메뉴 건너뛰기




Volumn 14, Issue 6, 2015, Pages 3280-3293

Joint beamforming and power allocation for secrecy in peer-to-peer relay networks

Author keywords

Feasible initial points searching algorithm; Multiuser peer to peer relay network; secrecy rate maximization; sequential parametric convex approximation

Indexed keywords

ALGORITHMS; APPROXIMATION ALGORITHMS; BEAMFORMING; COMPLEX NETWORKS; ITERATIVE METHODS; MOBILE SECURITY; NETWORK LAYERS; NETWORK PROTOCOLS; NETWORK SECURITY; OPTIMIZATION; PARAMETER ESTIMATION; RELAY CONTROL SYSTEMS; RESOURCE ALLOCATION; SIGNAL INTERFERENCE; SIGNAL TO NOISE RATIO; SPURIOUS SIGNAL NOISE; VECTOR SPACES;

EID: 84933042466     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2403367     Document Type: Article
Times cited : (81)

References (41)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • Jul.
    • S. L. Y. Cheong and M. Hellman, "The Gaussian wire-tap channel, " IEEE Trans. Inf. Theory, vol. 26, no. 4, pp. 451-456, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.26 , Issue.4 , pp. 451-456
    • Cheong, S.L.Y.1    Hellman, M.2
  • 5
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay network
    • Oct.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay network, " IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 6
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel, " IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 7
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: TheMIMOME wiretap channel, " IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.2
  • 8
    • 84877752784 scopus 로고    scopus 로고
    • Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
    • May
    • S. A. A. Fakoorian and A. Lee Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2620-2631
    • Fakoorian, S.A.A.1    Lee Swindlehurst, A.2
  • 9
    • 84903650326 scopus 로고    scopus 로고
    • On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks
    • Jul.
    • M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks, " IEEE Trans. Signal Process., vol. 62, no. 14, pp. 3536-3551, Jul. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.14 , pp. 3536-3551
    • Hanif, M.F.1    Tran, L.-N.2    Juntti, M.3    Glisic, S.4
  • 10
    • 84857366311 scopus 로고    scopus 로고
    • Physical layer security in multibeam satellite systems
    • Feb.
    • G. Zheng, P. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems, " IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 852-863, Feb. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.2 , pp. 852-863
    • Zheng, G.1    Arapoglou, P.2    Ottersten, B.3
  • 11
    • 84907533750 scopus 로고    scopus 로고
    • On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels
    • Nov.
    • C. Wang and H.-M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.11 , pp. 1814-1827
    • Wang, C.1    Wang, H.-M.2
  • 12
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, " IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 13
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 14
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Oct.
    • J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 15
    • 84946240351 scopus 로고    scopus 로고
    • Robust joint beamforming and jamming for secure AF networks: Low complexity design
    • May
    • C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low complexity design, " IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.5 , pp. 2192-2198
    • Wang, C.1    Wang, H.-M.2
  • 16
    • 84933068238 scopus 로고    scopus 로고
    • Joint cooperative beamforming, jamming and power allocation to secure AF relay systems
    • to be published. [Online]. Available
    • H.-M. Wang, F. Liu, and M. Yang, "Joint cooperative beamforming, jamming and power allocation to secure AF relay systems, " IEEE Trans. Veh. Technol., to be published. [Online]. Available: http://ieeexplore. ieee. org/stamp/stamp. jsp?tp=&arnumber=6955810
    • IEEE Trans. Veh. Technol.
    • Wang, H.-M.1    Liu, F.2    Yang, M.3
  • 17
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan.
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-39, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 35-39
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 18
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3632, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3632
    • Wang, H.-M.1    Yin, Q.2    Xia, X.-G.3
  • 19
    • 84897459881 scopus 로고    scopus 로고
    • Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
    • Apr.
    • Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, "Algorithms for secrecy guarantee with null space beamforming in two-way relay networks, " IEEE Trans. Signal Process., vol. 62, no. 8, pp. 2111-2126, Apr. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.8 , pp. 2111-2126
    • Yang, Y.1    Sun, C.2    Zhao, H.3    Long, H.4    Wang, W.5
  • 20
    • 35448931484 scopus 로고    scopus 로고
    • Cooperative communications with outage-optimal opportunistic relaying
    • Sep.
    • A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying, " IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.9 , pp. 3450-3460
    • Bletsas, A.1    Shin, H.2    Win, M.Z.3
  • 21
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.2    McLaughlin, S.3
  • 22
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, andW. Shen, "Optimal relay selection for physical layer security in cooperative wireless networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 23
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI
    • Jan.
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 24
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 25
