Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks

In this paper, we consider a two-way relay network with two sources and multiple cooperative relays in the presence of an eavesdropper. To guarantee the secrecy, a null space beamforming scheme is applied, where the relay beamforming vector lies in the nullspace of the equivalent channel of relay li...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on signal processing Vol. 62; no. 8; pp. 2111 - 2126
Main Authors Yang, Yunchuan, Sun, Cong, Zhao, Hui, Long, Hang, Wang, Wenbo
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 15.04.2014
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1053-587X
1941-0476
DOI10.1109/TSP.2014.2303942

Cover

Loading…
More Information
Summary:In this paper, we consider a two-way relay network with two sources and multiple cooperative relays in the presence of an eavesdropper. To guarantee the secrecy, a null space beamforming scheme is applied, where the relay beamforming vector lies in the nullspace of the equivalent channel of relay link from two sources to the eavesdropper. Our goal is to obtain the optimal beamforming vector as well as two sources' transmit power subject to various criteria. We propose three different approaches and solve them in an alternating iterative way, where subproblems for solving beamforming and sources' power are formulated in each iteration, respectively. First, we minimize the total transmit power under secrecy rate constraint at two sources. For beamforming vector subproblem, two different methods, semi-definite programming (SDP) and sequential quadratic programming (SQP), are proposed, where we analyze and verify SQP has lower complexity than SDP. Second, we maximize the secrecy sum rate, subject to total transmit power constraint. The beamforming vector subproblem is equivalent to a generalized Rayleigh quotient problem with rank constraint. Third, the problem of minimum per-user secrecy rate maximization under the total power constraint is investigated for user fairness. An iterative procedure utilizing the SDP with bisection search method is proposed to solve beamforming subproblem. In each approach the subproblem with two sources' power is formulated as a single variable problem and solved by Newton's method with line search. Simulation results demonstrate the validity of proposed approaches and algorithms for both symmetric and asymmetric scenarios.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1053-587X
1941-0476
DOI:10.1109/TSP.2014.2303942