ArticlePDF Available

Robust AN-Aided Secure Precoding for an AF MIMO Untrusted Relay System

Authors:

Abstract and Figures

Robust artificial noise (AN)-aided secure precoding for an amplify-and-forward multiple-input multiple-output (MIMO) untrusted relay system is studied, where the relay is untrusted and willing to help forwarding multiple data streams from the source to destination. We consider that the available channel state information (CSI) is imperfect and modeled by the worst-case model. Our objective is to maximize the worst-case secrecy rate under the robust transmit power constraints at the source and relay, by jointly designing the signal and AN precoding matrices at the source and the precoding matrix at the relay. The robust secure precoding problem is non-convex and hard to solve. To overcome this difficulty, we propose the weighted minimum mean square error (WMMSE) based method, where the sign-definiteness lemma is used to eliminate the channel uncertainties and an effective iterative optimization algorithm is developed. Simulation results are provided to demonstrate the effectiveness of the proposed scheme.
Content may be subject to copyright.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1
Robust AN-Aided Secure Precoding for an AF
MIMO Untrusted Relay System
Quanzhong Li, Liang Yang, Qi Zhang, and Jiayin Qin
Abstract—Robust artificial noise (AN)-aided secure precod-
ing for an amplify-and-forward multiple-input multiple-output
(MIMO) untrusted relay system is studied, where the relay is
untrusted and willing to help forwarding multiple data streams
from the source to destination. We consider that the available
channel state information (CSI) is imperfect and modeled by
the worst-case model. Our objective is to maximize the worst-
case secrecy rate under the robust transmit power constraints
at the source and relay, by jointly designing the signal and AN
precoding matrices at the source and the precoding matrix at
the relay. The robust secure precoding problem is non-convex
and hard to solve. To overcome this difficulty, we propose the
weighted minimum mean square error (WMMSE) based method,
where the sign-definiteness lemma is used to eliminate the channel
uncertainties and an effective iterative optimization algorithm is
developed. Simulation results are provided to demonstrate the
effectiveness of the proposed scheme.
Index Terms—Robust precoding, untrusted MIMO relay, se-
curity, worst-case.
I. INT ROD UC TI ON
DUE to the openness of wireless transmission medium,
wireless information is susceptible to eavesdropping.
Thus, the secure communication is a critical issue for wireless
systems. Recently, physical layer secure communications for
untrusted multiple-input multiple-output (MIMO) relay sys-
tems are investigated, where the relay is untrusted and cast
as an eavesdropper [1]–[5]. In [1], the authors propose a joint
source and relay secure beamforming scheme to maximize
the achievable secrecy rate and provide asymptotic analysis of
secrecy rate. Considering no direct link between the source and
Copyright (c) 2015 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to pubs-permissions@ieee.org.
This work was supported in part by the National Natural Science Foundation
of China (No. 61672549, No. 61472458), in part by the Guangdong Natu-
ral Science Foundation (No. 2014A030311009, No. 2014A030310374, No.
2014A030311032, No. 2014A030313111, No. 2015A030310264), in part by
the Department of Education of Guangdong Province (No. 2016KZDXM050),
and in part by the Guangzhou Science and Technology Program (No.
201607010098).
Q. Li is with the School of Data and Computer Science, Sun Yat-
sen University, Guangzhou 510006, China, also with the Guangdong Key
Laboratory of Information Security, Guangzhou 510006, China, and also
with the Collaborative Innovation Center of High Performance Computing,
National University of Defense Technology, Changsha 410000, China (e-mail:
liquanzh@mail.sysu.edu.cn).
L. Yang is with the Department of Communication Engineering,
Guangdong University of Technology, Guangzhou 510006, China (e-mail:
liangyang.guangzhou@gmail.com).
Q. Zhang and J. Qin are with the School of Electronics and Information
Technology, Sun Yat-sen University, Guangzhou 510006, China (e-mail:
zhqi26@mail.sysu.edu.cn, issqjy@mail.sysu.edu.cn). J. Qin is also with the
Xinhua College, Sun Yat-sen University, Guangzhou 510520, China.
destination, the authors in [2] propose a joint destination-aided
cooperative jamming and precoding at both the source and
relay scheme. Apart from one-way relaying [1], [2], untrusted
MIMO two-way relay systems are also studied in [3]–[5]. In
[3], jointly optimizing the source and relay beamformers for
maximizing the secrecy sum rate is studied for the two-way
communications. In [4], a physical-layer secret key generation
scheme is proposed, which is based on zero forcing (ZF) and
minimum mean square error (MMSE) channel estimators. In
[5], a technique of the direction rotation alignment is devel-
oped to achieve transmission efficiency as well as security for
MIMO two-way relay channels.
All the above-mentioned works consider perfect channel
state information (CSI). However, in practice, perfect CSI is
hard to obtain due to many reasons, such as channel estimation
and quantization errors [6]. In this paper, we consider the case
of imperfect CSI and study the same system setting as [1], [2],
which consists of one source, one relay and one destination, all
with multi-antennas, where the relay is untrusted and willing
to help forwarding multiple data streams from the source to
destination. We model the imperfect CSI by using the worst-
case model [6]. To enhance the secure communications, we
propose a scheme of joint artificial noise (AN) and signal
precoding at the source and the precoding at the relay, with
the objective of maximizing the worst-case secrecy rate under
robust transmit power constraints at the source and relay.
