.CrossRef Wang, H. M., Luo, M., Xia, X. G., & Yin, Q. (2013). Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI. IEEE Signal Processing Letters, 20(1), 39–42.CrossRef
16.
go back to reference Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S. D., Polishchuk, V., Ramasubramanian, S., et al. (2012). Optimization schemes for protective jamming. In Proceedings of the 13th ACM international symposium on mobile ad hoc networking and computing (pp. 65–74). Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S. D., Polishchuk, V., Ramasubramanian, S., et al. (2012). Optimization schemes for protective jamming. In Proceedings of the 13th ACM international symposium on mobile ad hoc networking and computing (pp. 65–74).
17.
go back to reference Sarma, S., Shukla, S., & Kuri, J. (2013). Joint scheduling and jamming for data secrecy in wireless networks. In 11th international symposium on modeling optimization in mobile, ad hoc wireless networks (WiOpt) (pp. 248–255). Sarma, S., Shukla, S., & Kuri, J. (2013). Joint scheduling and jamming for data secrecy in wireless networks. In 11th international symposium on modeling optimization in mobile, ad hoc wireless networks (WiOpt) (pp. 248–255).
18.
go back to reference Hiriart-Urruty, J. B. (2001). Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints. Journal of Global Optimization, 21(4), 443–453.MathSciNetCrossRefMATH Hiriart-Urruty, J. B. (2001). Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints. Journal of Global Optimization, 21(4), 443–453.MathSciNetCrossRefMATH
19.
go back to reference Sagnol, G. (2011). A class of semidefinite programs with rank-one solutions. Linear Algebra and its Applications, 435(6), 1446–1463.MathSciNetCrossRefMATH Sagnol, G. (2011). A class of semidefinite programs with rank-one solutions. Linear Algebra and its Applications, 435(6), 1446–1463.MathSciNetCrossRefMATH
20.
go back to reference Qualizza, A., Belotti, P., & Margot, F. (2012). Linear programming relaxations of quadratically constrained quadratic programs. In J. Lee & S. Leyffer (Eds.), Mixed integer nonlinear programming. IMA volumes in mathematics and its applications (Vol. 154, pp. 407–426). New York: Springer.CrossRef Qualizza, A., Belotti, P., & Margot, F. (2012). Linear programming relaxations of quadratically constrained quadratic programs. In J. Lee & S. Leyffer (Eds.), Mixed integer nonlinear programming. IMA volumes in mathematics and its applications (Vol. 154, pp. 407–426). New York: Springer.CrossRef
21.
go back to reference Luo, Z. Q., Ma, W. K., So, A. C., Ye, Y., & Zhang, S. (2010). Semidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27(3), 20–34.CrossRef Luo, Z. Q., Ma, W. K., So, A. C., Ye, Y., & Zhang, S. (2010). Semidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27(3), 20–34.CrossRef
22.
go back to reference Horn, R. A., & Johnson, C. R. (Eds.). (1986). Matrix analysis. New York, NY: Cambridge University Press. Horn, R. A., & Johnson, C. R. (Eds.). (1986). Matrix analysis. New York, NY: Cambridge University Press.
23.
go back to reference Lofberg, J. (2004). YALMIP: A toolbox for modeling and optimization in MATLAB. In IEEE international symposium on computer aided control systems design (pp. 284–289). Lofberg, J. (2004). YALMIP: A toolbox for modeling and optimization in MATLAB. In IEEE international symposium on computer aided control systems design (pp. 284–289).
Metadata
Title
Secure Communication in Amplify-and-Forward Networks with Multiple Eavesdroppers: Decoding with SNR Thresholds
Authors
Siddhartha Sarma
Samar Agnihotri
Joy Kuri
Publication date
01-12-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2881-5

Other articles of this Issue 4/2015

Wireless Personal Communications 4/2015 Go to the issue