Secure Communication for Two-Way Relay Networks with Imperfect CSI

This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We...

Full description

Bibliographic Details
Main Authors: Cong Sun, Ke Liu, Dahu Zheng, Wenbao Ai
Format: Article
Language:English
Published: MDPI AG 2017-09-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/19/10/522
_version_ 1798040040559869952
author Cong Sun
Ke Liu
Dahu Zheng
Wenbao Ai
author_facet Cong Sun
Ke Liu
Dahu Zheng
Wenbao Ai
author_sort Cong Sun
collection DOAJ
description This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rate of the eavesdropper to be upper-bounded. Due to the imperfect CSI, a robust optimization problem is summarized. A novel iterative algorithm is proposed, where the line search technique is applied, and the feasibility is preserved during iterations. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are optimally solved. The optimality property of the robust optimization problem is analyzed. Simulation results show that the proposed algorithm performs very close to the non-robust model with perfect CSI, in terms of the obtained relay transmit power; it~achieves higher secrecy rate compared to the existing work. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally.
first_indexed 2024-04-11T22:02:01Z
format Article
id doaj.art-32e215ca567e44468f9bebd836bfaa07
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T22:02:01Z
publishDate 2017-09-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-32e215ca567e44468f9bebd836bfaa072022-12-22T04:00:52ZengMDPI AGEntropy1099-43002017-09-01191052210.3390/e19100522e19100522Secure Communication for Two-Way Relay Networks with Imperfect CSICong Sun0Ke Liu1Dahu Zheng2Wenbao Ai3Current address: No. 10, Xi Tu Cheng Road, Haidian District, Beijing 100876, China.School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaSchool of Science, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaSchool of Science, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaThis paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rate of the eavesdropper to be upper-bounded. Due to the imperfect CSI, a robust optimization problem is summarized. A novel iterative algorithm is proposed, where the line search technique is applied, and the feasibility is preserved during iterations. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are optimally solved. The optimality property of the robust optimization problem is analyzed. Simulation results show that the proposed algorithm performs very close to the non-robust model with perfect CSI, in terms of the obtained relay transmit power; it~achieves higher secrecy rate compared to the existing work. Numerically, the proposed algorithm converges very quickly, and more than 85% of the problems are solved optimally.https://www.mdpi.com/1099-4300/19/10/522physical layer securityamplify-and-forward two-way relayimperfect CSIrobust optimizationline search technique
spellingShingle Cong Sun
Ke Liu
Dahu Zheng
Wenbao Ai
Secure Communication for Two-Way Relay Networks with Imperfect CSI
Entropy
physical layer security
amplify-and-forward two-way relay
imperfect CSI
robust optimization
line search technique
title Secure Communication for Two-Way Relay Networks with Imperfect CSI
title_full Secure Communication for Two-Way Relay Networks with Imperfect CSI
title_fullStr Secure Communication for Two-Way Relay Networks with Imperfect CSI
title_full_unstemmed Secure Communication for Two-Way Relay Networks with Imperfect CSI
title_short Secure Communication for Two-Way Relay Networks with Imperfect CSI
title_sort secure communication for two way relay networks with imperfect csi
topic physical layer security
amplify-and-forward two-way relay
imperfect CSI
robust optimization
line search technique
url https://www.mdpi.com/1099-4300/19/10/522
work_keys_str_mv AT congsun securecommunicationfortwowayrelaynetworkswithimperfectcsi
AT keliu securecommunicationfortwowayrelaynetworkswithimperfectcsi
AT dahuzheng securecommunicationfortwowayrelaynetworkswithimperfectcsi
AT wenbaoai securecommunicationfortwowayrelaynetworkswithimperfectcsi