However, the robust1secure precoding problem is non-convex
and challenging to solve. To deal with this challenge, we
propose the weighted minimum mean square error (WMMSE)
based method, where the sign-definiteness lemma is used to
eliminate the channel uncertainties and an effective iterative
optimization algorithm is developed.
The secure communications over conventional wireless net-
works are considered in [7]–[13], which are different from our
work. The works [7]–[9] focus on point-to-point communica-
tion networks, while the works [10]–[13] study single-antenna
one/two-way relay networks. All the works [7], [8], [10]–
[13] consider perfect CSIs. The robust design with Gaussian
uncertainties is found in [14].
Notations: The AT,A,A,A,|A|, and tr(A)denote
the transpose, conjugate, conjugate transpose, Frobenius norm,
determinant and trace of the matrix A, respectively.
II. SYSTEM MO DE L
Consider a three node MIMO untrusted relay system as in
[1], [2], where a source, a relay, and a destination is equipped
1The word “robust” refers to reducing the performance degradation by
taking the channel errors into account.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2
with M,Nand Lantennas, respectively. Denote the channels
from source to relay, from source to destination, and from relay
to destination as Hsr CN×M,Hsd CL×M, and Hrd
CL×N, respectively. The relay is considered to be untrusted,
which may decode the confidential message of the source,
and thus is regarded as a potential eavesdropper [1], [2]. Note
that the direct signal transmission from source to destination
provides a spatial copy of the source signal, and thus the joint
consideration of the direct link and the relay link transmission
is able to give incremental performance gain, especially when
the direct link is good [1], [3], [6].
The amplify-and-forward (AF) transmission scheme is em-
ployed. Note that the decode-and-forward (DF) relay strategy
is not applicable here since the relay is untrusted and not
expected to decode the received signal from the source. In
the first time slot, the source transmits confidential signal
xCM×1and AN zCM×1simultaneously. Then the
received signal at the relay and destination is respectively
yr=Hsr(Wx +Vz) + nr,(1)
yd,1=Hsd(Wx +Vz) + nd,1,(2)
where x,z CN (0,I),W,VCM×Mis the corre-
sponding precoding matrix for confidential signal and AN,
nr CN (0, σ 2
rI)and nd,1 CN (0, σ 2
d,1I)is the additive
Gaussian noise at the relay and destination, respectively.
The transmit power of the source is constrained to PSas
Ps,W2+V2PS.
In the second time slot, the relay multiplies the received
signal with a precoding matrix FCN×Nand forwards it to
the destination. The received signal at the destination is
yd,2=HrdFHsr (Wx +Vz) + Hrd Fnr+nd,2(3)
where nd,2 CN (0, σ 2
d,2I)is the additive Gaussian noise at
the destination. The transmit power of the relay is constrained
to PRas Pr,FHsrW2+FHsr V2+σ2
rF2PR.
From (1), the achievable rate at the relay is
Rr= 0.5 log |I+WH
srZ1Hsr WW|(4)
where Z=σ2
rI+HsrVVH
sr.
Based on (2) and (3), the received signal at the destination
can be rewritten as
yd=yd,1
yd,2=HsdW
HrdFHsr Wx+˜
nd,1
˜
nd,2(5)
where ˜
nd,1=HsdVz +nd,1and ˜
nd,2=HrdFHsr Vz +
HrdFnr+nd,2. Thus, the achievable rate at the destination is
Rd=0.5 log |I+WH
sd(σ2
d,1I+HsdVVH
sd)1
×HsdW+ (Hrd FHsr W)Q1HrdFHsr W|(6)
where Q=HrdFHsr V(Hrd FHsr V)+σ2
rHrdF(Hr dF)+
σ2
d,2I, and the derivation of (6) can be found in Appendix A.
To characterize the imperfect CSI, we adopt the worse-case
CSI model as in [6], i.e., the actual Hij takes the form as
Hij ={Hij |Hij =ˆ
Hij +ij ,||ij || ϵij }(7)
where ij {sr, rd, sd},ˆ
Hij represents the mismatched chan-
nel obtained by means of channel estimation or quantization,
and ij denotes the channel uncertainty lying in a spectral
norm bounded uncertainty region with a given radius ϵij.
III. RO BU ST SE CU RE PR EC OD IN G
Using (4) and (6)-(7), the robust secure precoding problem
for an AF MIMO untrusted relay system is formulated as
max
F,W,Vmin
Hij ∈Hij
[RdRr]+(8a)
s.t. PsPS,(8b)
PrPR,Hsr Hsr.(8c)
The robust precoding problem (8) is hard to solve because
the objective with log |·| functions is of high non-linearity. To
overcome this non-linearity, we employ the WMMSE based
method [15], which can transform the achievable rate into a
WMMSE problem by introducing some auxiliary variables.
To apply the WMMSE based method, we first introduce the
following result.
Lemma 1 [15]: Define the MSE matrix
M,(DHT I)(DHT I)+DRD(9)
where R0. Then we have
log |M| = max
S0log |S| tr(SM) + tr(I),(10)
log |I+ (HT)R1HT|= max
S0,Dlog |S| tr(SM) + tr(I).
Using the linear equalizer Ddfor the destination to recover
the transmit signal x, i.e., ˆ
x=Ddyd, the MSE matrix Mdat
the destination is given by
Md=E[(ˆ
xx)(ˆ
xx)]
= (D1HsdW+D2˜
FW I)(D1HsdW+D2˜
FW I)
+D1HsdV(D1Hsd V)+σ2
d,1D1D
1+σ2
d,2D2D
2
+D2˜
FV(D2˜
FV)+σ2
rD2HrdF(D2Hr dF)(11)
where ˜
F=HrdFHsr ,Dd= [D1D2].
