Next Article in Journal
A Robust Method for Ego-Motion Estimation in Urban Environment Using Stereo Camera
Previous Article in Journal
Generic Dynamic Environment Perception Using Smart Mobile Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks

1
Department of Electronic Engineering, Gachon University, Seongnam 13120, Korea
2
Department of Electronic Engineering, Myongji University, Yongin 17058, Korea
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(10), 1726; https://doi.org/10.3390/s16101726
Submission received: 2 September 2016 / Revised: 29 September 2016 / Accepted: 12 October 2016 / Published: 17 October 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we consider a transmit power allocation problem for secure transmission in multi-hop decode-and-forward (DF) full-duplex relay (FDR) networks, where multiple FDRs are located at each hop and perform cooperative beamforming to null out the signal at multiple eavesdroppers. For a perfect self-interference cancellation (PSIC) case, where the self-interference signal at each FDR is completely canceled, we derive an optimal power allocation (OPA) strategy using the Karush-Kuhn-Tucker (KKT) conditions to maximize the achievable secrecy rate under an overall transmit power constraint. In the case where residual self-interferences exist owing to imperfect self-interference cancellation (ISIC), we also propose a transmit power allocation scheme using the geometric programming (GP) method. Numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes.

1. Introduction

To enable secure communication without being eavesdropped on by unintended receivers in wireless networks, physical layer security schemes exploit the physical characteristics of wireless channels with no need for upper-layer operations such as encryption techniques [1]. The rate at which a source can send information securely to an intended receiver is defined as the secrecy rate, and the maximum achievable secrecy rate is referred to as the secrecy capacity. It is known that we can achieve positive secrecy rates when the source-eavesdropper channel is a degraded version of the source-destination channel [2].
To obtain positive secrecy rates, even when the source-destination channel is worse than the source-eavesdropper channel, node cooperation has been extensively studied [3,4,5,6,7,8,9]. In node cooperation approaches, multiple relay nodes located between the source, destination, and eavesdroppers perform cooperative beamforming to enhance physical layer security. Three different operation modes have been suggested for cooperative relays, such as amplify-and-forward (AF), decode-and-forward (DF), and cooperative jamming (CJ) [3,6]. For the AF and DF modes, each relay receives the information signal from the source in the first time slot, whereas it cooperatively forwards the weighted version of its received signal for the AF mode and the weighted version of its re-encoded signal for the DF mode in the second time slot. For the CJ mode, the cooperative relays send weighted jamming signals to interfere with the eavesdropper. In [7], a two-way relay network formed by cooperative relays was considered, where some relays perform cooperative beamforming to receive and forward the signals from the sources, and other relays send jamming signals to confuse the eavesdropper. Furthermore, it was proven that secrecy rates can be further enhanced by using multiple DF relays that form a multi-hop relay network including more than two hops [10].
While the above-mentioned research considered conventional half-duplex relays (HDRs) where time partitioning was required for the transmission and reception of the relays, other research has utilized full-duplex operation that allows simultaneous transmission and reception on the same frequency [11,12,13]. In [11], the destination was designed to be a full-duplex receiver that receives the information signal from the source and transmits jamming signals to the eavesdropper simultaneously. In [12], a full-duplex relay (FDR) was considered in two-hop relay networks and two different full-duplex operation modes were suggested, such as full-duplex relaying and full-duplex jamming. Furthermore, in [13], relay nodes were designed to perform the full-duplex jamming mode in multi-hop relay networks that include more than two hops, where each FDR receives the information signal from the previous node and transmits jamming signals to the eavesdropper at the same time. As long as the self-interference signals induced by the full-duplex operation are properly suppressed by self-interference cancellation (SIC) schemes [14,15,16,17,18], the full-duplex approaches of [11,12,13] are shown to improve the physical layer security significantly.
It is noteworthy that the conventional studies for FDR networks in [12,13] assumed that a single FDR is located at each hop. In this study, we consider cooperative DF FDRs in multi-hop relay networks, where multiple FDRs equipped with a single antenna are located at each individual hop to perform cooperative beamforming to null out the signal at the eavesdroppers. Each FDR is assumed to operate in the full-duplex relaying mode to decode and forward the information signals at the same time instead of transmitting jamming signals. The transmit power allocation problem to maximize the achievable secrecy rate is formulated under an overall transmit power constraint to restrict the consumed power summed across the source and relays within a given limit. The power allocation problems for secure communication in relay networks are also found in [19,20,21]. While [19] takes into account a two-hop relay network with a single DF HDR, and a two-way relay network formed by a single AF HDR was considered in [20,21], our research considers a power allocation problem in a multi-hop relay network including more than two hops formed by multiple cooperative DF FDRs. We first considered a perfect self-interference cancellation (PSIC) case, where the self-interference at each FDR was perfectly canceled, and derived an optimal power allocation (OPA) strategy using the Karush-Kuhn-Tucker (KKT) conditions [22]. In the case where the residual self-interference signals remained due to the imperfect self-interference cancellation (ISIC), we also proposed a transmit power allocation scheme using the geometric programming (GP) method [22,23].
The remainder of this paper is organized as follows. Section 2 describes a signal model for multi-hop DF FDR networks considered in this research and describes the designs of a cooperative beamformer at each individual hop. In Section 3, we derive a transmit power allocation problem under the overall transmit power constraint and the DF relaying constraints. For the PSIC and ISIC cases, we solve the transmit power optimization problem using the KKT conditions and the GP method, respectively. Section 4 presents numerical results to verify the secrecy rate performance of the proposed power allocation schemes. Concluding remarks are provided in Section 5.