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Feb.
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 26
    • 84929327918 scopus 로고    scopus 로고
    • Uncoordinated Jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
    • May
    • C. Wang, H.-M. Wang, X.-G. Xia, and C. Liu, "Uncoordinated Jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, " IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2596-2612, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2596-2612
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3    Liu, C.4
  • 27
    • 33847736358 scopus 로고    scopus 로고
    • Spectral efficient protocols for half-duplex fading relay channels
    • Feb.
    • B. Rankov and A. Wittneben, "Spectral efficient protocols for half-duplex fading relay channels, " IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
    • (2007) IEEE J. Sel. Areas Commun. , vol.25 , Issue.2 , pp. 379-389
    • Rankov, B.1    Wittneben, A.2
  • 28
    • 84861117966 scopus 로고    scopus 로고
    • Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks
    • Jun.
    • Y. Cheng and M. Pesavento, "Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks, " IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2962-2973, Jun. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.6 , pp. 2962-2973
    • Cheng, Y.1    Pesavento, M.2
  • 29
    • 68249160802 scopus 로고    scopus 로고
    • Multiple peer-topeer communications using a network of relays
    • Aug.
    • S. Fazeli-Dehkordy, S. Shahbazpanahi, and S. Gazor, "Multiple peer-topeer communications using a network of relays, " IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3053-3062, Aug. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.8 , pp. 3053-3062
    • Fazeli-Dehkordy, S.1    Shahbazpanahi, S.2    Gazor, S.3
  • 30
    • 84555190729 scopus 로고    scopus 로고
    • Distributed beamforming for multi-group multicasting relay networks
    • Jan.
    • N. Bornhorst, M. Pesavento, and A. B. Gershman, "Distributed beamforming for multi-group multicasting relay networks, " IEEE Trans. Signal Process., vol. 60, no. 1, pp. 221-232, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 221-232
    • Bornhorst, N.1    Pesavento, M.2    Gershman, A.B.3
  • 31
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 32
    • 84870336491 scopus 로고    scopus 로고
    • A storm of feasibility pumps for nonconvex MINLP
    • Dec.
    • C. D'Ambrosio, A. Frangioni, L. Liberti, and A. Lodi, "A storm of feasibility pumps for nonconvex MINLP, " Math. Programm., vol. 136, no. 2, pp. 375-402, Dec. 2012.
    • (2012) Math. Programm. , vol.136 , Issue.2 , pp. 375-402
    • D'Ambrosio, C.1    Frangioni, A.2    Liberti, L.3    Lodi, A.4
  • 33
    • 84890121948 scopus 로고    scopus 로고
    • Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
    • Oct.
    • X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback, " IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.5 , pp. 503-506
    • Chen, X.1    Yin, R.2
  • 34
    • 84877644812 scopus 로고    scopus 로고
    • Secure MISO cognitive radio system with perfect and imperfect CSI
    • Jun.
    • T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI, " in Proc. IEEE ICC, Jun. 2012, pp. 1236-1241.
    • (2012) Proc. IEEE ICC , pp. 1236-1241
    • Kwon, T.1    Wong, V.W.S.2    Schober, R.3
  • 35
    • 84883395475 scopus 로고    scopus 로고
    • Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
    • May
    • Q. Li andW.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2704-2717
    • Li, Q.1    Ma, W.-K.2
  • 36
    • 84867619190 scopus 로고    scopus 로고
    • Detecting passive eavesdroppers in the MIMO wiretap channel
    • Mar.
    • A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel, " in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 2809-2812.
    • (2012) Proc. IEEE ICASSP, Kyoto, Japan , pp. 2809-2812
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 37
    • 27744504251 scopus 로고    scopus 로고
    • Collaborative beamforming for distributed wireless Ad Hoc sensor networks
    • Nov.
    • H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, "Collaborative beamforming for distributed wireless Ad Hoc sensor networks, " IEEE Trans. Signal Process., vol. 53, no. 11, pp. 4110-4124, Nov. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.11 , pp. 4110-4124
    • Ochiai, H.1    Mitran, P.2    Poor, H.V.3    Tarokh, V.4
  • 39
    • 34547453958 scopus 로고
    • A general inner approximation algorithm for nonconvex mathematical programs
    • Jul./Aug.
    • B. R. Marks and G. P. Wright, "A general inner approximation algorithm for nonconvex mathematical programs, " Oper. Res., vol. 26, no. 4, pp. 681-683, Jul./Aug. 1978.
    • (1978) Oper. Res. , vol.26 , Issue.4 , pp. 681-683
    • Marks, B.R.1    Wright, G.P.2
  • 40
    • 77954761580 scopus 로고    scopus 로고
    • A sequential parametric convex approximation method with applications to nonconvex truss topology design problems
    • May
    • A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems, " J. Global Optim., vol. 47, no. 1, pp. 29-51, May 2010.
    • (2010) J. Global Optim. , vol.47 , Issue.1 , pp. 29-51
    • Beck, A.1    Ben-Tal, A.2    Tetruashvili, L.3
  • 41
    • 0036923521 scopus 로고    scopus 로고
    • Implementation of interior point methods for mixed semidefinite and second order cone optimization problems
    • J. F. Sturm, "Implementation of interior point methods for mixed semidefinite and second order cone optimization problems, " Optim. Methods Softw., vol. 17, no. 6, pp. 1105-1154, 2002.
    • (2002) Optim. Methods Softw. , vol.17 , Issue.6 , pp. 1105-1154
    • Sturm, J.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.