Applying Lemma 1, we have
2Rd= max
Sd0,Dd
log |Sd| tr(SdMd) + tr(I).(12)
For Rr, we first rewrite it as
Rr=0.5 log |I+σ2
rHsr(WW+VV)H
sr|

,Rr,1
0.5 log |I+σ2
rHsrVVH
sr|

,Rr,2
.(13)
Applying Lemma 1, we can rewrite Rr,1and Rr,2as
Rr,1= max
Sr0tr(Sr(I+σ2
rHsr(WW+VV)H
sr))
+ log |Sr|+ tr(I),(14)
Rr,2= max
Ss0,Ds
log |Ss| tr(SsMs) + tr(I)(15)
where Ms= (DsHsrVI)(DsHsr VI)+σ2
rDsD
s.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 3
Inserting (12)-(15) into (8), we rewrite problem (8) as
max
F,W,V,Dd,Ds,Si0min
Hij ∈Hij
log |Sd|
tr(SdMd) + log |Ss| tr(SsMs) + log |Sr|
tr(Sr(I+σ2
rHsr(WW+VV)H
sr)) (16a)
s.t.(8b),(8c).(16b)
Introducing the slack variables βi,i {s, r, d}, we can further
rewrite problem (16) as
max
F,W,V,Dd,Ds,Si0i
log |Sd|+ log |Ss|
+ log |Sr| βsβrβd(17a)
s.t.tr(SdMd)βd,Hij Hij , ij {sr, rd, sd}(17b)
tr(SsMs)βs,Hsr Hsr (17c)
tr(Sr(I+σ2
rHsr(WW+VV)H
sr)) βr,
Hsr Hsr,(17d)
(8b),(8c).(17e)
Although the objective in (17) is convex, the problem (17)
is still intractable due to the semi-infinite constraints. In the
following, we focus on these semi-infinite constraints and try
to eliminate them.
First, we deal with (17b). To proceed, we rewrite the item
tr(SdMd)in (17b) as
tr(SdMd) =
vec(Rd(D1HsdW+D2˜
FW)Rd)
vec(RdD1HsdV)
vec(σrRdD2HrdF)
vec(RdD2˜
FV)
vec(σd,1RdD1)
vec(σd,2RdD2)
2
.
(18)
where Rd,S
1
2
dand tr(AA) = vec(A)2is used [17].
After inserting (7) into the above equation, and neglect-
ing higher order uncertainty terms, it is possible to recast
tr(SdMd)as tr(SdMd) = ϕd2where
ϕd,ˆ
ϕd+rdvec(rd ) +
j=r,d
sj vec(sj)

,d
,(19)
and
ˆ
ϕd=
vec(Rd(D1ˆ
HsdW+D2ˆ
FW)Rd)
vec(RdD1ˆ
HsdV)
vec(σrRdD2ˆ
HrdF)
vec(RdD2ˆ
FV)
vec(σd,1RdD1)
vec(σd,2RdD2)
(20)
with ˆ
F=ˆ
HrdFˆ
Hsr and subsequently
rd =
(Fˆ
HsrW)T(RdD2)
0
FT(σrRdD2)
(Fˆ
HsrV)T(RdD2)
0
Cm×NL ,(21)
sr =
WT(RdD2ˆ
HrdF)
0
VT(RdD2ˆ
HrdF)
0
Cm×MN ,(22)
sd =
WT(RdD1)
VT(RdD1)
0
Cm×ML ,(23)
where m=N L + 2M L + 3L2and the identity vec(ABC) =
(CTA)vec(B)[17] is used.
Using the Schur complement lemma [17], we can rewrite
the constraint (17b) as
βdˆ
ϕ
d
ˆ
ϕdI 0(d)
d0.(24)
The constraint (24) still contains the uncertainty. To eliminate
this uncertainty, we need the following sign-definiteness lem-
ma.
Lemma 2 [6]: Given a Hermitian matrix Aand arbitrary ma-
trices {Pi,Qi}N
i=1, the semi-infinite Linear Matrix Inequality
(LMI) of the form
A
N
i=1
(P
iYiQi+Q
iY
iPi),Yi:Yi ϵi(25)
holds if and only if there exist nonnegative real numbers
λ1, ..., λNsuch that
AN
i=1 λiQ
iQiϵ1P
1· · · ϵNP
N
ϵ1P1λ1I· · · 0
.
.
..
.
.....
.
.
ϵNPN0· · · λNI
0.
(26)
Using Lemma 2, and by appropriately choosing its param-
eters as follows
Ad=βdˆ
ϕ
d
ˆ
ϕdI,Qd1=Qd2=Qd3= [10](27)
Pd1=0
rd,Pd2=0
sr,Pd3=0
sd,(28)
we can rewrite the constraint (17b) as the following LMI:
βd3
j=1 λdj ˆ
ϕ
d
ˆ
ϕdIΘ
d
Θddiag({λdjI}3
j=1)
0,
(29)
where Θd=[ϵrdPT
d1, ϵsrPT
d2, ϵsdPT
d3]T.