2. System Description

As shown in Figure 1, we consider a wireless ( N + 1 ) -hop DF FDR network consisting of one source node S, trusted FDRs, one destination node D, and T E eavesdroppers. Let R n be a set of T n FDRs located at the nth relay position with n = 1 , 2 , , N , which perform cooperative beamforming. Furthermore, we define E as a set of eavesdroppers. All nodes are assumed to be equipped with a single antenna. Each DF FDR decodes the signal from the previous adjacent nodes and forwards the weighted version of the re-encoded signal to the next adjacent nodes at the same time. The relays and D are assumed to receive the signal from the nodes located at their adjacent hops due to the propagation loss, whereas the eavesdroppers are assumed to overhear S as well as all the relays. For simplicity, we index S and R n by 0 and n, respectively. All channels are assumed to undergo flat fading. We let h 0 , 1 and h N , D denote T 1 × 1 and 1 × T N complex channel vectors from S to R 1 and from R N to D, respectively. H n , n + 1 is defined as a T n + 1 × T n complex channel matrix from R n to R n + 1 . Furthermore, h 0 , E is a T E × 1 complex channel vector from S to E, and H n , E is a T E × T n complex channel vector from R n to E. The noise at each node is assumed to be complex additive white Gaussian with zero-mean and variance σ 2 .

2.1. Signal Model

In the ith time slot, S is assumed to send a data symbol x i to R 1 . The FDRs in R 1 receive x i from S and send weighted versions of x i 1 at the same time, which has been received and decoded in the ( i 1 ) th time slot. In the same manner, the FDRs in R n send weighted versions of x i n to R n + 1 and receive x i n + 1 from R n 1 . Finally, the FDRs in R N send x i N to D and receive x i N + 1 from R N 1 . The received signals at the relays can be expressed as
y 1 = P 0 h 0 , 1 x i + H 1 , 1 w 1 x i 1 ̲ + H 2 , 1 w 2 x i 2 ̲ + z 1 , y n = H n 1 , n w n 1 x i n + 1 + H n , n w n x i n ̲ + H n + 1 , n w n + 1 x i n 1 ̲ + z n , n = 2 , 3 , , N 1 , y N = H N 1 , N w N 1 x i N + 1 + H N , N w N x i N ̲ + z N ,
where x i has unit power, P 0 is the transmit power of S, w n is a T n × 1 beamforming vector stacking the weights of the FDRs in R n with w n w n = P n , ( . ) denotes conjugated transpose, P n is the sum of the transmit powers of the FDRs in R n , and z n is a T n × 1 additive white Gaussian noise (AWGN) vector at R n . Note that the underlined terms in Equation (1) denote residual self-interferences after the SIC. The transmitted signal by the tth relay of R n induces its own self-interference and reaches the other FDRs in R n because they are located close to each other. Here, H n , n is a T n × T n complex channel matrix for the residual self-interference due to the transmission of R n . In particular, the tth column of H n , n contains the complex channel gain for the residual self-interference induced by the transmission of the tth relay of R n for all the FDRs in R n . Moreover, the transmission of R n + 1 , originally destined for the next adjacent nodes, may reversely reach the FDRs in R n due to our assumption that the relays can hear nodes located at their adjacent hops. Keeping in mind that the FDRs in R n already know what the FDRs in R n + 1 have sent, we can also suppress these interferences using the conventional SIC schemes of [14,15,16,17,18]. H n + 1 , n in Equation (1) is the complex T n × T n + 1 channel matrix for the residual interferences at the FDRs in R n that are induced by the transmission of R n + 1 . The received signals at D and E are given as
y D = h N , D w N x i N + z D ,
y E = P 0 h 0 , E x i + n = 1 N H n , E w n x i n + z E ,
where z D and z E are the AWGN at D and E, respectively.

