Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications
Joint Authors
Zhang, Xiaoning
Liu, Zhongjian
Bai, Lin
Chen, Chen
Xiang, Haige
Source
International Journal of Distributed Sensor Networks
Issue
Vol. 2013, Issue - (31 Dec. 2013), pp.1-11, 11 p.
Publisher
Hindawi Publishing Corporation
Publication Date
2013-12-31
Country of Publication
Egypt
No. of Pages
11
Main Subjects
Telecommunications Engineering
Information Technology and Computer Science
Abstract EN
We consider the collaborative use of amplify-and-forward relays to form a beamforming system and provide physical layer security for a wireless machine-to-machine (M2M) communication network.
We investigate two objectives: (i) the achievable secrecy rate maximization subject to the relay power constraint and (ii) the relay transmit power minimization under a secrecy rate constraint.
For the first objective, we propose a secrecy rate maximization (SRM) beamforming scheme.
The secrecy rate maximization problem can be formed into a two-level optimization problem and we solve it using semidefinite relaxation (SDR) techniques.
To reduce the complexity of the SRM beamforming scheme, a virtual eavesdropper-based SRM (VE-SRM) beamforming scheme is proposed, in which we hypothesize a virtual eavesdropper instead of all eavesdroppers and maximize the secrecy rate according to the virtual eavesdropper.
In addition, for the second objective, we design a relay power minimization (RPM) beamforming scheme, in which an iterative algorithm combining the SDR technology and the gradient-based method is devised by studying the convexity of the RPM problem.
By relaxing the constraints of the RPM beamforming scheme, we propose a virtual eavesdropper-based RPM (VERPM) beamforming scheme, which reduces the multivariate RPM problem to a problem of a single variable, and thus an analytical solution is obtained.
Our proposed beamforming designs can work well even if the number of eavesdroppers is larger than that of relays, while the existing schemes, for example, the null-space beamforming schemes, cannot work under this condition.
Simulation results are presented to demonstrate the significance of performance improvements with the SRM and RPM beamforming schemes.
It is also shown that the virtual eavesdropper approaches significantly reduce the complexity with acceptable performance degradation.
American Psychological Association (APA)
Liu, Zhongjian& Zhang, Xiaoning& Bai, Lin& Chen, Chen& Xiang, Haige. 2013. Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications. International Journal of Distributed Sensor Networks،Vol. 2013, no. -, pp.1-11.
https://search.emarefa.net/detail/BIM-493939
Modern Language Association (MLA)
Liu, Zhongjian…[et al.]. Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications. International Journal of Distributed Sensor Networks Vol. 2013, pp.1-11.
https://search.emarefa.net/detail/BIM-493939
American Medical Association (AMA)
Liu, Zhongjian& Zhang, Xiaoning& Bai, Lin& Chen, Chen& Xiang, Haige. Secure Beamforming via Amplify-and-Forward Relays in Machine-to-Machine Communications. International Journal of Distributed Sensor Networks. 2013. Vol. 2013, no. -, pp.1-11.
https://search.emarefa.net/detail/BIM-493939
Data Type
Journal Articles
Language
English
Notes
Includes bibliographical references
Record ID
BIM-493939