Similarly, we can transform (17c), (17d), and (8c) to the
following corresponding LMIs:
βsλsˆ
ϕ
s
ˆ
ϕsIΘ
s
ΘsλsI
0,(30)
βrλrˆ
ϕ
r
ˆ
ϕrIΘ
r
ΘrλrI
0,(31)
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 4
PRλtˆ
ϕ
t
ˆ
ϕtIΘ
t
ΘtλtI
0,(32)
where
ˆ
ϕs= [vec(RsDsˆ
HsrVRs) vec(σrRsDs)],(33)
ˆ
ϕr= [vec(σ1
rRrˆ
HsrW) vec(σ1
rRrˆ
HsrV) vec(Rr)],
(34)
ˆ
ϕt= [vec(Fˆ
HsrW) vec(Fˆ
HsrV) vec(σrF)],(35)
s= [(VT(RsDs))0],(36)
r= [(WT(σrRr))(VT(σrRr))0],(37)
t= [(WTF)(VTF)0],(38)
Θj=ϵsr[0
j],Rj=S
1
2
j, j =s, r, t. (39)
Based on (29)-(32), we rewrite the robust problem (17) as
max
F,W,V,Dd,Ds,Ri0ii02 log |Rd|+ 2 log |Rs|
+ 2 log |Rr| βsβrβd(40a)
s.t.(29) (32),(8b).(40b)
The problem (40) is no longer semi-infinite, but it is still
non-convex. We note that with fixing a subset of the variables,
problem (40) is convex with respective to F[16]. Similar
results are observed for Ri,Di,Wand V. Then we employ
alternating optimization method to solve problem (40), which
is summarized in Algorithm 1.
Algorithm 1 The Proposed WMMSE Based Iterative Algo-
rithm to Solve Robust Secure Precoding Problem (8)
1: Initialization: set l= 0,W=W(0),V=V(0) ,F=
F(0), and an accuracy parameter ε;
2: repeat
3: l:= l+ 1;
4: Solve (40) to update Diwith the other parameters fixed;
5: Solve (40) to update Rifor fixed Difound in the
previous step;
6: Solve (40) to update Ffor fixed Diand Rifound in
the previous step;
7: Solve (40) to update Vand Wfor fixed F,Diand Ri
found in the previous step;
8: until |z(l)z(l1)| εwhere z(l)is the objective value
in the lth iteration.
Remark 1 (Convergence Analysis): Updating the variables
will only increase or maintain the objective value, thus we
obtain a monotonically increasing sequence of the objective
values of problem (40) which has an upper bound since the
transmit power is limited. Therefore, Algorithm 1 converges.
Remark 2 (Computational Complexity): The computational
complexity of Algorithm 1 is mainly from solving problem
(40), which can be solved using the interior-point method
[16] with the complexity of O(n3.5log(1)) where nis the
number of real optimization variables and εis a given solution
accuracy. Thus, the computational complexity of Algorithm 1
5 10 15 20 25
Iterations
0.6
0.8
1
1.2
1.4
1.6
1.8
2
2.2
2.4
Average Worst-Case Secrecy Rate (bps/Hz)
dsr=1.1
dsr=0.7
Fig. 1. Average worst-case secrecy rate by the WMMSE based iterative
algorithm versus the number of iterations.
is about
Oliter 4M2+ 6N2+ 6L2+ 53.5log(1)(41)
where liter is the iterative number for the convergence of
Algorithm 1.
IV. SIMULATION RESULTS
In this section, we present the computer simulation results
of our proposed robust secure precoding scheme. We assume
that the elements of the channel responses ˆ
Hsr,ˆ
Hrd, and ˆ
Hsd
are independent and identically distributed (i.i.d.) complex
Gaussian random variables with zero mean and variances dn
sr ,
dn
rd , and dn
sd , respectively, where dsr,drd, and dsd denote the
distance from the source to relay, from relay to destiantion, and
from source to destinatino, respectively, and nis the pathloss
exponent setting to be 4. We also assume that all nodes lies in
a straight line and the distances are normalized by dsd = 1 as
in [1]. For simplicity, the noise powers and channel uncertainty
radius are summed to be the same, i.e., σ2
r=σ2
d,1=σ2
d,2=σ2
and ϵsr =ϵrd =ϵsd =ϵ.
In Fig. 1, we present the average worst-case secrecy rate
achieved by the WMMSE based iterative algorithm versus the
number of iterations, where PS2=PR2=15 dB, ϵ=
0.05,dsr = 0.7,1.1, and M=N=L= 3. The initial
point of the WMMSE based iterative algorithm is generated
randomly to satisfy the constraints in (8). It is observed from
Fig. 1 that it takes about 15 iterations for the WMMSE based
iterative algorithm to converge.
In Fig. 2, we present the average worst-case secrecy rate
versus the distance dsr, where PS2=PR2=15 dB,
ϵ= 0.05, and M=N=L= 3. We compare three schemes
including our proposed robust secure precoding scheme (de-
noted as “With AN”), our proposed robust secure precoding
scheme without AN (denoted as “No AN”), and the proposed
secure precoding scheme with perfect CSI (denoted as “Perfect
CSI”). From Fig. 2, we can see that the average worst-case
secrecy rate increases with the distance dsr increasing, because
that the source-relay link will experience a larger path loss.
We can also observe from Fig. 2 that the “With AN” scheme
performs better than the “No AN” scheme, while the “Perfect
CSI” scheme has the best performance.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 5
0.2 0.4 0.6 0.8 1 1.2 1.4
dsr
0
0.5
1
1.5
2
2.5
3
3.5
4
Average Worst-Case Secrecy Rate (bps/Hz)
Perfect CSI
With AN
No AN
Fig. 2. Average worst-case secrecy rate versus dsr; comparison of our
proposed “With AN” scheme, “No AN” scheme and “Perfect CSI” scheme.