2.2. Cooperative Beamformer Design

Let us assume that global channel state information (CSI) is available because the eavesdropper is a legitimate user in the network and its transmission can be monitored [24]. In this scenario, the eavesdropper is assumed to be a low-level user able to access less information than the destination. In the case where only imperfect or partial CSI is available [25], we expect that our proposed scheme can be modified to cooperate with artificial noise-assisted techniques [26,27], where the spatial degrees of freedom provided by multiple cooperative relays at each hop are exploited to send artificially generated noise signals. In particular, for the residual self-interference channels, we assume that H n , n and H n , n + 1 are not available. If H n , n and H n , n + 1 are available, we can cancel even the residual self-interferences, which implies that the SIC is always perfect. Here, let us assume that only the residual self-interference powers are measurable.
Let us consider the design of w n to null out the signals at E. In order to determine w n with n = 1 , 2 , , N 1 , we incorporate the zero-forcing (ZF) approach in [3] with the max–min fair beamforming of [28] to null out the signals at E and maximize the minimum channel gain in R n + 1 shown as
w ¯ n = argmax w ˜ n min t = 1 , , T n + 1 | h n , n + 1 ( t ) ( I T n P n , E ) w ˜ n | 2 ,
where w ¯ n w ¯ n = 1 , h n , n + 1 ( t ) is the tth row of H n , n + 1 , I T n is a T n × T n identity matrix, and P n , E is the orthogonal projection matrix onto the subspace spanned by H n , E given as [3]
P n , E = H n , E ( H n , E H n , E ) 1 H n , E ,
where ( . ) denotes conjugated transposition. We can solve the optimization problem in Equation (4) by following the max-min fair beamforming approach of [28], which is highlighted in Appendix A. After obtaining w ¯ n , we compute w n as
w n = P n ( I T n P n , E ) w ¯ n ( I T n P m , E ) w ¯ n ,
where n = 1 , 2 , , N 1 . Furthermore, we determine w N to null out the signals at E shown as [3]
w N = P N ( I T N P N , E ) h N , D ( I T N P N , E ) h N , D .
Since all of the above beamformers null out the signals at E, each eavesdropper can receive the signal only from S and Equation (3) can be simply given as
y E = P 0 h 0 , E x i + z E .

3. Transmit Power Allocation

In Equations (2) and (8), the rates at D and E are given as
R d = log 2 1 + α N , D P N ,
R e = log 2 1 + α 0 , E P 0 ,
where
α N , D = | h N , D w N | 2 σ 2 , α 0 , E = max t = 1 , , T E | h 0 , E ( t ) | 2 σ 2 ,
and h 0 , E ( t ) is the tth entry of h 0 , E . Using Equations (9) and (10), we compute the achievable secrecy rate as R s = max { R d R e , 0 } . In Equation (1), we compute the rate at the tth relay of R n given as
R n ( t ) = log 2 1 + α n 1 , n ( t ) P n 1 1 + β n , n ( t ) P n + β n + 1 , n ( t ) P n + 1 , R N ( t ) = log 2 1 + α N 1 , N ( t ) P N 1 1 + β N , N ( t ) P N ,
where n = 1 , 2 , , N 1 and
α n 1 , n ( t ) = | h n 1 , n ( t ) w n 1 | 2 σ 2 ,
β n , n ( t ) = | h n , n ( t ) w n | 2 σ 2 , β n + 1 , n ( t ) = | h n + 1 , n ( t ) w n + 1 | 2 σ 2 .
Here, h n , n ( t ) and h n + 1 , n ( t ) denote the tth row of H n , n and H n + 1 , n , respectively. It is also meaningful to exploit a multi-antenna relay equipped with T n antennas at the nth relay position instead of T n single-antenna relays. In this case, Equation (12) should be modified for the rate at the multi-antenna relay, assuming that it performs maximal ratio combining [29].
In order to guarantee that each DF relay correctly decodes the information from the previous nodes and forwards it to the next nodes, we must consider the DF relaying constraints, where the rates at the relays are greater than or equal to R d , (i.e., R n ( t ) R d ). Under an overall power constraint P, we derive the optimization problem for transmit power allocation to maximize the achievable secrecy rate given as
max P 0 , P 1 , P N R d R e , s . t . R n ( t ) R d , t = 1 , 2 , , T n , n = 1 , 2 , , N , n = 0 N P n P , 0 P n P , n = 0 , 1 , , N .
We first consider the PSIC case where the self-interference is completely removed and derive the OPA using the KKT conditions. Then, the GP-based power allocation (GPPA) is also proposed for the ISIC case.

3.1. Optimal Power Allocation for PSIC

For the PSIC case, we have β n , n ( t ) = β n + 1 , n ( t ) = 0 for all t and n. Substituting Equations (9), (10) and (12) into Equation (15), we rewrite the optimization problem in Equation (15) as
min P 0 , P 1 , P N log 2 1 + α 0 , E P 0 log 2 1 + α N , D P N , s . t . α N , D P N α n , n + 1 P n 0 , n = 0 , , N 1 , n = 0 N P n P , 0 P n P , n = 0 , 1 , , N ,
where α n , n + 1 = min t = 1 , , T n + 1 α n , n + 1 ( t ) . In Appendix B, we have proven the following:
  • We can achieve positive secrecy rates only when α 0 , 1 > α 0 , E , and the OPA is given by
    P n = γ α n , n + 1 P , P N = γ α N , D P ,
    where n = 0 , 1 , , N 1 and
    γ = 1 n = 0 N 1 1 α n , n + 1 + 1 α N , D .
  • We have no choice but to obtain zero secrecy rates when α 0 , 1 α 0 , E .
Note that the OPA for the PSIC case is given in a simple closed form. As discussed in Appendix B, the OPA in Equation (17) satisfies the overall power constraint and the DF relaying constraints with equality, which depend only on the channel conditions between S, R n , and D (i.e., α n , n + 1 with n = 0 , 1 , , N 1 and α N , D ). It is noteworthy that the channel conditions for E (i.e., α 0 , E ) only influence whether positive secrecy rates can be achieved or not.

