Distributed beamforming designs to improve physical layer security in wireless relay networks

نویسندگان

  • Mujun Qian
  • Chen Liu
  • Youhua Fu
چکیده

This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correction: Distributed beamforming designs to improve physical layer security in wireless relay networks

Correction In our paper Distributed beamforming designs to improve physical layer security in wireless relay networks [1], several equations should be corrected as indicated below. In section 2.1 ‘Amplify-and-forward’ , the equation included in the paragraph above Equation (2) incorrectly read as follows: ti =wiρiri This equation should read correctly as follows: ti =wi*ρiri In section 2.2 ‘Dec...

متن کامل

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey

Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration. This paper provides a survey of recent research and developm...

متن کامل

Polarization Sensitive Array Based Physical-Layer Security

In this paper we propose a comprehensive framework exploiting the polarization sensitive array (PLA) to improve the physical layer security of wireless communications. More specifically, the polarization difference among signals are utilized to improve the secrecy rate of wireless communications, especially when these signals are spatially indistinguishable. We firstly investigate the PLA based...

متن کامل

Enhancing Physical Layer Security in Wireless Networks with Cooperative Approaches

Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014