0.02 0.04 0.06 0.08 0.1 0.12 0.14
ǫ
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
Average Worst-Case Secrecy Rate (bps/Hz)
Perfect CSI
With AN
No AN
Fig. 3. Average worst-case secrecy rate versus ϵ; comparison of our proposed
“With AN” scheme, “No AN” scheme and “Perfect CSI” scheme.
In Fig. 3, we present the average worst-case secrecy rate
versus channel error radius ϵ, where PS2=PR2=15 dB,
dsr = 0.7, and M=N=L= 3. From Fig. 3, we can see
that the average worst-case secrecy rates by all the schemes
decrease as ϵincreases. The performance gab between the
“With AN”, “No AN” scheme and the “Perfect CSI” scheme
becomes large when ϵgrows.
V. CONCLUSIONS
In this correspondence, we have proposed the robust AN-
aided secure precoding for an AF MIMO untrusted relay
system, where the relay is untrusted and the worst-case C-
SI model is considered. We have developed the WMMSE
based iterative algorithm to solve the robust secure precoding
problem, during each iteration several convex optimization
problems are solved. Simulation results have shown that the
robust AN-aided secure precoding outperforms the scheme
without AN.
APP EN DI X A
THE DE RI VATI ON OF (6)
From (5), the equivalent channel matrix is
Heq =HsdW
HrdFHsr W,(42)
and the equivalent covariance matrix of noises is given by
Qeq =σ2
d,1I+HsdVVH
sd 0
0 Q .(43)
Thus, the achievable rate at the destination in the second
time slot is [15]
Rd=0.5 log |I+H
eqQ1
eq Heq|
=0.5 log |I+WH
sd(σ2
d,1I+HsdVVH
sd)1
×HsdW+ (Hrd FHsr W)Q1HrdFHsr W|.(44)
REF ER EN CE S
[1] C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design
at the source and the relay for an amplify-and-forward MIMO untrusted
relay system,” IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325,
Jan. 2012.
[2] J. Xiong, L. Cheng, D. Ma, and J. Wei, “Destination-aided cooperative
jamming for dual-hop amplify-and-forward MIMO untrusted relay sys-
tems,” IEEE Trans. Veh. Technol., vol. 65, no. 9, pp. 7274-7284, Sept.
2016.
[3] J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO
two-way communications with an untrusted relay, IEEE Trans. Signal
Process., vol. 62, no. 9, pp. 2185-2199, May. 2014.
[4] C. D. T. Thai, J. Lee, and Tony Q. S. Quek, “Physical-layer secret
key generation with colluding untrusted relays,” IEEE Trans. Wireless
Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016.
[5] Q. Liu, G. Gong, Y. Wang, and H. Li, A Novel Physical Layer Security
Scheme for MIMO Two-Way Relay Channels, in 2015 IEEE Globecom
Workshops (GC Wkshps), pp. 1-6, 2015.
[6] E. A. Gharavol and E. G. Larsson, “The sign-definiteness lemma and
its applications to robust transceiver optimization for multiuser MIMO
systems,” IEEE Trans. Signal Process., vol. 61, no. 2, pp. 238-252, Jan.
2013.
[7] N. Zhao, F. R. Yu, M. Li, Q. Yan, and V. C. M. Leung, “Physical layer
security issues in interference-alignment-based wireless networks,” IEEE
Commun. Mag., vol. 54, no. 8, pp. 162-168, 2016.
[8] N. Zhao, F. R. Yu, M. Li, and V. C. M. Leung, Anti-eavesdropping
schemes for interference alignment (IA)-based wireless networks,” IEEE
Trans. Wireless Commun., vol. 15, no. 8, pp. 5719-5732, 2016.
[9] J. Ni, Z. Fei, K.-K. Wong, C. Xing, J. Kuang, and K.- F. Tong, “Robust
coordinated beamforming for secure MISO interference channels with
bounded ellipsoidal uncertainties,” IEEE Wireless Commun. Letters, vol.
2, no. 4, pp. 407-410, 2013.
[10] L. Fan, R. Zhao, F. Gong, et al, “Secure multiple amplify-and-forward
relaying over correlated fading channels, IEEE Trans. Commun., vol. 65,
no. 7, pp. 2811-2820, 2017.
[11] L. Fan, X. Lei, N. Yang, et al, “Secure multiple amplify-and-forward
relaying with co-channel interference,” IEEE Journal of Sel. Topics in
Sig. Proc., vol. 10, no. 8, pp. 1494-1505, 2016.
[12] J. Zhao, Z. Lu, X. Wen, et al, “Resource management based on security
satisfaction ratio with fairness-aware in two-way relay networks, Int. J.
Distrib. Sens. Net., vol. 2015, Article ID 819195, 2015.
[13] H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V.C.M. Leung,
“Secure resource allocation for OFDMA two-way relay wireless sen-
sor networks without and with cooperative jamming, IEEE Trans. on
Industrial Informatics, vol. 12, no. 5, pp. 1714-1725, 2016.
[14] C. Xing, M. Xia, F. Gao, Y.-C. Wu, “Robust transceiver with tomlinson-
harashima precoding for amplify-and-forward MIMO relaying systems,”
IEEE J. Select. Areas Commun., vol. 30, no. 8, pp. 1370-1382, 2012.
[15] Q. Shi, M. Razaviyayn, Z. Q. Luo, and C. He, “An iteratively weighted
MMSE approach to distributed sum-utility maximization for a MIMO
interfering broadcast channel,” IEEE Trans. Signal Process., vol. 59, no.