3.2. GP-Based Power Allocation for ISIC

Now, let us consider that the residual self-interference exists due to the ISIC, which implies that β n , n ( t ) and β n + 1 , n ( t ) are non-zero. Substituting Equations (9), (10) and (12) into Equation (15) with β n , n ( t ) and β n + 1 , n ( t ) , we obtain
max P 0 , P 1 , P N 1 + P N α N , D 1 + P 0 α 0 , E , s . t . P n 1 α n 1 , n ( t ) 1 + P n β n , n ( t ) + P n + 1 β n + 1 , n ( t ) P N α N , D , t = 1 , 2 , , T n , n = 1 , , N 1 , P N 1 α N 1 , N ( t ) 1 + P N β N , N ( t ) P N α N , D , t = 1 , 2 , , T N , n = 0 N P n P , 0 P n P , n = 0 , 1 , , N .
Since it is difficult to obtain the optimal solution of Equation (19), we propose a suboptimal approach to maximize the lower bound of the objective function, P N α N , D 1 + P 0 α 0 , E [23], which is equivalent to minimizing 1 + P 0 α 0 , E P N α N , D . Then, we obtain
min P 0 , P 1 , P N 1 α N , D P N 1 + α 0 , E α N , D P 0 P N 1 , s . t . α N , D α n 1 , n ( t ) P n 1 1 P N ( 1 + β n , n ( t ) P n + β n + 1 , n ( t ) P n + 1 ) 1 , t = 1 , 2 , , T n , n = 1 , , N 1 , α N , D α N 1 , N ( t ) P N 1 1 P N ( 1 + β N , N ( t ) P N ) 1 , t = 1 , 2 , , T N , 1 P n = 0 N P n 1 , 0 P n P , n = 0 , 1 , , N .
Note that Equation (20) is a GP problem and the solution can be obtained by the GP solver [30]. Since we have N + 1 optimizing variables and N + 2 + n = 1 N T n constraints, the complexity of solving Equation (20) is O ( ( N + 1 ) 3 ( N + 2 + n = 1 N T n ) ) [31]. The detailed complexity analysis for solving a GP problem can be found in [32,33]. We refer to the above power allocation strategy as the GPPA scheme.

