Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2016

Open Access 01.12.2016 | Research

Robust beamforming and cooperative jamming for secure transmission in DF relay systems

verfasst von: Bin Li, Zesong Fei

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2016

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we study robust joint beamforming and cooperative jamming (CJ) in a secure decode-and-forward (DF) relay system in the presence of multiple eavesdroppers, in which a multi-antenna DF relay employs transmit beamforming to help the source deliver information to the destination and simultaneously generates Gaussian artificial noise to confuse these eavesdroppers. We assume that all the channel state information (CSI) is imperfectly known at the relay subject to norm-bounded CSI errors. Our objective is to maximize the achievable secrecy rate at the destination by jointly optimizing the transmit beamforming vector of information signals and the covariance matrix of jamming signals at the relay subject to its total transmit power constraint. Although this problem is non-convex and in general difficult to be solved, we obtain its optimal solution via the technique of semi-definite relaxation (SDR) together with a one-dimensional (1-D) search. Specifically, we prove that the SDR is tight for the problem of our interest. Finally, numerical results are provided to validate our proposed scheme.
Hinweise

Competing interests

The authors declare that they have no competing interests.

1 Introduction

Secure wireless transmissions have drawn significant attention due to the broadcast nature of radio propagation and the inherent openness of the transmission medium. In addition to the traditional encryption techniques, physical layer security has been recognized as a prominent technique to realize secure communication by exploiting wireless channel fading (see, e.g., [13]). Recently, the introduction of relay into physical layer security has attracted a lot of research interest as a promising solution to improve transmission security through cooperative diversity [4, 5]. Similar to the traditional relay systems, amplify-and-forward (AF) [6] and decode-and-forward (DF) [7] are two commonly used schemes in secure relay systems.
To further improve physical layer security, artificial noise (AN) or cooperative jamming (CJ) approach has been introduced in the secrecy system by embedding noise or jamming signal in the transmitted signal to confuse eavesdroppers [811]. In addition to helping relay the desirable information signals from source nodes to destination nodes, trusted relays can also implement CJ [12, 13] to confuse the potential eavesdroppers by simultaneously sending jamming signals together with the information signals. Furthermore, due to the success of multi-antenna techniques in wireless communications, employing multiple antennas in the secure relay systems has also been investigated in the literature recently [1416], in which the multi-antenna nodes can adjust the directions of their transmitted information and jamming signals so as to further improve the secure performance.
Recently, there are some works [1719] in the literature investigating joint relay beamforming and CJ design to maximize the achievable secrecy rate in relay systems. Specifically, [17] studied secure beamforming and CJ design in an AF relay system with multiple distributed relays and multiple eavesdroppers each with a single antenna, in which the secrecy rate was maximized subject to both total and individual power constraints at the relay nodes. Ding et al. [18] considered joint beamforming and CJ scheme in an AF-based multi-antenna relay system with an eavesdropper, in which interference alignment was used to ensure that jamming signals from the source and the relay can be aligned together at the destination. The most recent work [19] addressed DF-based multi-antenna relay beamforming and CJ design in the presence of multiple eavesdroppers. In [1719], the global channel state information (CSI) is assumed to be perfectly known at both the source and the relay.
However, the practical implementation of beamforming and CJ design at the multi-antenna relay in secure wireless communications critically relies on the CSI availability from the source/relay to the destination/eavesdroppers at the transmitter [2023]. This is difficult to be obtained perfectly in practice due to channel quantization and feedback errors. As a result, it is essential to investigate the robust relay transmission design under imperfect CSI. Robust transmit designs for multiple-input single-output (MISO) wiretap channels under both individual and global power constraints for the source and the helper were presented in [21], where transmit covariance matrices at the source and the helper were jointly optimized to maximize the secrecy rate. Zhao et al. [22] investigated robust beamforming design of sum secrecy rate optimization under sum power constraint for multiple user-eavesdropper pairs, and a low complexity zero-forcing (ZF) beamformers is developed. Ni et al. [23] and Fei et al. [24] discussed robust coordinated beamforming for multi-user interference channel secure communications under imperfect CSI. There have been no consideration of the relay system in [2124]. It is worth noting that there has been a handful of works [2527] investigating the robust relay beamforming design. Specifically, [25] investigated the AF-based relay beamforming scheme in the presence of multiple eavesdroppers to maximize the secrecy rate. The imperfect CSI of relay-destination and relay-eavesdroppers links was modeled using a norm-bounded CSI error model. Zhang et al. [26] designed robust joint optimization in bidirectional multi-user multi-relay MIMO systems, in which authors mainly concentrated on the sum mean square error (MSE) criterion as well as maximum user’s MSE. However, the two aforementioned works did not consider jamming signals generated by relays to confuse eavesdroppers. Wang and Wang [6] has considered an AF relaying system with the multiple distributed relays each with a single antenna. In [27], the relaying robust beamforming for device-to-device communication with channel uncertainty was considered. To the best of our knowledge, the DF-based robust joint beamforming and CJ design for maximizing secrecy rate in relay systems with imperfect CSI is much less known.
In this paper, we focus on the robust joint beamforming and CJ design for a DF-based relay system in the presence of multiple eavesdroppers, in which a single-antenna source sends confidential information to a single-antenna destination with the assistance of a multi-antenna relay, and a jamming signal is embedded in the transmitted signal of relay to improve secure communication. The contributions of this paper are twofold:
1)
The relay operates in a half-duplex mode, accordingly the transmission is divided into two time slots. In the first time slot, the source transmits signals to the destination and the relay, and in the second time slot, the relay forwards the re-encoded signals (a jamming signal is embedded in the transmitted signal of relay) to the destination. It is presumed that the wireless channels from the source/relay to the destination/eavesdroppers are subject to norm-bounded CSI errors.
 
2)
By jointly optimizing the transmit beamforming vector of information signals and the covariance matrix of jamming signals at the relay to maximize the achievable secrecy rate at the destination while guaranteeing the total transmit power constraint. Although this problem is non-convex and in general difficult to be solved, we obtain its optimal solution via the techniques of semi-definite relaxation (SDR) together with a one-dimensional (1-D) search. Furthermore, we prove that the tightness of SDR of channel uncertainty, which can guarantee the optimality of the solution in this case.
 
The rest of this paper is organized as follows. Section 2 introduces the system model and problem formulation. Section 3 proposes the optimal solution to the considered problem. Section 4 presents numerical results to validate the proposed scheme. Finally, Section 5 concludes this paper.
Notations: Throughout this paper, boldface lowercase and uppercase letters denote vectors and matrices, respectively. The transpose, conjugate transpose, rank, and trace of matrix A are denoted as A T , A H , rank(A), and tr(A), respectively. A denotes the conjugate of matrix A, and I denotes the identity matrix. A≽0 means A is a positive semidefinite matrix. The distribution of a circularly symmetric complex Gaussian (CSCG) random vector with mean vector x and covariance matrix Σ is denoted by \(\mathcal {CN}(\mathbf {x},\Sigma)\); and ∼ stands for “distributed as.”