9, pp. 4331-4340, Sep. 2011.
[16] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
Cambridge Univ. Press, 2004.
[17] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge, U.K.:
Cambridge Univ. Press, 1985.
... This scenario of using untrusted MIMO relays has been widely considered in previous works [26]- [33]. In [26]- [29], a MIMO relay operating in a one-way amplify-and-forward mode is considered to be untrusted. In [30]- [32], secure beamforming design problems with an untrusted two-way MIMO relay have been studied. ...
... Thus, developing a scheme that protects the vulnerable data aggregation from eavesdroppers is reasonable. While quite a few advanced physical layer security strategies (including power allocation [24]- [33], AN [24], [29], [32], cooperative jamming [24], [25], [27], zero-forcing beamforming [24], relay selection [24], [33], etc.) have been proposed to protect the transmission security from potential eavesdroppers in traditional wireless communication systems, they cannot be applied to the AirComp network directly. Because, in many AirComp applications, the AP only requires a function of data available at the distributed sensors rather than the complete information about the data themselves, which makes sensors' secrecy rate commonly used in traditional communications become an unsuitable mensuration in AirComp scenarios. ...
... As in [51], using the property of the Kronecker product Tr(ABCD) = vec A † † D T ⊗ B vec(C) and the diagonal matrix vectorization [52], problem (29) can be further recast as ...
Article
Full-text available
In this paper, we investigate the physical layer security of an untrusted relay assisted over-the-air computation (AirComp) network, where each node is equipped with multiple antennas and the relay is operated in an amplify-and-forward mode. The relay receives the data from each sensor and sends them to the access point (AP) in the first and second time slot, respectively. The AP applies artificial noise (AN) to protect the aggregation of sensors’ data from being wiretapped by the untrusted relay in the first time slot. In particular, we are interested in minimizing the computation distortion measured by the mean-squared error (MSE) via jointly optimizing beamforming matrices at all nodes, subject to the MSE constraint at the relay and individual power constraints at the AP, the relay and each sensor. In the case of the perfect channel state information (CSI), we convert the nonconvex MSE minimization problem into a difference-of-convex (DC) form and propose a constrained concave-convex procedure that can obtain a local minimum to solve the DC problem. We also generalize the framework to an imperfect CSI case where the additional interference term due to incomplete interference cancellation is considered, and the nonconvex robust MSE minimization problem is solved by a proposed inexact block coordinate descent algorithm. Numerical results are presented to show the effectiveness of our proposed schemes.
... However, in practice, perfect CSI is hard to obtain due the channel estimation and quantization errors. To overcome this obstacle, in [15], the authors investigated the untrusted amplify-and-forward (AF) relay design with imperfect CSI, while, in [16], the authors proposed an artificial noise (AN) aided secure precoding for untrusted two-way MIMO relay systems with imperfect CSI. ...
... In this paper, R is assumed to forward the signal to D and, at the same time, acts as an eavesdropper (Eve) which interprets the signal from S. Besides, we assume that only imperfect S, D, and R's CSIs can be obtained. Based on the bounded CSI model in [15,16], the imperfect CSIs are modeled as ...
Article
Full-text available
We consider a secrecy dual-hop amplify-and-forward (AF) untrusted relay network, where the relay is willing to forward the signal to the destination while acting as a potential eavesdropper. Assuming that all these nodes are equipped with multiple antennas, we propose a joint destination aided cooperative jamming and precoding at both the source and the relay scheme, with the objective to maximize the worst case secrecy rate. The formulated problem is highly non-convex due to the maximization of the difference of several logarithmic determinant (log-det) functions in the CSI uncertainty region. To handle this challenge, we propose to linearize these log-det terms. After linearization, we tackle the CSI uncertainty based on epigraph reformulation and the sign-definiteness lemma. Finally, an alternating optimization (AO) algorithm is proposed to solve the reformulated problem. Numerical results are provided to demonstrate the performance of the proposed scheme.
... When the direct link is available, [25] proposed an untrusted relay assignment and link adaptation framework for highly spectrally efficient communications. As a natural extension, two-way untrusted relay networks [26], [27] and multipleinput multiple-output (MIMO) untrusted relay networks [28], [29] were developed. ...
Article
Full-text available
In this paper, we investigate opportunistic secure multiuser scheduling in energy harvesting untrusted relay networks, where an energy-constrained amplify-and-forward (AF) relay harvests energy from the received radio frequency signal via using the power splitting protocol. To exploit the potential advantages (e.g., multiuser diversity and direct links) for secrecy improvement, we examine three opportunistic user scheduling schemes, i.e., optimal scheduling scheme, maximum scheduling scheme, and minimum scheduling scheme. Specifically, the optimal scheduling scheme performs user selection by maximizing the ratio between the signal-to-noise-ratio (SNR) at the destination and the corresponding SNR at the untrusted relay. The maximum scheduling scheme is conventional user selection that maximizes the channel gain of the direct links. For the minimum scheduling scheme, we try to reduce the overheard information at the untrusted relay by selecting the user with the lowest channel gain of the relay links. For these three schemes, we comprehensively examine the achievable secrecy performance including probability of positive secrecy rate, secrecy outage probability (SOP), asymptotic SOP, secrecy throughput (ST), as well as secure energy efficiency (SEE) to help facilitate an energy-efficient secure transmission design. Simulation results demonstrate that the maximum scheduling scheme outperforms the minimum scheduling scheme in terms of SOP at relatively low SNRs and target secrecy rates.