4. Numerical Results

In this section, numerical results are presented to verify the secrecy rate performance of the proposed power allocation schemes. We assumed that S, R n , and D are located in a line as in [3] and [6], whereas the eavesdroppers are located vertically away from the line. The path losses from R n to their adjacent nodes were assumed to be almost the same, considering that the distances between the FDRs in R n themselves are much smaller than the distances between R n and their adjacent nodes. Similarly, it was also assumed that the eavesdroppers were closely located and the path losses from the other node to E are almost the same. The S- R 1 , R n - R n + 1 , and R N -D distances are denoted as d 0 , 1 , d n , n + 1 , and d N , D , respectively. Furthermore, the S-E and R n -E distances are computed as d 0 , E = d E 2 + d E x 2 and d n , E = d E 2 + ( d 0 , n d E x ) 2 , respectively, where d 0 , n = m = 0 n 1 d m , m + 1 . It was assumed that channels between any two nodes follow a line-of-sight (LOS) model, where each channel coefficient is evaluated by d c 2 e j θ , where d is the distance between the nodes, θ is a random phase uniformly distributed within [ 0 , 2 π ) , and c = 3.5 is the path loss exponent [3,6]. In particular, the residual self-interference channels were also assumed to follow the LOS channel model, and the channel gains for H n , n and H n + 1 , n were set to be η dB smaller than those for h 0 , 1 for n = 1 and those for H n 1 , n for n = 2 , , N . In the following results, we set σ 2 = 30 dBm, N = 2 , T 1 = T 2 = T , and d 0 , 1 = d 1 , 2 = d 2 , D = 100 m.
For comparison, we also considered the secrecy rates of the HDRs. In the HDR network, the even-indexed relays were assumed to receive the signal from the previous adjacent nodes in the even time slots and to forward the re-encoded signal to the next adjacent nodes in the odd time slots, whereas the odd-indexed relays performed reception in the odd time slots and transmission in the even time slots. When the beamformers of Equations (6) and (7) were used, it was found that the power allocation problem in the HDR network was the same as that in the FDR network for the PSIC in Equation (16), except that the objective function was multiplied by one half because two time slots are required for the reception and transmission of HDRs. Therefore, the OPA of the HDR was obviously the same as that of the FDR for the PSIC, while the secrecy rate of the HDR with OPA was one half of that of the FDR with OPA for the PSIC. In addition, we also evaluated the secrecy rates for the FDRs with equal power allocation (EPA), where P n = P N + 1 with n = 0 , 1 , , N .
Figure 2 compares the secrecy rates as a function of η when T = 4 , T E = 1 , d E x = 150 m, d E = 10 m, and P = 60 dBm. The decrease of η implies that the residual self-interference signals became stronger. Note that the FDR for the PSIC and the HDR do not depend on η. It was observed that the FDR with OPA for the PSIC provided the best performance. Furthermore, the secrecy rate of the FDR with EPA was worse than that of the HDR with OPA, even though the self-interference signals were perfectly canceled. When we employ OPA for the FDR, even though the residual self-interference exists due to the ISIC, the secrecy rate was found to decrease steeply with the decrease of η, and η > 20 dB should be guaranteed to provide a better secrecy rate than the HDR with OPA. In this case, the FDR with GPPA outperformed the FDR with OPA and required η > 16 dB to provide a better secrecy rate than the HDR with OPA. This confirms that the OPA in Section 3.1 provided the best secrecy rate for the PSIC, while it was not robust for the ISIC. For the ISIC, we have to use the GPPA in Section 3.2 to enhance the secrecy rate.
Figure 3 shows how the secrecy rates vary with d E x when T = 4 , T E = 2 , d E = 10 m, and P = 60 dBm. As expected, the secrecy rate increases as E moves away from S. It was also confirmed that the FDR with OPA was the best power allocation strategy for the PSIC, while it provided severely degraded performance in all ranges of d E x for the ISIC. In particular, the FDR with OPA for η = 20 dB provided better performance than the HDR with OPA only when d E x > 170 m. However, the FDR with GPPA was shown to outperform the HDR with OPA when d E x > 125 m. It was noted for the ISIC that the FDR with GPPA was superior to the FDR with OPA in all ranges of d E x .
In Figure 4, the secrecy rates are compared as a function of P when T = 4 , T E = 2 , d E x = 150 m, and d E = 10 m. For the PSIC, the secrecy rate of the FDR with OPA provided the best performance in all ranges of P and increased with an increase of P, while the FDR with EPA was worse than the HDR with OPA in all ranges of P. Next, let us focus on the secrecy rates for the ISIC. As the overall transmit power P increases, more transmit power will be assigned to each relay (i.e., P n will increase). When the self-interference channel gain η is given, it is evident that the increase of P n results in an increase of the self-interference signal power. For η = 20 dB, the secrecy rate of the FDR with OPA was found to increase until P < 55 dBm, while it decreased with an increase of P and approached zero when P > 55 dBm. These observations indicate that the residual self-interference severely affected the secrecy rate performance of the FDR with OPA as the overall transmit power increased. However, it is remarkable that the FDR with GPPA prevented the secrecy rate from decreasing with an increase of P, and its secrecy rate performance almost converged when P > 55 dBm. For η = 25 dB at P > 60 dBm, it was observed that the secrecy rate of the FDR with OPA decreased to zero with an increase of P, while the FDR with GPPA provided the converged secrecy rate and still outperformed the HDR with OPA.
In Figure 5, we present the secrecy rates according to T E when T = 6 , d E x = 150 m, d E = 10 m, and P = 60 dBm. The secrecy rates are found to decrease with an increase in T E . In particular, the FDR with OPA for η = 20 dB achieves only 27% to 34% of the secrecy rate of that for the PSIC and is even worse than the HDR with OPA in all ranges of T E . Meanwhile, the FDR with GPPA of η = 20 dB achieves 51% to 62% of the secrecy rate of the FDR with OPA for the PSIC. For η = 25 dB, it is also seen that the FDR with OPA achieves 65% to 71% of the secrecy rate of that for the PSIC, whereas the FDR with GPPA achieves 74% to 79% in all ranges of T E . This also confirms that the FDR with OPA is vulnerable to the ISIC and that the GPPA scheme can be utilized to enhance the secrecy rates for the ISIC even in the presence of multiple eavesdroppers.

5. Conclusions

In this study, we investigated the secrecy rate of multi-hop DF FDR networks under the overall transmit power constraint when the cooperative beamformer at each individual hop was designed to null out the signals at the eavesdroppers. Using the KKT conditions, we proved that the OPA for PSIC to maximize the achievable secrecy rate was obtained when the overall transmit power constraint and the DF relaying constraints held with equality, which depended on the channel conditions between the source, FDRs, and destination. The channel conditions for the eavesdroppers only influenced whether positive secrecy rates could be achieved. In the case where residual self-interference signals existed owing to the ISIC, we also proposed a suboptimal GPPA scheme to maximize the lower bound of the achievable secrecy rate. From numerical results, we found that the FDR with OPA for PSIC doubled the secrecy rate of the conventional HDR with OPA, while it was vulnerable to the residual self-interference power. For the ISIC, the GPPA scheme was shown to significantly enhance the immunity to the residual self-interference power.
multiple

Acknowledgments

This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2014R1A1A1A05005551) and in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. NRF-2015R1D1A1A01057100).