2 System model and problem formulation

2.1 System model

We consider a DF relaying system, which consists of one source node (S), one relay node (R), one destination node (D), and K>1 passive eavesdroppers (Es), as shown in Fig. 1. Suppose that the relay is equipped with N>1 antennas, and each of the other nodes is equipped with a single antenna. Let \(\mathcal {K} = \{1,\ldots,K\}\) denote the set of Es. The relay operates in a half-duplex mode, and accordingly, the information transmission from S to D with the assistance of R requires two time slots to complete. In the first time slot, S transmits signals to R and D. After decoding the information, in the second time slot, R forwards the re-encoded signals to D. To enhance physical layer security by preventing the K Es from eavesdropping the confidential signal sent by S to D, we consider that R employs the CJ-aided secure communication scheme. Specifically, R employs transmit beamforming for delivering the confidential information to D and at the same time generates Gaussian artificial noise to confuse the K Es.
Throughout this paper, the K Es are passive and the goal is to interpret the transmission information without trying to modify it. It is assumed that S and R can (partially) obtain the CSI associated with Es through, e.g., estimating channels based on Es’ transmitted signals, while they do not know the location of Eve. As Es’ location changes, the proposed beamforming design is able to adapt dynamically to ensure the secure communications of Alice based on the associated channels. Note that the location-based secure robust beamforming design is beyond the scope of this paper, while the interested readers can refer to [28] and the reference therein for more information. Let the channel coefficients over links SD, SE k , SR, RD, and RE k (\(k\in \mathcal {K}\)) be denoted by h SD, \(h_{\text {SE}_{k}}\phantom {\dot {i}\!}\), \(\mathbf {h}_{\text {SR}}\in \mathbb {C}^{N\times 1}\), \(\mathbf {h}_{\text {RD}}\in \mathbb {C}^{N\times 1}\), and \(\mathbf {h}_{\text {RE}_{k}}\in \mathbb {C}^{N\times 1}\), respectively. All channel coefficients are quasi-stationary with flat-fading Rayleigh distribution.
Then, by denoting the confidential signal sent by S as x, the received signals at R, D, and E k in the first time slot are respectively denoted as
$$\begin{array}{*{20}l} \mathbf{y}_{R}=\sqrt{P_{s}}\mathbf{h}_{\text{SR}}^{T} x+\mathbf{n}_{R} \end{array} $$
(1)
$$\begin{array}{*{20}l} y_{1D}=\sqrt{P_{s}}h_{\text{SD}}x+n_{1D} \end{array} $$
(2)
$$\begin{array}{*{20}l} y_{1E_{k}}=\sqrt{P_{s}}h_{\text{SE}_{k}}x+n_{1E_{k}} \end{array} $$
(3)
where P s is the transmit power at the S. n R , n 1D , and \(n_{1E_{k}}\) are the complex Gaussian noises at the R, D, and E k with \(\mathbf {n}_{R}\sim \mathcal {CN}(\mathbf {0},\sigma ^{2}\mathbf {I})\), \(n_{1D}\sim \mathcal {CN}(0,\sigma ^{2})\) and \(n_{1E_{k}}\sim \mathcal {CN}(0,\sigma ^{2})\), respectively. For notational convenience, we assume that the noise power at R, D, and Es are identical and normalized to be unity (i.e., σ 2=1) without loss of generality.
Using (1), the information rate at R is given by
$$\begin{array}{*{20}l} R_{R}=\frac{1}{2}\log_{2}\left(1+P_{s}\|\mathbf{h}_{\text{SR}}\|^{2}\right) \end{array} $$
(4)
where the factor 1/2 accounts for the fact that the overall transmission is divided into two time slots.
In the second time slot, R successfully decodes the source signal and then forwards the re-encoded signal to D together with a jamming signal. Specifically, let the sent signal of R in the second time slot be denoted by \(\tilde {\mathbf {x}}=\mathbf {w}x+\mathbf {z}\), where \(\mathbf {w}\in \mathbb {C}^{N\times 1}\) denotes the transmit beamforming vector carrying the confidential information and \(\mathbf {z}\in \mathbb {C}^{N\times 1}\) denotes the complex Gaussian jamming signal generated by R, which is a CSCG random vector with zero mean and covariance Ω0, i.e., \(\mathbf {z}\sim \mathcal {CN}(\mathbf {0},{\Omega })\). Then, the received signals at D and E k are respectively denoted as
$$\begin{array}{*{20}l} y_{2D}=\mathbf{h}_{\text{RD}}^{T}\mathbf{w}x+\mathbf{h}_{\text{RD}}^{T}\mathbf{z}+n_{2D} \end{array} $$
(5)
$$\begin{array}{*{20}l} y_{2E_{k}}=\mathbf{h}_{\text{RE}_{k}}^{T}\mathbf{w}x+\mathbf{h}_{\text{RE}_{k}}^{T}\mathbf{z}+n_{2E_{k}} \end{array} $$
(6)
where n 2D and \(n_{2E_{k}}\) denote the complex Gaussian noises at D and E k with \(n_{2D}\sim \mathcal {CN}(0,\sigma ^{2})\) and \(n_{2E_{k}}\sim \mathcal {CN}(0,\sigma ^{2})\), respectively.
Using maximum ratio combination (MRC) to combine (2) and (5) [29, 30], the information rate at D is given by
$$ R_{D}(\mathbf{w},{\Omega})=\frac{1}{2}\log_{2}\left(1+P_{s}|h_{\text{SD}}|^{2}+ \frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{w}\mathbf{w}^{H}\mathbf{h}_{\text{RD}}^{*}} {1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}\right). $$
(7)
Similarly, using (3) and (6), the information rate at E k by exploiting the MRC is given by
$$ {\begin{aligned} R_{E_{k}}(\mathbf{w},{\Omega})=\frac{1}{2}\log_{2}\left(1+P_{s}|h_{\text{SE}_{k}}|^{2}+\frac{\mathbf{h}_{\text{RE}_{k}}^{T}\mathbf{w}\mathbf{w}^{H}\mathbf{h}_{\text{RE}_{k}}^{*}} {1+\mathbf{h}_{\text{RE}_{k}}^{T}{\Omega}\mathbf{h}_{\text{RE}_{k}}^{*}}\right),~\forall k\in \mathcal{K}. \end{aligned}} $$
(8)
For the secure MISO relay communication in the presence of multiple eavesdroppers, the achievable secrecy rate is given by [15]
$$\begin{array}{*{20}l} R = \min_{k\in\mathcal{K}} R_{D}(\mathbf{w},{\Omega}) - R_{E_{k}}(\mathbf{w},{\Omega}). \end{array} $$
(9)
Following [12], to ensure the R correctly decode the source message, the rate at R should no less than the rate at D, i.e.,
$$\begin{array}{*{20}l} R_{R}\geq R_{D}(\mathbf{w},{\Omega}). \end{array} $$
(10)
On the other hand, the total transmit power (signal power plus jamming signal power) at R is limited by the maximum allowable transmit power P r , i.e.,
$$\begin{array}{*{20}l} \text{tr}(\mathbf{w}\mathbf{w}^{H})+\text{tr}({\Omega})\leq P_{r}. \end{array} $$
(11)