Article
Information exchange through a relay node is attracting attention for applying machine-to-machine communications. If the node demodulates the received signal in relay processing confidentially, the information leakage through the relay station is a problem. In wireless MIMO switching, the frequency spectrum usage efficiency can be improved owing to the completion of information exchange within a short time. This study proposes a novel wireless MIMO switching method for secure information exchange. An overloaded situation, in which the access nodes are one larger than the number of antennas in the relay node, makes the demodulation of the relay node difficult. The access schedule of nodes is required for maintaining the overload situation and the high information exchange efficiency. This study derives the equation model of the access schedule and constructs an access schedule with fewer time periods in the integer programming problem. From the computer simulation, we confirm that the secure capacity of the proposed MIMO switching is larger than that of the original one, and the constructed access schedule is as large as the ideal and minimum time period for information exchange completion.
Article
In this paper, we investigate physical layer security of a dual-hop untrusted multiple amplify-and-forward energy-harvesting relaying network. Two main objectives are considered: saving the relays’ energies and achieving a target secrecy rate. In the presence of direct links between the source and destination nodes, for the first design objective, we propose an adaptive switching scheme between the direct and the relaying modes where the direct link is prioritized. Thus, relay nodes are required only when the direct link fails to achieve the target secrecy rate requirement. For the second design objective, to save energy while forwarding the source information securely, a greedy battery-aware relay-selection scheme is proposed. Furthermore, to reduce the impact of outdated channel state information (CSI) on the system’s secrecy performance, we propose a relay-selection refinement scheme consisting of repeating the relay-selection process prior to the information forwarding phase and we derive a closed-form upper bound of the secrecy outage probability. Our derived upper bound expression shows that our proposed scheme achieves better secrecy performance compared to the direct and conventional two-phase relay transmissions. We also show that, with the relay selection refinement scheme, a significant reduction in the negative impact of outdated CSI is achieved.
Article
Full-text available
In this paper, we investigate the physical layer security of a full-duplex base station (BS) aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver (DR) are both equipped with a single antenna, while a powerful eavesdropper is equipped with multiple antennas. For securing the confidentiality of signals transmitted from the BS and UT, an artificial noise (AN) aided secrecy beamforming scheme is proposed, which is robust to the realistic imperfect state information of both the eavesdropping channel and the residual self-interference channel. Our objective function is that of maximizing the worst-case sum secrecy rate achieved by the BS and UT, through jointly optimizing the beamforming vector of the confidential signals and the transmit covariance matrix of the AN. However, the resultant optimization problem is non-convex and non-linear. In order to efficiently obtain the solution, we transform the non-convex problem into a sequence of convex problems by adopting the block coordinate descent algorithm. We invoke a linear matrix inequality for finding its Karush-Kuhn-Tucker (KKT) solution. In order to evaluate the achievable performance, the worst-case secrecy rate is derived analytically. Furthermore, we construct another secrecy transmission scheme using the projection matrix theory for performance comparison. Our simulation results show that the proposed robust secrecy transmission scheme achieves substantial secrecy performance gains, which verifies the efficiency of the proposed method.
Preprint
Full-text available
In this paper, we investigate the physical layer security of a full-duplex base station (BS) aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver (DR) are both equipped with a single antenna, while a powerful eavesdropper is equipped with multiple antennas. For securing the confidentiality of signals transmitted from the BS and UT, an artificial noise (AN) aided secrecy beamforming scheme is proposed, which is robust to the realistic imperfect state information of both the eavesdropping channel and the residual self-interference channel. Our objective function is that of maximizing the worst-case sum secrecy rate achieved by the BS and UT, through jointly optimizing the beamforming vector of the confidential signals and the transmit covariance matrix of the AN. However, the resultant optimization problem is non-convex and non-linear. In order to efficiently obtain the solution, we transform the non-convex problem into a sequence of convex problems by adopting the block coordinate descent algorithm. We invoke a linear matrix inequality for finding its Karush-Kuhn-Tucker (KKT) solution. In order to evaluate the achievable performance, the worst-case secrecy rate is derived analytically. Furthermore, we construct another secrecy transmission scheme using the projection matrix theory for performance comparison. Our simulation results show that the proposed robust secrecy transmission scheme achieves substantial secrecy performance gains, which verifies the efficiency of the proposed method.
Article
Full-text available
In this paper, we consider a dual-hop amplify-andforward (AF) multiple-input-multiple-output (MIMO) relay network, where the source, relay, and destination are each equipped with multiple antennas. The relay is untrusted if it is willing to forward the signal to the destination and, at the same time, acts as a potential eavesdropper to interpret the message from the source. Since there exists no direct link between the source and the destination, a positive secrecy rate cannot be obtained. Addressing this issue, we propose a joint destination-aided cooperative jamming and precoding at both the source and the relay scheme: joint source, relay, and destination precoding (JP). We target at maximizing the secrecy rate by jointly designing the source, relay, and destination precoding matrices and propose an alternating iterative optimization algorithm to tackle the nonconvex problem. Then, a comprehensive study on the asymptotic performance is conducted in a high signal-to-noise ratio (SNR) regime. In particular, we present simple closed-form expressions for the two key performance parameters in the asymptotic secrecy rate, i.e., the high-SNR slope and the high-SNR power offset. Finally, numerical results are conducted to demonstrate the validity of the proposed secure scheme and its performance analysis.