Author Contributions

Jong-Ho Lee and Yong-Hwa Kim conceived the idea of the proposed scheme and performed the modeling and simulation of the proposed scheme. Illsoo Sohn provided substantial comments on the performance analysis of the proposed scheme.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In Equation (4), we use the fact that | h n , n + 1 ( t ) ( I T n P n , E ) w ˜ n | 2 = tr ( H ( t ) W ˜ n ) , where tr(.) denotes trace operations, W ˜ n = w ˜ n w ˜ n , and
H ( t ) = h n , n + 1 ( t ) ( I T n P n , E ) h n , n + 1 ( t ) ( I T n P n , E ) .
Then, the optimization problem in Equation (4) can be rewritten as
max W ˜ n min t = 1 , , T n + 1 tr ( H ( t ) W ˜ n ) , s . t . tr ( W ˜ n ) = 1 , W ˜ n 0 , rank W ˜ n = 1 ,
where W ˜ m 0 indicates that W ˜ m must be a symmetric positive semidefinite matrix. Using semidefinite relaxation [34,35], we drop the rank constraint in Equation (A2). Then, we can rewrite Equation (A2) as [22]
max W ˜ n , τ τ , s . t . tr ( H ( t ) W ˜ n ) τ , t = 1 , , T n + 1 , tr ( W ˜ n ) = 1 , W ˜ n 0 .
We convert the inequality constraints in Equation (A3) to the equality constraints to obtain
min W ˜ n , τ , s t τ , s . t . τ s t + vec ( W ˜ n T ) T vec ( H ( t ) ) = 0 , τ 0 , s t 0 , t = 1 , , T n + 1 , tr ( W ˜ n ) = 1 , W ˜ n 0 ,
which can be solved by SeDuMi [36] and Yalmip [37]. When the solution of Equation (A4), W n , is of rank one, its principal eigenvector can be used as w ¯ n . If the rank of W n is higher than one, we employ a randomization technique [28]. In this study, we eigendecompose W n as W n = U Λ U and generate a set of candidate weight vectors, w ˇ k = U Λ 1 / 2 v k , where each entry of v k is e j θ and θ is independently and uniformly distributed on [ 0 , 2 π ) . Then, we choose the best result to provide the greatest min t | h n , n + 1 ( t ) ( I T n P n , E ) w ˇ k | 2 .

Appendix B

The KKT conditions for Equation (16) are given as [22]
α 0 , E 1 + α 0 , E P 0 α 0 , 1 μ 0 + μ N = 0 ,
α n , n + 1 μ n + μ N = 0 , n = 1 , , N 1 ,
α N , D 1 + α N , D P N + α N , D n = 0 N 1 μ n + μ N = 0 ,
α N , D P N α n , n + 1 P n 0 , n = 0 , , N 1 ,
n = 0 N P n P 0 ,
μ n ( α N , D P N α n , n + 1 P n ) = 0 , n = 0 , , N 1 ,
μ N n = 0 N P n P = 0 ,
μ n 0 , n = 0 , , N .
It is seen that Equation (B2) yields μ n = μ N α n , n + 1 with n = 1 , , N 1 . Since μ N 0 in Equation (B8), let us consider two cases with μ N = 0 and μ N > 0 .
When μ N = 0 , we have μ n = 0 with n = 1 , , N 1 . In this case, the KKT conditions in Equations (B1)–(B8) are simplified as follows:
α 0 , E 1 + α 0 , E P 0 α 0 , 1 μ 0 = 0 ,
α N , D 1 + α N , D P N + α N , D μ 0 = 0 ,
α N , D P N α n , n + 1 P n 0 , n = 0 , , N 1 ,
n = 0 N P n P 0 ,
μ 0 ( α N , D P N α 0 , 1 P 0 ) = 0 ,
μ 0 0 .
In Equations (B9) and (B10), it is found that
μ 0 = α 0 , E / α 0 , 1 1 + α 0 , E P 0 = 1 1 + α N , D P N > 0 .
Since μ 0 > 0 , we have α N , D P N = α 0 , 1 P 0 in Equation (B13). Substituting it into Equation (B15), we found that α 0 , E 1 + α 0 , E P 0 = α 0 , 1 1 + α 0 , 1 P 0 should be satisfied. This is guaranteed only when α 0 , E = α 0 , 1 , which results in α 0 , E P 0 = α N , D P N . Then, it is obvious that the secrecy rate becomes zero in Equation (16).
Now, we consider the case with μ N > 0 , which yields μ n > 0 with n = 1 , , N 1 . The KKT conditions in Equations (B1)–(B8) are written as
α 0 , E 1 + α 0 , E P 0 α 0 , 1 μ 0 + μ N = 0 ,
1 1 + α N , D P N + μ 0 + n = 1 N 1 1 α n , n + 1 + 1 α N , D μ N = 0 ,
α N , D P N α 0 , 1 P 0 0 , n = 0 , , N 1 ,
α N , D P N = α n , n + 1 P n , n = 1 , , N 1 ,
n = 0 N P n = P ,
μ 0 ( α N , D P N α 0 , 1 P 0 ) = 0 ,
μ 0 0 .
In Equation (B16), one can find that μ 0 > 0 is always true when μ N > 0 , which yields
α N , D P N = α 0 , 1 P 0 .
From Equations (B19), (B20) and (B23), the optimal power allocation is found to satisfy
α N , D P N = α n , n + 1 P n , n = 0 , , N 1 , n = 0 N P n = P ,
which implies that the DF relaying constraints and the overall power constraint hold with equality. The solution of Equation (B24) is given in Equation (17). In order to confirm the validity of the solution, we have to check that μ N > 0 . From Equations (B16) and (B17), we obtain
μ N = γ ( α 0 , 1 α 0 , E ) α 0 , 1 ( 1 + α 0 , 1 P 0 ) ( 1 + α 0 , E P 0 ) ,
where γ is defined in Equation (18). It is observed that the condition of α 0 , 1 > α 0 , E guarantees μ N > 0 .
In the above derivation, we have found that the two cases μ N = 0 and μ N > 0 correspond to the channel conditions α 0 , 1 = α 0 , E and α 0 , 1 > α 0 , E , respectively. When α 0 , 1 < α 0 , E , we have the relation of
α N , D P N α 0 , 1 P 0 < α 0 , E P 0 ,
owing to the DF relaying constraint. In this case, it is obviously impossible to achieve positive secrecy rates.

