Next Article in Journal
On the Limiting Behaviour of the Fundamental Geodesics of Information Geometry
Next Article in Special Issue
Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit
Previous Article in Journal
Evaluating the Irregularity of Natural Languages
Previous Article in Special Issue
An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement
Article Menu
Issue 10 (October) cover image

Export Article

Open AccessArticle
Entropy 2017, 19(10), 522; https://doi.org/10.3390/e19100522

Secure Communication for Two-Way Relay Networks with Imperfect CSI

,
,
and
†,*
School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
Current address: No. 10, Xi Tu Cheng Road, Haidian District, Beijing 100876, China.
*
Author to whom correspondence should be addressed.
Received: 30 July 2017 / Revised: 24 September 2017 / Accepted: 26 September 2017 / Published: 29 September 2017
(This article belongs to the Special Issue Information-Theoretic Security)
View Full-Text   |   Download PDF [361 KB, uploaded 30 September 2017]   |  

Abstract

This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rate of the eavesdropper to be upper-bounded. Due to the imperfect CSI, a robust optimization problem is summarized. A novel iterative algorithm is proposed, where the line search technique is applied, and the feasibility is preserved during iterations. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are optimally solved. The optimality property of the robust optimization problem is analyzed. Simulation results show that the proposed algorithm performs very close to the non-robust model with perfect CSI, in terms of the obtained relay transmit power; it~achieves higher secrecy rate compared to the existing work. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally. View Full-Text
Keywords: physical layer security; amplify-and-forward two-way relay; imperfect CSI; robust optimization; line search technique physical layer security; amplify-and-forward two-way relay; imperfect CSI; robust optimization; line search technique
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Sun, C.; Liu, K.; Zheng, D.; Ai, W. Secure Communication for Two-Way Relay Networks with Imperfect CSI. Entropy 2017, 19, 522.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top