2.2 Problem formulation

In this paper, we consider imperfect CSI at the transmitter due to channel quantization and feedback errors. In other words, the CSI from S/R to D/Es is imperfectly known at S and R. Here, the CSI uncertainties are modeled by worst-case model as in [21, 31]. In this case, we consider that the estimated wireless channels over links SD, SE k , RD, and RE k (\(k\in \mathcal {K}\)) are denoted by \(\tilde {h}_{\text {SD}}\), \(\tilde {h}_{\text {SE}_{k}}\), \(\tilde {\mathbf {h}}_{\text {RD}}\), and \(\tilde {\mathbf {h}}_{\text {RE}_{k}}\), respectively. We assume that the channel uncertainty is bounded, and accordingly denote the regions of the exact wireless channels h SD , \(h_{SE_{k}}\), h RD , and \(\mathbf {h}_{RE_{k}}\) as \( {\mathcal{H}}_{SD} \), \(\mathcal {H}_{SE_{k}}\), \( {\mathcal{H}}_{RD} \), and \(\mathcal {H}_{RE_{k}}\), respectively, which are given by
$$ \mathcal{H}_{\text{SD}}=\{\Delta h_{\text{SD}}|\Delta h_{\text{SD}}=h_{\text{SD}}-\tilde{h}_{\text{SD}},~|\Delta h_{\text{SD}}|\leq \delta_{\text{SD}}\}, $$
(12)
$$ \begin{aligned} &\mathcal{H}_{\text{SE}_{k}}=\{\Delta h_{\text{SE}_{k}}|\Delta h_{\text{SE}_{k}}=h_{\text{SE}_{k}}-\tilde{h}_{\text{SE}_{k}},~|\Delta h_{\text{SE}_{k}}|\leq \delta_{\text{SE}_{k}}\},\\ &\qquad\qquad\forall k\in \mathcal{K}\\ \end{aligned} $$
(13)
$$ \mathcal{H}_{\text{RD}}=\{\Delta\mathbf{h}_{\text{RD}}|\Delta\mathbf{h}_{\text{RD}}=\mathbf{h}_{\text{RD}}-\tilde{\mathbf{h}}_{\text{RD}},\|\Delta\mathbf{h}_{\text{RD}}\|\leq \delta_{\text{RD}}\}, $$
(14)
$$ \begin{aligned} &\mathcal{H}_{\text{RE}_{k}}=\{\Delta\mathbf{h}_{\text{RE}_{k}}|\Delta\mathbf{h}_{\text{RE}_{k}}=\mathbf{h}_{\text{RE}_{k}}-\tilde{\mathbf{h}}_{\text{RE}_{k}},~\|\Delta\mathbf{h}_{\text{RE}_{k}}\|\leq \delta_{\text{RE}_{k}}\},\\ &\qquad\qquad\forall k\in \mathcal{K} \end{aligned} $$
(15)
where Δ h SD, \(\Delta h_{\text {SE}_{k}}\phantom {\dot {i}\!}\), Δ h RD, and \(\phantom {\dot {i}\!}\Delta \mathbf {h}_{\text {RE}_{k}}\) denote the channel uncertainties, respectively. And δ SD, \(\phantom {\dot {i}\!}\delta _{\text {SE}_{k}}\), δ RD, \(\phantom {\dot {i}\!}\delta _{\text {RE}_{k}}\) denote the error bounds corresponding uncertainty regions, respectively.
Under the channel uncertainty model, our objective is to maximize the achievable secrecy rate at D in (9) by jointly optimizing the beamforming vector w of the desirable signal and the transmit covariance Ω of the jamming signal at R subject to the information rate constraint in (10) and its total transmit power constraint at R in (11). As a result, the optimization problem is formulated as
$$\begin{array}{*{20}l} \max_{\mathbf{w},{\Omega}}~\min_{\substack{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}},\Delta h_{\text{SE}_{k}}\in \mathcal{H}_{\text{SE}_{k}} \\ \Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}},\Delta\mathbf{h}_{\text{RE}_{k}}\in \mathcal{H}_{\text{RE}_{k}}}} \min_{k\in\mathcal{K}}\quad & R_{D}(\mathbf{w},{\Omega})-R_{E_{k}}(\mathbf{w},{\Omega}) \end{array} $$
(16a)
$$\begin{array}{*{20}l} \text{s.t.}\quad &R_{R}\geq R_{D}(\mathbf{w},{\Omega}) \end{array} $$
(16b)
$$\begin{array}{*{20}l} &\text{tr}(\mathbf{w}\mathbf{w}^{H})+\text{tr}({\Omega})\leq P_{r} \end{array} $$
(16c)
$$\begin{array}{*{20}l} &{\Omega}\succeq \mathbf{0}. \end{array} $$
(16d)
Problem (16) is challenging to be solved due to the non-convex objective function (16a) (the objective function is the difference of two logarithm functions) and the semi-infinite constraint (16b) (due to the norm-bounded CSI errors). We address this challenge in the following section.