Article
Full-text available
Information security has been received more and more attention for next-generation wireless sensor networks. In this paper, we consider the problem of resource management based on security satisfaction ratio with fairness-aware in two-way relay networks. Multiple source nodes exchange information with the help of relay node in the presence of an eavesdropper, and diverse security requirements are taken into account with coexistence of security users and normal users. The joint problem of power allocation, and subchannel pairing and allocation aims to maximize the security satisfaction ratio for legitimate users subject to limited power and subchannel constraints. We model the security resource management problem as a mixed integer programming problem, which is decomposed into three subproblems, distributed power allocation, distributed subchannel allocation, and distributed subchannel pairing, and then solved it in constraint particle swarm optimization (CPSO), binary CPSO (B_CPSO), and classic Hungarian algorithm (CHA) method, respectively. Moreover, a suboptimal subchannel pairing algorithm is proposed to reduce the computational complexity compared with the CHA. Simulations are conducted to evaluate the effectiveness of the proposed algorithms.
Article
This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is equipped with multiple antennas and communicates with the destination through multiple AF relays, while the message from the relays can be overheard by an eavesdropper. We focus on the practical communication scenario, where the main and eavesdropper’s channels are correlated. In order to enhance the transmission security, transmit antenna selection (TAS) is performed at the BS, and the best relay is chosen according to the full or partial relay selection criterion, which relies on the dualhop relay channels or the second-hop relay channels, respectively. For these criteria, we study the impact of correlated fading on the network secrecy performance, by deriving an analytical approximation for the secrecy outage probability (SOP) and an asymptotic expression for the high main-to-eavesdropper ratio (MER). From these results, it is concluded that the channel correlation is always beneficial to the secrecy performance of full relay selection. However, it deteriorates the secrecy performance if partial relay selection is used, when the number of antennas at the BS is less than the number of relays.
Article
We investigate the impact of co-channel interference on the security performance of multiple amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data transmission from the source to the destination. The relays are corrupted by multiple co-channel interferers, and the information transmitted from the relays to destination can be overheard by the eavesdropper. In order to deal with the interference and wiretap, the best out of N relays is selected for security enhancement. To this end, we derive a novel lower bound on the secrecy outage probability (SOP), which is then utilized to present two best relay selection criteria, based on the instantaneous and statistical channel information of the interfering links. For these criteria and the conventional maxmin criterion, we quantify the impact of co-channel interference and relay selection by deriving the lower bound on the SOP. Furthermore, we derive the asymptotic SOP for each criterion, to explicitly reveal the impact of transmit power allocation among interferers on the secrecy performance, which offers valuable insights into practical design. We demonstrate that all selection criteria achieve full secrecy diversity order N, while the proposed in this paper two criteria outperform the conventional max-min scheme.
Article
In interference alignment (IA)-based networks, interferences are constrained into certain subspaces at the unin-tended receivers, and the desired signal can be recovered free of interference. Due to the superposition of signals from legitimate users at the eavesdropper, the IA-based network seems to be more secure than conventional wireless networks. Nevertheless, when adequate antennas are equipped, the legitimate information can still be eavesdropped. In this paper, we analyze the performance of the external eavesdropper, and propose two anti-eavesdropping schemes for IA-based networks. When the channel state information (CSI) of eavesdropper is available, zero-forcing scheme can be utilized, in which the transmitted signals are zero-forced at the eavesdropper through the precoding of transmitters in IA-based networks. Furthermore, a more generalized artificial noise (AN) scheme is proposed for IA-based networks without the knowledge of eavesdropper's CSI. In this scheme, a single-stream AN is generated by each user, which will disrupt the eavesdropping without introducing any additional interference to the legitimate transmission of IA-based networks. In addition, the feasibility conditions, transmission rate and eavesdropping rate are analyzed in detail, and an iterative algorithm to achieve the scheme is also designed. Extensive simulation results are provided to verify our analysis results and show the effectiveness of the proposed anti-eavesdropping schemes for IA-based networks.
Article
In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information. Different from most previous key generation schemes, where a key is generated based on a channel coefficient, in the proposed scheme, we use the linear combination of channel coefficients to generate a key. Simulation results show that the rate leaked to the untrusted relays is low and the secret key rate is therefore high. We also point out that the relay communication can achieve higher secret key rate than the direct communication in several distance ranges.
Article
We consider secure resource allocations for orthogonal frequency division multiple access two-way relay wireless sensor networks. The joint problem of subcarrier assignment, subcarrier pairing and power allocations is formulated under scenarios of using and not using cooperative jamming to maximize the secrecy sum rate subject to limited power budget at the relay station and orthogonal subcarrier allocation policies. The optimization problems are shown to be mixed integer programming and non-convex. For the scenario without cooperative jamming, we propose an asymptotically optimal algorithm based on the dual decomposition method, and a suboptimal algorithm with lower complexity. For the scenario with cooperative jamming, the resulting optimization problem is non-convex, and we propose a heuristic algorithm based on alternating optimization. Finally, the proposed schemes are evaluated by simulations and compared to the existing schemes.
Article
This letter addresses the robust optimization problem of downlink coordinated beamforming over the multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM) exploiting imperfect channel state information (CSI) at the transmitters. Our aim is to minimize the total transmitted power subject to the worst-case individual signal-to-interference-plus-noise-ratio (SINR) and equivocation rates. To model the imperfect CSI, bounded ellipsoidal uncertainties for channel vector and covariance are both considered. By deriving the equivalent forms for the SINR and secrecy constraints, the worst-case robust problem can be reformulated as a semi-definite programming (SDP) with the help of rank relaxation. Simulation results show the effectiveness of the proposed algorithm.