Energy Efficiency in Secrecy Multi-Antenna Two-Way Relay Networks
Subject Areas : electrical and computer engineeringF. B. 1 , soroush akhlaghi 2 *
1 -
2 -
Keywords: Physical layer securityenergy efficiencytwo-way relaybeamforming,
Abstract :
paper investigates the energy-efficiency in secrecy two-way relay networks. It is assumed that in the presence of several multi-antenna amplify-and-forward relays and a single eavesdropper, two single-antenna users exchange their confidential messages during two hops. In the first hop, both users send their messages to the relay nodes and during the second hop, the relays send the received signal to the users by using the beamforming matrix, to minimize the received information by the eavesdropper .In this way, using two beamforming strategies, named as Null-Space Beamforming (NSBF) and Information Leakage Alignment Beamforming (ILABF), the secrecy energy efficiency that is the ratio of total secrecy sum-rate to the total power consumption of the network is calculated. It is shown that the aforementioned problem is non-convex so it will be converted to the convex form, using the Semi-Definite Relaxation (SDR). This problem has not closed-form and is solved using the interior point method.In numerical results, it is observed that by using the information leakage alignment beamforming (ILABF) method, energy efficiency is allocated more value than the null-space beamforming (NSBF) approach that was used in previous studies.
[1] L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, "Secure cooperative communications with an untrusted relay: a NOMA-inspired jamming and relaying approach," IEEE Trans. on Information Forensics and Security, vol. 14, no. 12, pp. 3191-3205, Dec. 2019.
[2] M. Luo, X. Li, J. Wang, Q. Yin, W. Tang, and S. Li, "Secure transmission schemes for two-way relay networks," IEEE Access, vol. 7, pp. 50148-50158, Apr. 2019.
[3] S. F. Bozorgi and S. Akhlaghi, "Secrecy sum rate maximisation in multi-antenna two-way relay networks," IET Communications, vol. 14, no. 4, pp. 541-548, Mar. 2020.
[4] M. Gong, J. Zheng, and H. Chen, "Energy-efficient power allocation and user selection in amplify-and-forward relay networks," in Proc. 8th Int. Conf. on Wireless Communications & Signal Processing, WCSP'16, , 5 pp., Yangzhou, China, 13-15 Oct. 2016.
[5] M. Mirzaee and S. Akhlaghi, "Beamforming strategies for multi-antenna relay-assisted networks," IET Communications, vol. 10, no. 11, pp. 1384-1393, Jul. 2016.
[6] E. Khordad, S. Akhlaghi, and M. Mirzaee, "Maximising the minimum achievable secrecy rate of two-way relay networks using the null space beamforming method," IET Communications, vol. 11, no. 6, pp. 793-800, May 2017.
[7] B. Rankov and A. Wittneben, "Spectral efficient protocols for half-duplex fading relay channels," IEEE J. on Selected Areas in Communications, vol. 25, no. 2, pp. 379-389, Feb. 2007.
[8] J. Zhang and M. Haardt, "Energy efficient two-way non-regenerative relaying for relays with multiple antennas," IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1079-1083, Aug. 2015.
[9] D. Feng, C. Jiang, G. Lim, L. J. Cimini, G. Feng, and G. Y. Li, "A survey of energy-efficient wireless communications," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 167-178, Feb. 2013.
[10] Z. Fei, N. Li, C. Xing, and S. Gong, "Energy-efficient transceiver design for multi-pair two-way relay systems," China Communications, vol. 12, no. 9, pp. 133-140, Sept. 2015.
[11] K. Singh, M. Ku, and J. Lin, "Power control for achieving energy-efficient multiuser two-way balancing relay networks," in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP'14, pp. 2749-2753, Florence,Italy, 4-9 May 2014.
[12] I. Priyadharshini and S. Nandakumar, "The energy efficient power allocation for multiple relay-aided D2D communication in 5G networks using iterative algorithm," in Proc. Int. Conf. on Vision Towards Emerging Trends in Communication and Networking, ViTECoN'19, 5 pp., Vellore, India, 4-9 May 2019.
[13] A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
[14] I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
[15] A. Kalantari, S. Maleki, S. Chatzinotas, and B. Ottersten, "Secrecy energy efficiency optimization for MISO and SISO communication networks," in Proc. IEEE 16th Int. Workshop on Signal Processing Advances in Wireless Communications, SPAWC'15, pp. 21-25, Stockholm, Sweden, 28 Jun-1 Jul. 2015.
[16] J. Ouyang, M. Lin, W. Zhu, T. Hong, and B. Xu, "Distributed-relay beamforming for secrecy energy efficiency with coordinated eavesdroppers," IEEE Communications Letters, vol. 22, no. 5, pp. 1054-1057, Feb. 2018.
[17] S. Zhao, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, "Secure and energy-efficient beamforming for MIMO two-way untrusted relay systems," in Proc. IEEE Wireless Communications and Networking Conf., WCNC'19, 6 pp., Marrakesh, Morocco, 15-18 Apr. 2019.
[18] E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming," IEEE Trans. on Information Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
[19] S. Cui, A. J. Goldsmith, and A. Bahai, "Modulation optimization under energy constraints," in Proc. IEEE Int. Conf. on Communications, vol. 4pp. 2805-2811, , Anchorage, AK, USA, 11-15 May 2003.
[20] A. Charnes and W. W. Cooper, "Programming with linear fractional functional," Nav. Res. Logist. Q, vol. 9, no. 3-4, pp. 181-186, Sept. 1962.
[21] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming," Available at http://cvxr.com/cvx, Sept. 2010.
[22] S. Zhang, "Quadratic maximization and semidefinite relaxation," Math. Program, vol. 87, no. 3, pp. 453-465, May 2000.
[23] Z. Q. Luo, W. K. Ma, A. M. C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, Apr. 2010.