3 Optimal solution

In this section, we employ the SDR technique to solve problem (16). Define W=w w H with W0 and rank(W)≤1. Then, by substituting w w H as W and introducing a slack variable α≥0, problem (16) is equivalently expressed as
$$\begin{array}{*{20}l} &\max_{\mathbf{W},{\Omega},\alpha} \min_{\substack{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}} \\ \Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}}\quad \frac{1}{2}\log_{2}\left(1+P_{s}|h_{\text{SD}}|^{2}+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}} {1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}\right)\\&-\frac{1}{2}\log_{2} \alpha \end{array} $$
(17a)
$$\begin{array}{*{20}l} \text{s.t.} &\max_{\substack{\Delta h_{\text{SE}_{k}}\in \mathcal{H}_{\text{SE}_{k}}\\ \Delta\mathbf{h}_{\text{RE}_{k}}\in \mathcal{H}_{\text{RE}_{k}}}}\frac{1}{2}\log_{2}\left(1+P_{s}|h_{\text{SE}_{k}}|^{2}+\frac{\mathbf{h}_{\text{RE}_{k}}^{T}\mathbf{W}\mathbf{h}_{\text{RE}_{k}}^{*}}{1+\mathbf{h}_{\text{RE}_{k}}^{T}{\Omega}\mathbf{h}_{\text{RE}_{k}}^{*}}\right)\\&\leq \frac{1}{2}\log_{2}\alpha,~\forall k\in \mathcal{K} \end{array} $$
(17b)
$$\begin{array}{*{20}l} &\max_{\substack{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}} \\ \Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}}\frac{1}{2}\log_{2}\left(1+P_{s}|h_{\text{SD}}|^{2}+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}}{1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}\right)\\&\leq \frac{1}{2}\log_{2}(1+P_{s}\|\mathbf{h}_{\text{SR}}\|^{2}), \end{array} $$
(17c)
$$\begin{array}{*{20}l} &\text{tr}(\mathbf{W})+\text{tr}({\Omega})\leq P_{r}, \end{array} $$
(17d)
$$\begin{array}{*{20}l} &\mathbf{W}\succeq \mathbf{0},{\Omega}\succeq \mathbf{0},\alpha\geq 0, \end{array} $$
(17e)
$$\begin{array}{*{20}l} &\text{rank}(\mathbf{W})\leq 1. \end{array} $$
(17f)
Furthermore, introducing a slack variable γ≥0, problem (17) is reformulated as
$$\begin{array}{*{20}l} &\max_{\mathbf{W},{\Omega},\alpha,\gamma} \quad \gamma \end{array} $$
(18a)
$$\begin{array}{*{20}l} \text{s.t.} &\min_{\substack{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}} \\ \Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}}\frac{1+P_{s}|h_{\text{SD}}|^{2}}{\alpha}+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}}{\alpha(1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*})} \geq \gamma, \end{array} $$
(18b)
$$\begin{array}{*{20}l} &\max_{\substack{\Delta h_{\text{SE}_{k}}\in \mathcal{H}_{\text{SE}_{k}}\\ \Delta\mathbf{h}_{\text{RE}_{k}}\in \mathcal{H}_{\text{RE}_{k}}}} 1+P_{s}|h_{\text{SE}_{k}}|^{2}+\frac{\mathbf{h}_{\text{RE}_{k}}^{T}\mathbf{W}\mathbf{h}_{\text{RE}_{k}}^{*}}{1+\mathbf{h}_{\text{RE}_{k}}^{T}{\Omega}\mathbf{h}_{\text{RE}_{k}}^{*}}\leq \alpha,~\forall k\in \mathcal{K} \end{array} $$
(18c)
$$\begin{array}{*{20}l} &\max_{\substack{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}} \\\Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}} P_{s}|h_{\text{SD}}|^{2}+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}}{1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}\leq P_{s}\|\mathbf{h}_{\text{SR}}\|^{2}, \end{array} $$
(18d)
$$\begin{array}{*{20}l} &(\mathrm{17d})-(\mathrm{17f}\,), \end{array} $$
(18e)
where function log2(·) is omitted since the logarithm is a monotonically increasing function that has no effect on the optimization problem.
To simplify problem (18e), we introduce three variables a,b,c, and d to replace the worst-case direct link signal-to-noise ratio (SNR) at D and E k for constraints (18b)–(18d). First, we minimize the direct link SNR at D for constraint (18b), which is [26]
$$\begin{array}{*{20}l} a=\min_{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}}}P_{s}|h_{\text{SD}}|^{2}=P_{s}||\tilde{h}_{\text{SD}}|-\delta_{\text{SD}}|^{2}. \end{array} $$
(19)
Likewise, we maximize the direct link SNR at E k for constraint (18c), which is
$$\begin{array}{*{20}l} b=\max_{\Delta h_{\text{SE}_{k}}\in \mathcal{H}_{\text{SE}_{k}}}P_{s}|h_{\text{SE}_{k}}|^{2}=P_{s}||\tilde{h}_{\text{SE}_{k}}|+\delta_{\text{SE}_{k}}|^{2}, ~\forall k\in \mathcal{K}. \end{array} $$
(20)
In addition, we maximize the direct link SNR at D for constraint (18d), which is
$$\begin{array}{*{20}l} c=\max_{\Delta h_{\text{SD}}\in \mathcal{H}_{\text{SD}}}P_{s}|h_{\text{SD}}|^{2}=P_{s}||\tilde{h}_{\text{SD}}|+\delta_{\text{SD}}|^{2}. \end{array} $$
(21)
For constraint (18b), since we have (19), it can be simplified as
$$\begin{array}{*{20}l} \min_{\Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{RD}}\frac{(1+a)+\mathbf{h}_{\text{RD}}^{T}[\!\mathbf{W}+(1+a){\Omega}]\mathbf{h}_{\text{RD}}^{*}}{\alpha(1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*})} \geq \gamma. \end{array} $$
(22)
Similarly, for constraints (18c) and (18d), since we have (20) and (21), then they can be respectively simplified as
$$\begin{array}{*{20}l} &\max_{\Delta\mathbf{h}_{\text{RE}_{k}}\in \mathcal{H}_{\text{RE}_{k}}}\frac{(1+b)+\mathbf{h}_{\text{RE}_{k}}^{T}[\mathbf{\!W}+(1+b){\Omega}]\mathbf{h}_{\text{RE}_{k}}^{*}}{1+\mathbf{h}_{\text{RE}_{k}}^{T}{\Omega}\mathbf{h}_{\text{RE}_{k}}^{*}}\\&\leq \alpha, ~\forall k\in \mathcal{K} \end{array} $$
(23)
and
$$\begin{array}{*{20}l} \max_{\Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}c+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}}{1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}\leq d \end{array} $$
(24)
where d=P s h SR2.
Combining (22)–(24), problem (17) is simplified as
$$\begin{array}{*{20}l} \max_{\mathbf{W},{\Omega}, \alpha,\gamma} \quad &\gamma \end{array} $$
s.t. (22),(23),(24),
$$\begin{array}{*{20}l} &\text{tr}(\mathbf{W})+\text{tr}({\Omega})\leq P_{r}, \\ &\mathbf{W}\succeq \mathbf{0}, {\Omega}\succeq \mathbf{0}, \alpha\geq 0, \gamma\geq 0, \\ &\text{rank}(\mathbf{W})\leq 1. \end{array} $$
(25)
To solve problem (25), we further introduce the following variables:
$$\begin{array}{*{20}l} t=\frac{1}{\alpha(1+\mathbf{h}_{\text{RD}}^{H}{\Omega}\mathbf{h}_{\text{RD}})},~\hat{\mathbf{W}}=t\mathbf{W},~\text{and}~\hat{{\Omega}}=t{\Omega} \end{array} $$
(26)
where t≥0 is a complimentary slackness parameter. Using Charnes-Cooper transformation [32], problem (25) is equivalently transformed as
$$\begin{array}{*{20}l} &\max_{\hat{\mathbf{W}},\hat{\mathbf{\Sigma}},\gamma,\alpha,t} \quad \gamma \end{array} $$
(27a)
$$\begin{array}{*{20}l} \text{s.t.}\quad &\min_{\Delta\mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}} (1+a)t+\mathbf{h}_{\text{RD}}^{T}[\!\hat{\mathbf{W}}+(1+a)\hat{{\Omega}}]\mathbf{h}_{\text{RD}}^{*} \geq \gamma, \end{array} $$
(27b)
$$\begin{array}{*{20}l} &\max_{\Delta\mathbf{h}_{\text{RE}_{k}}\in \mathcal{H}_{\text{RE}_{k}}}\frac{(1+b)t+\mathbf{h}_{\text{RE}_{k}}^{T}[\!\hat{\mathbf{W}}+(1+b)\hat{{\Omega}}]\mathbf{h}_{\text{RE}_{k}}^{*}}{t+\mathbf{h}_{\text{RE}_{k}}^{T}\hat{{\Omega}}\mathbf{h}_{\text{RE}_{k}}^{*}}\\&\leq \alpha, ~\forall k\in \mathcal{K} \end{array} $$
(27c)
$$\begin{array}{*{20}l} &\max_{\Delta \mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}\alpha\mathbf{h}_{\text{RD}}^{T}\hat{\mathbf{W}}\mathbf{h}_{\text{RD}}^{*}\leq d-c, \end{array} $$
(27d)
$$\begin{array}{*{20}l} &\alpha(t+\mathbf{h}_{\text{RD}}^{T}\hat{{\Omega}}\mathbf{h}_{\text{RD}}^{*})\leq 1,~\forall \Delta\mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}, \end{array} $$
(27e)
$$\begin{array}{*{20}l} &\text{tr}(\hat{\mathbf{W}})+\text{tr}(\hat{{\Omega}})\leq tP_{r}, \end{array} $$
(27f)
$$\begin{array}{*{20}l} &\hat{\mathbf{W}}\succeq \mathbf{0}, \hat{{\Omega}}\succeq \mathbf{0}, \gamma\geq 0, \alpha\geq 0, t\geq 0, \end{array} $$
(27g)
$$\begin{array}{*{20}l} &\text{rank}(\hat{\mathbf{W}})\leq 1. \end{array} $$
(27h)