References

  1. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  4. Zhang, J.; Gursoy, M.C. Relay beamforming strategies for physical-layer security. In Proceedings of the 44th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 17–19 March 2010; pp. 1–6.
  5. Zheng, G.; Choo, L.; Wong, K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 2011, 59, 1317–1322. [Google Scholar] [CrossRef]
  6. Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar] [CrossRef]
  7. Wang, H.-M.; Luo, M.; Yin, Q.; Xia, X.-G. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 2007–2020. [Google Scholar] [CrossRef]
  8. Wang, H.-M.; Liu, F.; Yang, M. Joint cooperative beamforming, jamming and power allocation to secure AF relay systems. IEEE Trans. Veh. Technol. 2015, 64, 4893–4898. [Google Scholar] [CrossRef]
  9. Wang, H.-M.; Xia, X.-G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015, 53, 47–53. [Google Scholar] [CrossRef]
  10. Lee, J.-H. Optimal power allocation for physical layer security in multi-hop DF relay networks. IEEE Trans. Wirel. Commun. 2016, 15, 28–38. [Google Scholar] [CrossRef]
  11. Zheng, G.; Krikidis, I.; Li, J.; Petropulu, A.P.; Ottersten, B. Improving physical layer security using full-duplex jamming receivers. IEEE Trans. Signal Process. 2013, 61, 4962–4974. [Google Scholar] [CrossRef]
  12. Chen, G.; Gong, Y.; Xiao, P.; Liu, Y.; Chambers, J.A. Physical layer network security in the full-duplex relay system. IEEE Trans. Inf. Forensics Secur. 2015, 10, 574–583. [Google Scholar] [CrossRef]
  13. Lee, J.-H. Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Commun. Lett. 2015, 19, 525–528. [Google Scholar] [CrossRef]
  14. Duarte, M.; Dick, C.; Sabharwal, A. Experiment-driven characterization of full-duplex wireless systems. IEEE Trans. Wirel. Commun. 2012, 11, 4296–4307. [Google Scholar] [CrossRef]
  15. Bharadia, D.; McMilin, E.; Katti, S. Full duplex radios. In Proceedings of the Annual Conference of the Special Interest Group on Data Communication (SIGCOMM), Hong Kong, China, 12–16 August 2013; pp. 375–386.
  16. Lee, J.-H. Self-interference cancelation using phase rotation in full-duplex wireless. IEEE Trans. Veh. Technol. 2013, 62, 4421–4429. [Google Scholar]
  17. Bharadia, D.; Katti, S. Full duplex MIMO radios. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, Seattle, WA, USA, 2–4 April 2014; pp. 359–372.
  18. Lee, J.-H.; Choi, J.; Jung, J.-H.; Kim, S.-C.; Kim, Y.-H. Analog cancellation for full-duplex wireless in multipath self-interference channels. IEICE Trans. Commun. 2015, E98-B, 646–652. [Google Scholar] [CrossRef]
  19. Jeong, C.; Kim, I.-M. Optimal power allocation for secure multicarrier relay systems. IEEE Trans. Signal Process. 2011, 59, 5428–5442. [Google Scholar] [CrossRef]
  20. Zhao, J.; Lu, Z.; Wen, X.; Zhang, H.; He, S.; Jing, W. Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks. Int. J. Distrib. Sens. Netw. 2015, 2015, 819195. [Google Scholar] [CrossRef]
  21. Zhang, H.; Xing, H.; Cheng, J.; Nallanathan, A.; Leung, V.C.M. Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inform. 2015, PP, 1. [Google Scholar] [CrossRef]
  22. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  23. Huang, J.; Swindlehurst, A.L. Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal Process. 2011, 59, 4871–4884. [Google Scholar] [CrossRef]
  24. Bloch, M.; Barros, J.O.; Rodrigues, M.R.D.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory. 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  25. Wang, X.; Wang, K.; Zhang, X. Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol. 2013, 62, 2140–2155. [Google Scholar] [CrossRef]
  26. Liao, W.-C.; Chang, T.-H.; Ma, W.-K.; Chi, C.-Y. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-added approach. IEEE Trans. Signal Process. 2011, 59, 4871–4884. [Google Scholar] [CrossRef]
