TY - GEN
T1 - To secure amplify-and-forward relay systems via joint cooperative beamforming and jamming
AU - Wang, Hui Ming
AU - Xia, Xiang Gen
AU - Yin, Qinye
PY - 2013
Y1 - 2013
N2 - Securing the wireless transmissions in the physical layer is a new perspective of security. In a wireless relay system, cooperative beamforming and jamming are two efficient schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, in most works these two techniques are used in phase II of the cooperative transmission, which leaves the phase I out of protection. In this paper, we propose a joint cooperative beamforming and jamming scheme to enhance the security of a cooperative relay network, where a part of intermediate nodes adopt distributed beamforming while others jam the eavesdropper, simultaneously, such that both phases are secured. Since the instantaneous channel state information (CSI) of the eavesdropper may not be known, we propose a cooperative artificial noise transmission based secrecy strategy, subjected to the individual power constraint of each node. The beamformer weights and power allocation can be obtained by solving a second-order convex cone programming (SOCP) together with a linear programming problem. Simulations show the joint scheme greatly improves the security.
AB - Securing the wireless transmissions in the physical layer is a new perspective of security. In a wireless relay system, cooperative beamforming and jamming are two efficient schemes to improve the physical-layer security in the presence of passive eavesdroppers. However, in most works these two techniques are used in phase II of the cooperative transmission, which leaves the phase I out of protection. In this paper, we propose a joint cooperative beamforming and jamming scheme to enhance the security of a cooperative relay network, where a part of intermediate nodes adopt distributed beamforming while others jam the eavesdropper, simultaneously, such that both phases are secured. Since the instantaneous channel state information (CSI) of the eavesdropper may not be known, we propose a cooperative artificial noise transmission based secrecy strategy, subjected to the individual power constraint of each node. The beamformer weights and power allocation can be obtained by solving a second-order convex cone programming (SOCP) together with a linear programming problem. Simulations show the joint scheme greatly improves the security.
UR - http://www.scopus.com/inward/record.url?scp=84889609673&partnerID=8YFLogxK
U2 - 10.1109/ChinaSIP.2013.6625369
DO - 10.1109/ChinaSIP.2013.6625369
M3 - Conference contribution
AN - SCOPUS:84889609673
SN - 9781479910434
T3 - 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings
SP - 399
EP - 402
BT - 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013 - Proceedings
T2 - 2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013
Y2 - 6 July 2013 through 10 July 2013
ER -