Problem (27) has semi-infinite constraints (27b)–(27e) and non-convex rank-one constraint (27h), which are intractable. Denoting the optimal solution to problem (27) as \((\hat {\mathbf {W}}^{o}, \hat {{\Omega }}^{o},t^{o})\) and the corresponding optimal objective value as γ o , using SDR to obtain \((\hat {\mathbf {W}}^{o}, {\hat {{\Omega }}^{o}},t^{o})\) under given α, and using 1-D line search to search the optimal α, we have the following proposition.
Proposition1.
The optimal solution \((\hat {\mathbf {W}}^{o}, \hat {{\Omega }}^{o},t^{o})\) to problem (27) should satisfy the following equation:
$$\begin{array}{*{20}l} \max_{\Delta\mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}}\mathbf{h}_{\text{RD}}^{T}\hat{{\Omega}}^{o}\mathbf{h}_{\text{RD}}+t^{o}= 1/\alpha. \end{array} $$
(28)
Proof.
Please refer to the “Appendix 1” section.
To make problem (27) tractable, we first employ the S-procedure [34] to convert the constraints (27b)–(27e) into linear matrix inequalities (LMIs) [35]. For constraint (27b), we substitute (13) into (27b) and rewrite it as follows
$$ {\begin{aligned} \left\{\begin{array}{lll} -\Delta\mathbf{h}_{\text{RD}}^{T}\mathbf{\Sigma}_{1}\Delta\mathbf{h}_{\text{RD}}-2\text{Re}\{(\tilde{\mathbf{h}}_{\text{RD}}\mathbf{\Sigma}_{1})^{T}\Delta\mathbf{h}_{\text{RD}}^{*}\}-\tilde{\mathbf{h}}_{\text{RD}}^{T}\mathbf{\Sigma}_{1}\tilde{\mathbf{h}}_{\text{RD}}^{*}+\gamma-(1+a)t\leq 0 \\ \forall \Delta\mathbf{h}_{\text{RD}}: \|\Delta\mathbf{h}_{\text{RD}}\|\leq \delta_{RD} \end{array}\right. \end{aligned}} $$
(29)
where \(\mathbf {\Sigma }_{1}=\hat {\mathbf {W}}+(1+a)\hat {{\Omega }}\).
By applying S-procedure and introducing a slack variable λ 1≥0, we convert (29) into an LMI given by
$$ {\begin{aligned} \mathbf{T}_{1}=\left[\begin{array}{ll} \lambda_{1} \mathbf{I}/\delta_{\text{RD}}^{2}+\mathbf{\Sigma}_{1} &\quad\qquad\quad \mathbf{\Sigma}_{1}\tilde{\mathbf{h}}_{\text{RD}}^{*}\\ \quad\tilde{\mathbf{h}}_{\text{RD}}^{T}\mathbf{\Sigma}_{1} & \tilde{\mathbf{h}}_{\text{RD}}^{T}\mathbf{\Sigma}_{1}\tilde{\mathbf{h}}_{\text{RD}}^{*}+(1+a)t-\gamma-\lambda_{1} \end{array}\right]\succeq \mathbf{0}. \end{aligned}} $$
(30)
Similarly, the constrains in (27c)–(27e) are equivalently expressed as
$$ {\begin{aligned} \mathbf{T}_{2k}=\left[\begin{array}{ll} u_{k} \mathbf{I}/\delta_{\text{RE}_{k}}^{2}+\mathbf{\Sigma}_{2} & \quad\qquad\quad\mathbf{\Sigma}_{2}\tilde{\mathbf{h}}_{\text{RE}_{k}}^{*} \\ \quad\tilde{\mathbf{h}}_{\text{RE}_{k}}^{T}\mathbf{\Sigma}_{2} & \tilde{\mathbf{h}}_{\text{RE}_{k}}^{T}\mathbf{\Sigma}_{2}\tilde{\mathbf{h}}_{\text{RE}_{k}}^{*}+(\alpha-1-b)t-u_{k} \end{array}\right]\succeq \mathbf{0}, ~\forall k\in \mathcal{K} \end{aligned}} $$
(31)
$$ \mathbf{T}_{3}=\left[\begin{array}{ll} \lambda_{2} \mathbf{I}/\delta_{\text{RD}}^{2}-\mathbf{\Sigma_{3}} & \quad\qquad\quad-\mathbf{\Sigma_{3}}\tilde{\mathbf{h}}_{\text{RD}}^{*} \\ \quad-\tilde{\mathbf{h}}_{\text{RD}}^{T}\mathbf{\Sigma_{3}} & -\tilde{\mathbf{h}}_{\text{RD}}^{T}\mathbf{\Sigma_{3}}\tilde{\mathbf{h}}_{\text{RD}}^{*}+d-c-\lambda_{2} \end{array}\right]\succeq \mathbf{0} $$
(32)
$$ \mathbf{T}_{4}=\left[\begin{array}{ll} \lambda_{3} \mathbf{I}/\delta_{\text{RD}}^{2}-\hat{{\Omega}} & \quad\qquad\quad-\hat{{\Omega}}\tilde{\mathbf{h}}_{\text{RD}}^{*} \\ \quad-\tilde{\mathbf{h}}_{\text{RD}}^{T}\hat{{\Omega}} & -\tilde{\mathbf{h}}_{\text{RD}}^{H}\hat{{\Omega}}\tilde{\mathbf{h}}_{\text{RD}}^{*}+1/\alpha-t-\lambda_{3} \end{array}\right]\succeq \mathbf{0} $$
(33)
where \(\mathbf {\Sigma }_{2}=(\alpha -1-b)\hat {{\Omega }}-\hat {\mathbf {W}}\), and \(\mathbf {\Sigma }_{3}=\alpha \hat {\mathbf {W}}\). λ 1≥0, λ 2≥0, λ 3≥0, and u k ≥0 are introduced slack variables.
Replacing (27b)–(27e) by (30)–(33), problem (27) can be equivalently expressed as
$$\begin{array}{*{20}l} \max_{\hat{\mathbf{W}},\hat{\mathbf{\Sigma}},\gamma,\alpha,t,\lambda_{1},\lambda_{2},\lambda_{3},u_{k}} \quad &\gamma \end{array} $$
s.t. (30),(31),(32),(33),
$$\begin{array}{*{20}l}{\kern55pt} &\text{tr}(\hat{\mathbf{W}})+\text{tr}(\hat{{\Omega}})\leq tP_{r}, \\ &\hat{\mathbf{W}}\succeq \mathbf{0}, \hat{{\Omega}}\succeq \mathbf{0}, \\ &\lambda_{1}\geq 0,\lambda_{2}\geq 0,\lambda_{3}\geq 0, u_{k}\geq 0, ~\forall k\in \mathcal{K} \\ &\gamma\geq 0,\alpha\geq 0,t\geq 0, \\ &\text{rank}(\hat{\mathbf{W}})\leq 1. \end{array} $$
(34)
Problem (34) is still non-convex due to the rank-one constraint of \(\hat {\mathbf {W}}\). To meet this challenge, we use the SDR technique here. By dropping the rank-one constraint, problem (34) becomes a convex semidefinite program (SDP) for a given α that consists of a linear objective function together with a set of LMI constraints, which can thus be solved effectively via standard convex optimization techniques such as the interior point method [35]. As a result, we can recast problem (34) as a two-layer optimization problem.
The outer layer is a one-variable optimization problem in terms of α, and the inner layer is a convex SDP problem with fixed α. Thus, we need to search for α. The upper bound of α is derived as
$$\begin{array}{*{20}l} \alpha\leq 1+\frac{\mathbf{h}_{\text{RD}}^{T}\mathbf{W}\mathbf{h}_{\text{RD}}^{*}}{1+\mathbf{h}_{\text{RD}}^{T}{\Omega}\mathbf{h}_{\text{RD}}^{*}}&\leq 1+P_{r}\|\mathbf{h}_{\text{RD}}\|^{2} \\ &=1+P_{r}(\|\tilde{\mathbf{h}}_{\text{RD}}\|+\delta_{\text{RD}})^{2}. \end{array} $$
(35)
Toward this end, we reformulate problem (34) in the following form
$$\begin{array}{*{20}l} \max_{\alpha} & ~f(\alpha) \\ \text{s.t.}\quad &1\leq \alpha \leq 1+P_{r}(\|\tilde{\mathbf{h}}_{\text{RD}}\|+\delta_{\text{RD}})^{2} \end{array} $$
(36)
where
$$\begin{array}{*{20}l} f(\alpha)=&\max_{\hat{\mathbf{W}},\hat{\mathbf{\Sigma}},\gamma,\alpha,t,\lambda_{1},\lambda_{2},\lambda_{3},u_{k}} \quad \\[-15pt] \end{array} $$
(37)
s.t. all constraints in problem (34).
Here, if \(\hat {\mathbf {W}}^{o}\) is of rank-one, then the solution of the SDR is the optimal solution to the original problem (34) (in other words, the SDR of problem (34) is tight). In this case, the optimal robust beamforming vector at R can be exactly obtained as w o via employing the eigenvalue decomposition W o =w o (w o ) H ; otherwise, it is not in general. Fortunately, due to the specific structure of problem (34), we can prove in the following that \(\hat {\mathbf {W}}^{o}\) is indeed of rank one. Accordingly, the obtained optimal solution to the SDR of (34) is indeed the optimal solution to the original problem (34). The robust beamforming design without direct transmission (DT) from S to D and from S to Es is a special case of (34) with a=0,b=0.
Proposition2.
The optimal solution to the SDR of problem (34), \(\hat {\mathbf {W}}^{o}\), is always of rank one.
Proof.
Please refer to the “Appendix 2” section.
Remark1.
It is obvious that the main computation complexity stems from the computation of \(\hat {\mathbf {W}}^{o}\) in the inner layer. The complexity of solving an SDP problem is \(\mathcal {O}\left (n_{\text {sdp}}^{0.5}\left (m_{\text {sdp}}n_{\text {sdp}}^{3}+m_{\text {sdp}}^{2}n_{\text {sdp}}^{2}+m_{\text {sdp}}^{3}\right)\right)\log (1/\epsilon)\) according to [36]. Here, m sdp denotes the number of semidefinite cone constraints, n sdp denotes the dimension of the semidefinite cone, and ε is the accuracy of solving the SDP. Comparing the SDP of (34) with the standard form in [36], we have m sdp=K+4 and n sdp=N+1. As a result, the computational complexity of the proposed scheme is
$$ \begin{aligned} &\mathcal{O}\left\{L\left[\!(K+4)(N+1)^{3.5}+(K+4)^{2}(N+1)^{2.5}\right.\right.\\&\left.\left.+(K+4)^{3}(N+1)^{0.5}\right]\right\}\log(1/\epsilon) \end{aligned} $$
(38)
where L is the number of 1-D search.