  27. Liao, P.-H.; Lai, S.-H.; Lin, S.-C.; Su, H.-J. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [Google Scholar]
  28. Sidiropoulos, N.D.; Davidson, T.N.; Lou, Z. Transmit beamforming for physical-layer multicasting. IEEE Trans. Signal Process. 2006, 54, 2239–2251. [Google Scholar] [CrossRef]
  29. Lee, J.-H. Confidential multicasting assisted by multi-hop multi-antenna DF relays in the presence of multiple eavesdroppers. IEEE Trans. Commun. 2016, 10, 4295–4304. [Google Scholar] [CrossRef]
  30. Koh, K.; Kim, S.J.; Mutapcic, A.; Boyd, S. GPPOSY: A Matlab Solver for Geometric Programs in Posynomial Form. 2006. Available online: http://web.stanford.edu/~boyd/ggplab/gpposy.pdf (accessed on 15 October 2016).
  31. Nasir, A.A.; Ngo, D.T.; Zhou, X.; Kennedy, R.A.; Durrani, S. Joint resource optimization for multicell networks with wireless energy harvesting relays. IEEE Trans. Veh. Technol. 2016, 65, 6168–6183. [Google Scholar] [CrossRef]
  32. Chiang, M. Geometric programming for communication systems. Found. Trends Commun. Inf. Theory. 2005, 2, 1–156. [Google Scholar] [CrossRef]
  33. Boyd, S.; Kim, S.-J.; Vandenberghe, L.; Hassibi, A. A tutorial on geometric programming. Optim. Eng. 2007, 8, 67–127. [Google Scholar] [CrossRef]
  34. Havary-Nassab, V.; Shahbazpanahi, S.; Grami, A.; Luo, Z. Distributed beamforming for relay networks based on second-order statistics of the channel state information. IEEE Trans. Signal Process. 2008, 56, 4306–4316. [Google Scholar] [CrossRef]
  35. Luo, Z.; Ma, W.; So, A.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  36. Sturm, J.F. Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones. Optim. Methods Softw. 1999, 11, 625–653. [Google Scholar] [CrossRef]
  37. Lofberg, J. YALMIP: A toolbox for modeling and optimization in MATLAB. In Proceedings of the IEEE International Symposium on Computer Aided Control Systems Design, Taipei, Taiwan, 2–4 September 2004; pp. 284–289.
Figure 1. Illustration of a full-duplex multi-hop decode-and-forward (DF) relay network with N = 3 , T 1 = T 2 = T 3 = 2 , and T E = 1 .
Figure 1. Illustration of a full-duplex multi-hop decode-and-forward (DF) relay network with N = 3 , T 1 = T 2 = T 3 = 2 , and T E = 1 .
Sensors 16 01726 g001
Figure 2. Comparison of secrecy rates as a function of η when T = 4 , T E = 1 , d E x = 150 m, d E = 10 m, and P = 60 dBm.
Figure 2. Comparison of secrecy rates as a function of η when T = 4 , T E = 1 , d E x = 150 m, d E = 10 m, and P = 60 dBm.
Sensors 16 01726 g002
Figure 3. Comparison of secrecy rates as a function of d E x when T = 4 , T E = 2 , d E = 10 m, and P = 60 dBm.
Figure 3. Comparison of secrecy rates as a function of d E x when T = 4 , T E = 2 , d E = 10 m, and P = 60 dBm.
Sensors 16 01726 g003
Figure 4. Comparison of secrecy rates as a function of P when T = 4 , T E = 2 , d E x = 150 m, and d E = 10 m.
Figure 4. Comparison of secrecy rates as a function of P when T = 4 , T E = 2 , d E x = 150 m, and d E = 10 m.
Sensors 16 01726 g004
Figure 5. Comparison of secrecy rates as a function of T E when T = 6 , d E x = 150 m, d E = 10 m, and P = 60 dBm.
Figure 5. Comparison of secrecy rates as a function of T E when T = 6 , d E x = 150 m, d E = 10 m, and P = 60 dBm.
Sensors 16 01726 g005

Share and Cite

MDPI and ACS Style

Lee, J.-H.; Sohn, I.; Kim, Y.-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors 2016, 16, 1726. https://doi.org/10.3390/s16101726

AMA Style

Lee J-H, Sohn I, Kim Y-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors. 2016; 16(10):1726. https://doi.org/10.3390/s16101726

Chicago/Turabian Style

Lee, Jong-Ho, Illsoo Sohn, and Yong-Hwa Kim. 2016. "Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks" Sensors 16, no. 10: 1726. https://doi.org/10.3390/s16101726

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop