WSEAS Transactions on Communications


Print ISSN: 1109-2742
E-ISSN: 2224-2864

Volume 16, 2017

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



DC Programming and DCA for Secrecy Rate Maximization in a Wireless Network with Multiple Eavesdroppers

AUTHORS: Hoai An Le Thi, Thi Thuy Tran, Tao Pham Dinh

Download as PDF

ABSTRACT: In this paper, we consider a wireless network where a source tries to send messages to a destination while keeping them secret from multiple eavesdroppers. To enhance secrecy, the transmission is performed with a cooperation of friendly jammers which make artificial noise to confound eavesdroppers and beamforming technique to direct jamming signal to intended targets. The purpose is to determine beamforming coefficients in order to maximize secrecy rate under the total jammer power constraint. The existing method solved this problem in a special case in which the beamforming coefficients were designed to completely eliminate jamming signal at the destination and a heuristic approach was applied to obtain a suboptimal solution for this case. We address this problem via a new approach based on DC (Difference of Convex functions) programming and DCA (DC Algorithm). We first reformulate this problems as a general DC program, i.e. minimizing a DC function under some DC constraints, and develop a DCA based algorithm for solving it. The experimental results show that the secrecy rate obtained by the proposed algorithm is better than those achieved by the existing one.

KEYWORDS: Cooperative Jamming, Beamforming, Physical Layer Security, DC programming and DCA

REFERENCES:

[1] Alberth Alvarado, Gesualdo Scutari, and JongShi Pang. A new decomposition method for multiuser DC-programming and its application. Signal Processing, IEEE Transactions on, 62(11):2984–2998, 2014.

[2] Csiszr and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, 24(3):339–348, May 1978.

[3] L. Dong, Z. Han, A. Petropulu, and H. Poor. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process, 58(3):1875–1888, March 2010.

[4] A. Khisti, A. Tchamkerten, and Gregory W. Wornell. Secure broadcasting over fading channels. Information Theory, IEEE Transactions on, 54(6):2453–2469, June 2008.

[5] H. A. Le Thi. DC Programming and DCA. http://www.lita.univ-lorraine. fr/˜lethi/.

[6] H. A. Le Thi, V. N. Huynh, and T. Pham Dinh. DC Programming and DCA for General DC Programs. In Tien van Do, Hoai An Le Thi, and Ngoc Thanh Nguyen, editors, Advanced Computational Methods for Knowledge Engineering: Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2014), pages 15–35. Springer International Publishing, 2014.

[7] H. A. Le Thi and T. Pham Dinh. The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems. Annals of Operations Research, 133:23–46, 2005.

[8] H. A. Le Thi and T. Pham Dinh. DC programming in Communication Systems: challenging models and methods. Vietnam Journal of Computer Science, 1 (1):15–28, 2013.

[9] Hoai An Le Thi and Tao Pham Dinh. Network utility maximisation: A DC programming approach for Sigmoidal utility function. In 2013 International Conference on Advanced Technologies for Communications (ATC 2013), pages 50–54, 2013.

[10] J. Li, A. Petropulu, and S. Weber. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process, 59(10):4985–4997, October 2011.

[11] L. Li, L. Li, Z. Chen, and J. Fang. Optimal transmit design at relay nodes for secure af relay networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pages 1–6, May 2015.

[12] Yingbin Liang, H.V. Poor, and S. Shamai. Secure communication over fading channels. Information Theory, IEEE Transactions on, 54(6):2470–2492, June 2008.

[13] T. Pham Dinh and H. A. Le Thi. Convex analysis approach to DC programming: Theory, algorithms and applications. Acta Mathematica Vietnamica, 22(1):289–357, 1997.

[14] T. Pham Dinh and H. A. Le Thi. Optimization algorithms for solving the trust region subproblem. SIAM J. Optimization, 8:476–505, 1998.

[15] T. Pham Dinh and H. A. Le Thi. Recent Advances in DC Programming and DCA. Transactions on Computational Intelligence, 13 (8342):1–37, 2014.

[16] T. T. Tran and H. A. Le Thi and T. Pham Dinh. DC programming and DCA for enhancing physical layer security via cooperative jamming. Computers & Operations Research, Published online december 2016.

[17] Xiaojun Tang, Ruoheng Liu, P. Spasojevic, and H.V. Poor. Multiple access channels with generalized feedback and confidential messages. In Information Theory Workshop, 2007. ITW ’07. IEEE, pages 608–613, Sept 2007.

[18] E. Tekin and A. Yener. The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. Information Theory, IEEE Transactions on, 54(6):2735–2751, June 2008.

[19] Chao Wang, Hui-Ming Wang, D.W.K. Ng, Xiang-Gen Xia, and Chaowen Liu. Joint beamforming and power allocation for secrecy in peer-to-peer relay networks. Wireless Communications, IEEE Transactions on, 14(6):3280– 3293, June 2015.

[20] H. M. Wang, F. Liu, and M. Yang. Joint cooperative beamforming, jamming, and power allocation to secure af relay systems. IEEE Transactions on Vehicular Technology, 64(10):4893– 4898, Oct 2015.

[21] A. D. Wyner. The wire-tap channel. Bell Sys. Tech. Journ., 54:1355–1387, 1975.

[22] H. Yamamoto. On secret sharing communication systems with two or three channels. Information Theory, IEEE Transactions on, 32(3):387–393, May 1986.

[23] H. Yamamoto. A coding theorem for secret sharing communication systems with two gaussian wiretap channels. Information Theory, IEEE Transactions on, 37(3):634–638, May 1991.

[24] Yunchuan Yang, Cong Sun, Hui Zhao, Hang Long, and Wenbo Wang. Algorithms for secrecy guarantee with null space beamforming in twoway relay networks. Signal Processing, IEEE Transactions on, 62(8):2111–2126, April 2014.

[25] Gan Zheng, P. Arapoglou, and B. Ottersten. Physical layer security in multibeam satellite systems. Wireless Communications, IEEE Transactions on, 11(2):852–863, February 2012.

[26] Jian Zhou, Ruohan Cao, Hui Gao, Cong Zhang, and Tiejun Lv. Secure beamforming design in wiretap miso interference channels. In Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, pages 1–5, May 2015.

WSEAS Transactions on Communications, ISSN / E-ISSN: 1109-2742 / 2224-2864, Volume 16, 2017, Art. #10, pp. 70-76


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site