4 Numerical results

In this section, we present simulation results to show the performance of the proposed robust joint beamforming and CJ design in DF relay system under channel uncertainty. We assume relay has four antennas, i.e., N=4, and the number of eavesdroppers is K=3. All the channel coefficients are assumed to be independent and identically distributed (i.i.d.) CSCG random variables with zero mean and unit variance. The transmit power at S is P s =0 d B. For simplicity, we assume the error bounds are the same, i.e., \(\phantom {\dot {i}\!}\delta _{\text {SD}}=\delta _{\text {SE}_{k}}=\delta _{\text {RD}}=\delta _{\text {RE}_{k}}=\delta \). We average the worst-case secrecy rate via conducting 1000 randomly generated channel realizations.
Figure 2 presents the average secrecy rate comparison of our proposed robust beamforming with CJ scheme (denoted as “robust with CJ”), robust beamforming without CJ scheme (denoted as “robust without CJ”), and robust beamforming without DT scheme (denoted as “robust without DT”) under the error bound δ=0.2. Here, the robust without CJ scheme is obtained by solving problem (34) with Ω=0 [26]. From Fig. 2, it is observed that the average secrecy rate increases as the maximum total transmit power of relay increases and our proposed robust beamforming with CJ scheme is superior to all its counterparts in improving the secrecy rate.
Figure 3 shows the average secrecy rate versus the maximum total transmit power constraint at R for the comparison of both imperfect CSI and perfect CSI cases. It is observed that the average secrecy rate for perfect CSI is higher than that in imperfect CSI cases. As the uncertainty bounds increase, the system becomes more roust against uncertainty; however, the achievable secrecy rate degrades. From Fig. 3, it is also observed that the secrecy rate increases with increase of maximum total transmit power at R and exhibits saturation behavior in high relay transmit power due to the constraint (10).
Figure 4 plots the average secrecy rate for K=3,6,9 eavesdroppers under N=4, respectively. It can be observed that as eavesdropper number K increases, the average secrecy rate would decrease. More eavesdroppers would surely degrade system performance. Figure 5 depicts the comparison of the average secrecy rate for different transmit antennas at relay. It is shown in Fig. 5 that the average secrecy rate is lifted to a higher level when more transmit antennas are equipped on relay. This is due to the fact that when the number of antennas increases, it means that there are more channels in the relay system and then more spatial degrees of freedom are utilized. Since the secrecy rate of each channel is non-negative, the increasing number of channels means an increase of system secrecy rate.

5 Conclusions

In this paper, we investigated robust beamforming and CJ design for a DF-based relay system in the presence of multiple eavesdroppers. We jointly optimized the transmit beamforming vector and the covariance matrix of jamming signals at the relay to maximize the achievable secrecy rate at the destination while ensuring the total transmit power constraint at the relay, in which we took into account imperfect CSI subject to norm-bounded errors. By applying the techniques of SDR together with a 1-D search, we have obtained the optimal solution. Furthermore, we proved that the SDR of the problem is tight. Simulation results have shown that the validity of the proposed scheme.

6 Appendix 1

6.1 Proof of proposition 1

If \((\hat {\mathbf {W}}^{o}, \hat {{\Omega }}^{o},t^{o})\) is optimal solution of problem (27), we have
$$\begin{array}{*{20}l} \min_{\Delta\mathbf{h}_{\text{RD}}\in \mathcal{H}_{\text{RD}}} (1+a)t+\mathbf{h}_{\text{RD}}^{T}[\!\hat{\mathbf{W}}^{o}+(1+a)\hat{{\Omega}}^{o}]\mathbf{h}_{\text{RD}}^{*} = \gamma^{o} \end{array} $$
(39)
Following the idea of [33] to prove this proposition, by reduction ad absurdum, we consider the following two situations. If \(\max _{\Delta \mathbf {h}_{\text {RD}}\in \mathcal {H}_{\text {RD}}}\mathbf {h}_{\text {RD}}^{T}\hat {{\Omega }}^{o}\mathbf {h}_{\text {RD}}^{*}+t^{o}\leq 1/\alpha \) and \(\text {tr}(\hat {\mathbf {W}}^{o})+\text {tr}(\hat {{\Omega }}^{o})< t^{o}P_{r}\), we can always find t=t o +Δ t,Δ t>0, which satisfies constraints (27c)-(27f). Thus, we can find the large objective value γ o +Δ t which satisfies (39). If \(\max _{\Delta \mathbf {h}_{\text {RD}}\in \mathcal {H}_{\text {RD}}}\mathbf {h}_{\text {RD}}^{T}\hat {{\Omega }}^{o}\mathbf {h}_{\text {RD}}^{*}+t^{o}\leq 1/\alpha \) and \(\text {tr}(\hat {\mathbf {W}}^{o})+\text {tr}(\hat {{\Omega }}^{o})= t^{o}P_{r}\), we can find a solution \((\hat {\mathbf {W}}^{o}, \hat {{\Omega }}^{o}+\Delta \hat {{\Omega }},t^{o}+\Delta t),\Delta \hat {{\Omega }}\succ \mathbf {0},\Delta t>0\), which makes the constraint \(\max _{\Delta \mathbf {h}_{\text {RD}}\in \mathcal {H}_{\text {RD}}}\mathbf {h}_{\text {RD}}^{T}\hat {{\Omega }}^{o}\mathbf {h}_{\text {RD}}^{*}+t^{o}\leq 1/\alpha \) tighter while satisfying constraints (27c), (27d). As a result, these contradict that \((\hat {\mathbf {W}}^{o}, \hat {{\Omega }}^{o},t^{o})\) is the optimal solution to problem (27).

7 Appendix 2

7.1 Proof of proposition 2

We prove the rank condition of \(\hat {\mathbf {W}}\) through Karush-Kuhn-Tucker (KKT) conditions. The partial Lagrangian of primal problem (34) with respect to \(\hat {\mathbf {W}}\) is given by
$$\begin{array}{*{20}l} \mathcal{L}=&\,\gamma-\text{tr}(\mathbf{B}_{1}\mathbf{T}_{1})-\text{tr}(\mathbf{B}_{2k}\mathbf{T}_{2k})-\text{tr}(\mathbf{B}_{3}\mathbf{T}_{3}) \\&+\mu[\text{tr}(\hat{\mathbf{W}})+\text{tr}(\hat{{\Omega}})- tP_{r}] -\text{tr}(\mathbf{B}_{4}\hat{\mathbf{W}}) \end{array} $$
(40)
where the dual variables \(\mathbf {B}_{1}\in \mathbb {H}_{+}\), \(\mathbf {B}_{2k}\in \mathbb {H}_{+}\), \(\mathbf {B}_{3}\in \mathbb {H}_{+}\), \(\mathbf {B}_{4}\in \mathbb {H}_{+}\) (\(\mathbb {H}_{+}\) denotes Hermitian matrix), and μ≥0 are corresponding to the constraints T 10, T 2k 0, T 30, \(\hat {\mathbf {W}}\succeq \mathbf {0}\), and \(\text {tr}(\hat {\mathbf {W}})+\text {tr}(\hat {{\Omega }})- tP_{r}\leq 0\) in (34), respectively.
Taking the partial derivative of (40) with respect to \(\hat {\mathbf {W}}\) and applying KKT conditions, we have
$$\begin{array}{*{20}l} \mu\mathbf{I}&-\mathbf{H}_{\text{RD}}\mathbf{B}_{1}\mathbf{H}_{\text{RD}}^{H}+\sum_{k=1}^{K}\mathbf{H}_{\text{RE}_{k}}\mathbf{B}_{2k}\mathbf{H}_{\text{RE}_{k}}^{H} +\mathbf{H}_{\text{RD}}\mathbf{B}_{3}\mathbf{H}_{\text{RD}}^{H}\\&-\mathbf{B}_{4}=\mathbf{0} \end{array} $$
(41)
where \(\mathbf {H}_{\text {RD}}=\,[\mathbf {I}_{N},\tilde {\mathbf {h}}_{\text {RD}}]\), \(\mathbf {H}_{\text {RE}_{k}}=\,[\mathbf {I}_{N},\tilde {\mathbf {h}}_{\text {RE}_{k}}]\). It is noted that \(\mathbf {B}_{4}\hat {\mathbf {W}}=\mathbf {0}\) from KKT conditions. Since the size of B 1 and T 1 is (N+1)×(N+1), we have rank(B 1)+rank(T 1)≤N+1. Since the dimension of B 1 and T 1 is (N+1)×(N+1), according to the Sylvester’s rank inequality [37], we have rank(B 1)+rank(T 1)−(N+1)≤rank(B 1 T 1), then rank(B 1)+rank(T 1)≤N+1.
From S-procedure [34], we get the slack variable λ 1≥0. Next, we show that λ 1>0 via reduction ad absurdum. We consider the following situation. If λ 1=0, the constraint ∥Δ h RD∥≤δ RD is not active because λ 1 is its dual variable associated with the constraint in (30). If \(\|\Delta \mathbf {h}_{\text {RD}}^{\star }\|\leq \delta _{\text {RD}}\), \(\|\Delta \mathbf {h}_{\text {RD}}^{\star }\|\) is the worst channel uncertainty to minimize \((1+a)t+\mathbf {h}_{\text {RD}}^{T}[\!\hat {\mathbf {W}}+(1+a)\hat {{\Omega }}]\mathbf {h}_{\text {RD}}^{*}\) in constraint (27b), we can always find a scaler ρ>1 which satisfies \(\|\rho \Delta \mathbf {h}_{\text {RD}}^{\star }\|\leq \delta _{\text {RD}}\). By substituting \(\rho \Delta \mathbf {h}_{\text {RD}}^{\star }\) into \((1+a)t+\mathbf {h}_{\text {RD}}^{T}[\!\hat {\mathbf {W}}+(1+a)\hat {{\Omega }}]\mathbf {h}_{\text {RD}}^{*}\), we get the lower value than that obtained by \(\Delta \mathbf {h}_{\text {RD}}^{\star }\). It is contradictory to the assumption that \(\Delta \mathbf {h}_{\text {RD}}^{\star }\) minimizes \((1+a)t+\mathbf {h}_{\text {RD}}^{T}[\!\hat {\mathbf {W}}+(1+a)\hat {{\Omega }}]\mathbf {h}_{\text {RD}}^{*}\). As a result, rank(T 1)≥N and rank(B 1)≤1 hold when λ 1>0. Furthermore, rank(B 1)≠0, so we have rank(B 1)=1. Similarly, we have rank(B 2k )=rank(B 3)=rank(B 4)=1.
Multiplying both sides of (41) with \(\hat {\mathbf {W}}\)
$$ {\begin{aligned} \left(\mu\mathbf{I}+\mathbf{H}_{\text{RE}_{k}}\mathbf{B}_{2}\mathbf{H}_{\text{RE}_{k}}^{H}+\mathbf{H}_{\text{RD}}\mathbf{B}_{3}\mathbf{H}_{\text{RD}}^{H}\right)\hat{\mathbf{W}}&=\left(\mathbf{B}_{4}+\mathbf{H}_{\text{RD}}\mathbf{B}_{1}\mathbf{H}_{\text{RD}}^{H}\right)\hat{\mathbf{W}}\\ &= \mathbf{H}_{\text{RD}}\mathbf{B}_{1}\mathbf{H}_{\text{RD}}^{H}\hat{\mathbf{W}} \end{aligned}} $$
(42)
Since \(\mu \mathbf {I}+\mathbf {H}_{\text {RE}_{k}}\mathbf {B}_{2}\mathbf {H}_{\text {RE}_{k}}^{H}+\mathbf {H}_{\text {RD}}\mathbf {B}_{3}\mathbf {H}_{\text {RD}}^{H}\succ \mathbf {0}\) has full rank, we have
$$\begin{array}{*{20}l} \text{rank}(\hat{\mathbf{W}})=\text{rank}\left(\mathbf{H}_{\text{RD}}\mathbf{B}_{1}\mathbf{H}_{\text{RD}}^{H}\hat{\mathbf{W}}\right) \end{array} $$
(43)
Due to the fact that rank(B 1)=1 from the above proof, we obtain \(\text {rank}\left (\mathbf {H}_{\text {RD}}\mathbf {B}_{1}\mathbf {H}_{\text {RD}}^{H}\right)=1\); thus, we have \(\text {rank}(\hat {\mathbf {W}})\leq 1\). As \(R_{D}(\hat {\mathbf {W}},\hat {{\Omega }}) > 0\), \(\text {rank}(\hat {\mathbf {W}})\) must not be 0, we have \(\text {rank}(\hat {\mathbf {W}})=1\). This completes the proof.

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 61371075 and 61421001) and 863 Project (Grant No. 2015AA01A708).
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Competing interests

The authors declare that they have no competing interests.
Literatur
1.
2.
Zurück zum Zitat M Dehghan, DL Goeckel, M Ghaderi, Z Ding, Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wirel. Commun. 11(9), 3025–3029 (2012).CrossRef M Dehghan, DL Goeckel, M Ghaderi, Z Ding, Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wirel. Commun. 11(9), 3025–3029 (2012).CrossRef
3.
Zurück zum Zitat Q Li, M Hong, HT Wai, YF Liu, WK Ma, ZQ Luo, Transmit solutions for MIMO wiretap channels using alternating optimization. IEEE J. Sel. Areas Commun. 31(9), 1714–1727 (2013).CrossRef Q Li, M Hong, HT Wai, YF Liu, WK Ma, ZQ Luo, Transmit solutions for MIMO wiretap channels using alternating optimization. IEEE J. Sel. Areas Commun. 31(9), 1714–1727 (2013).CrossRef
4.
Zurück zum Zitat AP Shrestha, KS Kwak, Performance of opportunistic scheduling for physical layer security with transmit antenna selection. EURASIP J. Wirel. Commun. Netw. 1(33), 1–9 (2014). AP Shrestha, KS Kwak, Performance of opportunistic scheduling for physical layer security with transmit antenna selection. EURASIP J. Wirel. Commun. Netw. 1(33), 1–9 (2014).
5.
Zurück zum Zitat Y Zou, J Zhu, X Wang, VCM Leung. Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw. 29(1), 42–48 (2015). Y Zou, J Zhu, X Wang, VCM Leung. Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw. 29(1), 42–48 (2015).
6.
Zurück zum Zitat C Wang, HM Wang, Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol. 64(5), 2192–2198 (2014).CrossRef C Wang, HM Wang, Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol. 64(5), 2192–2198 (2014).CrossRef
7.
Zurück zum Zitat TM Hoang, TQ Duong, HA Suraweera, C Tellambura, HV Poor, Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 63(12), 5039–5051 (2015).CrossRef TM Hoang, TQ Duong, HA Suraweera, C Tellambura, HV Poor, Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 63(12), 5039–5051 (2015).CrossRef
8.
Zurück zum Zitat SAA Fakoorian, AL Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59(10), 5013–5022 (2011).MathSciNetCrossRef SAA Fakoorian, AL Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59(10), 5013–5022 (2011).MathSciNetCrossRef
9.
Zurück zum Zitat J Li, AP Petropulu, S Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 59(10), 4985–4997 (2011).MathSciNetCrossRef J Li, AP Petropulu, S Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 59(10), 4985–4997 (2011).MathSciNetCrossRef
10.
Zurück zum Zitat M Ghaderi, DL Goeckel, A Orda, M Dehghan, in Proceedings of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Efficient Wireless Security Through Jamming, Coding and Routing (New Orleans, LA, 2013), pp. 505–513. M Ghaderi, DL Goeckel, A Orda, M Dehghan, in Proceedings of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Efficient Wireless Security Through Jamming, Coding and Routing (New Orleans, LA, 2013), pp. 505–513.
11.
Zurück zum Zitat M Ghaderi, D Goeckel, A Orda, M Dehghan, Minimum energy routing and jamming to thwart wireless network eavesdroppers. IEEE Trans. Mobile Comput. 14(7), 1433–1448 (2014).CrossRef M Ghaderi, D Goeckel, A Orda, M Dehghan, Minimum energy routing and jamming to thwart wireless network eavesdroppers. IEEE Trans. Mobile Comput. 14(7), 1433–1448 (2014).CrossRef
12.
Zurück zum Zitat L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010).MathSciNetCrossRef L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010).MathSciNetCrossRef
13.
Zurück zum Zitat G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317–1322 (2011).MathSciNetCrossRef G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317–1322 (2011).MathSciNetCrossRef
14.
Zurück zum Zitat PH Lin, SH Lai, SC Lin, HJ Su, On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31(9), 1728–1740 (2013).CrossRef PH Lin, SH Lai, SC Lin, HJ Su, On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31(9), 1728–1740 (2013).CrossRef
15.
Zurück zum Zitat Q Li, WK Ma, Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704–2717 (2013).MathSciNetCrossRef Q Li, WK Ma, Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704–2717 (2013).MathSciNetCrossRef
16.
Zurück zum Zitat Z Chu, K Cumanan, Z Ding, M Johnston, S Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 1833–1847 (2015).CrossRef Z Chu, K Cumanan, Z Ding, M Johnston, S Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 1833–1847 (2015).CrossRef
17.
Zurück zum Zitat Y Yang, Q Li, WK Ma, J Ge, PC Ching, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 20(1), 35–38 (2013).CrossRef Y Yang, Q Li, WK Ma, J Ge, PC Ching, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 20(1), 35–38 (2013).CrossRef
18.
Zurück zum Zitat Z Ding, M Peng, HH Chen, A general relaying transmission protocol for MIMO secrecy communications. IEEE Trans. Commun. 60(11), 3461–3471 (2012).CrossRef Z Ding, M Peng, HH Chen, A general relaying transmission protocol for MIMO secrecy communications. IEEE Trans. Commun. 60(11), 3461–3471 (2012).CrossRef
19.
Zurück zum Zitat S Vishwakarma, A Chockalingam, in Twentieth National Conference on Communications (NCC). MIMO Decode-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming (IEEEKanpur, 2014), pp. 1–6.CrossRef S Vishwakarma, A Chockalingam, in Twentieth National Conference on Communications (NCC). MIMO Decode-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming (IEEEKanpur, 2014), pp. 1–6.CrossRef
20.
Zurück zum Zitat X Wang, K Wang, X Zhang, Secure relay beamforming with imperfect channel state information. IEEE Trans. Veh. Technol. 62(5), 2140–2155 (2013).CrossRef X Wang, K Wang, X Zhang, Secure relay beamforming with imperfect channel state information. IEEE Trans. Veh. Technol. 62(5), 2140–2155 (2013).CrossRef
21.
Zurück zum Zitat J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(4), 1696–1707 (2012).MathSciNetCrossRef J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(4), 1696–1707 (2012).MathSciNetCrossRef
22.
Zurück zum Zitat P Zhao, M Zhang, H Yu, H Luo, W Chen, Robust beamforming design for sum secrecy rate optimization in MU-MISO networks. IEEE Trans. Inf. Forensics Secur. 10(9), 1812–1823 (2015).CrossRef P Zhao, M Zhang, H Yu, H Luo, W Chen, Robust beamforming design for sum secrecy rate optimization in MU-MISO networks. IEEE Trans. Inf. Forensics Secur. 10(9), 1812–1823 (2015).CrossRef
23.
Zurück zum Zitat J Ni, Z Fei, KK Wong, C Xing, J Kuang, K-F Tong, Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties. IEEE Wirel. Commun. Lett. 2(4), 407–410 (2013).CrossRef J Ni, Z Fei, KK Wong, C Xing, J Kuang, K-F Tong, Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties. IEEE Wirel. Commun. Lett. 2(4), 407–410 (2013).CrossRef
24.
Zurück zum Zitat Z Fei, J Ni, D Zhao, C Xing, N Wang, J Kuang, Ergodic secrecy rate of two-user MISO interference channels with statistical CSI.SCIENCE CHINA Inf. Sci. 57(10), 1–14 (2014). Z Fei, J Ni, D Zhao, C Xing, N Wang, J Kuang, Ergodic secrecy rate of two-user MISO interference channels with statistical CSI.SCIENCE CHINA Inf. Sci. 57(10), 1–14 (2014).
25.
Zurück zum Zitat S Vishwakarma, A Chockalingam, in Proceedings of IEEE International Conference on Communications (ICC). Amplify-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming and Imperfect CSI (Budapest, 2013), pp. 3047–3052. S Vishwakarma, A Chockalingam, in Proceedings of IEEE International Conference on Communications (ICC). Amplify-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming and Imperfect CSI (Budapest, 2013), pp. 3047–3052.
26.
Zurück zum Zitat M Zhang, H Yi, H Yu, H Luo, W Chen, Joint optimization in bidirectional multi-user multi-relay MIMO systems: non-robust and robust cases. IEEE Trans.Veh. Technol. 62(7), 3228–3244 (2013).CrossRef M Zhang, H Yi, H Yu, H Luo, W Chen, Joint optimization in bidirectional multi-user multi-relay MIMO systems: non-robust and robust cases. IEEE Trans.Veh. Technol. 62(7), 3228–3244 (2013).CrossRef
27.
Zurück zum Zitat Y Qin, M Ding, M Zhang, H Yu, H Luo, Relaying robust beamforming for device-to-device communication with channel uncertainty. IEEE Commun.Lett. 18(10), 1859–1862 (2014).CrossRef Y Qin, M Ding, M Zhang, H Yu, H Luo, Relaying robust beamforming for device-to-device communication with channel uncertainty. IEEE Commun.Lett. 18(10), 1859–1862 (2014).CrossRef
28.
Zurück zum Zitat C Liu, N Yang, J Yuan, R Malaney, Location-based secure transmission for wiretap channels. IEEE J. Sel. Areas Commun. 33(7), 1458–1470 (2015).CrossRef C Liu, N Yang, J Yuan, R Malaney, Location-based secure transmission for wiretap channels. IEEE J. Sel. Areas Commun. 33(7), 1458–1470 (2015).CrossRef
29.
Zurück zum Zitat F He, H Man, W Wang, Maximal ratio diversity combining enhanced security. IEEE Commun. Lett. 15(5), 509–511 (2011).CrossRef F He, H Man, W Wang, Maximal ratio diversity combining enhanced security. IEEE Commun. Lett. 15(5), 509–511 (2011).CrossRef
30.
Zurück zum Zitat MZI Sarkar, T Ratnarajah. Enhancing security in correlated channel with maximal ratio combining diversity.IEEE Trans. on Signal Process. 60(12), 6745–6751 (2012).MathSciNet MZI Sarkar, T Ratnarajah. Enhancing security in correlated channel with maximal ratio combining diversity.IEEE Trans. on Signal Process. 60(12), 6745–6751 (2012).MathSciNet
31.
Zurück zum Zitat M Tian, X Huang, Q Zhang, J Qin, Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723–727 (2015).CrossRef M Tian, X Huang, Q Zhang, J Qin, Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723–727 (2015).CrossRef
32.
Zurück zum Zitat ZQ Luo, JF Sturm, S Zhang, Multivariate nonnegative quadratic mappings.SIAM. J. Optim. 14(4), 1140–1162 (2004).MathSciNetMATH ZQ Luo, JF Sturm, S Zhang, Multivariate nonnegative quadratic mappings.SIAM. J. Optim. 14(4), 1140–1162 (2004).MathSciNetMATH
33.
Zurück zum Zitat R Feng, Q Li, Q Zhang, J Qin, Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. Veh. Technol. 60(1), 400–405 (2015).CrossRef R Feng, Q Li, Q Zhang, J Qin, Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. Veh. Technol. 60(1), 400–405 (2015).CrossRef
34.
Zurück zum Zitat A Beck, YC Eldar, Strong duality in nonconvex quadratic optimization with two quadratic constraints.SIAM. J. Optim. 17(3), 844–860 (2006).MathSciNetMATH A Beck, YC Eldar, Strong duality in nonconvex quadratic optimization with two quadratic constraints.SIAM. J. Optim. 17(3), 844–860 (2006).MathSciNetMATH
35.
Zurück zum Zitat S Boyd, L Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004).CrossRefMATH S Boyd, L Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004).CrossRefMATH
36.
Zurück zum Zitat I Polik, T Terlaky, in Nonlinear Optimization, ed. by G Di Pillo, F Schoen, and 1. Interior Point Methods for Nonlinear Optimization (SpringerBerlin, 2010). ch.4. I Polik, T Terlaky, in Nonlinear Optimization, ed. by G Di Pillo, F Schoen, and 1. Interior Point Methods for Nonlinear Optimization (SpringerBerlin, 2010). ch.4.
37.
Metadaten
Titel
Robust beamforming and cooperative jamming for secure transmission in DF relay systems
verfasst von
Bin Li
Zesong Fei
Publikationsdatum
01.12.2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-016-0560-1

Weitere Artikel der Ausgabe 1/2016

EURASIP Journal on Wireless Communications and Networking 1/2016 Zur Ausgabe