Artificial Noise-Aided Secure Relay Communication with Unknown Channel Knowledge of Eavesdropper
dc.contributor.author | Li, Bin | |
dc.contributor.author | Zhang, M. | |
dc.contributor.author | Rong, Yue | |
dc.contributor.author | Han, Z. | |
dc.date.accessioned | 2022-07-17T08:19:33Z | |
dc.date.available | 2022-07-17T08:19:33Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Li, B. and Zhang, M. and Rong, Y. and Han, Z. 2021. Artificial Noise-Aided Secure Relay Communication with Unknown Channel Knowledge of Eavesdropper. IEEE Transactions on Wireless Communications. 20 (5): pp. 3168-3179. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/88930 | |
dc.identifier.doi | 10.1109/TWC.2020.3047926 | |
dc.description.abstract |
In this article, a new relay-aided secure communication system is investigated, where a transmitter sends signals to a destination via an amplify-and-forward (AF) relay in the presence of an eavesdropper. We consider a general system configuration, where the source, relay, destination, and eavesdropper are all equipped with multiple antennas. In the practical scenarios of unknown eavesdropper's channel state information (CSI) and uncertainty of the eavesdropper's location, we aim to maximize the expected value of the system secrecy rate over the presumed distribution of the eavesdropper's channels, by exploiting the artificial noise (AN) transmitted by the source and relay nodes. The system design issue is formulated as a nonconvex stochastic optimization problem with a source transmission power constraint and a nonconvex relay transmission power constraint. A novel computational method is proposed to solve this challenging problem. The new method is developed based on an exact penalty function method together with a parallel stochastic decomposition algorithm. Numerical simulations are performed to study the effectiveness of the proposed scheme at various locations of the eavesdropper. Simulation results show that for most cases, secure communication can be achieved without the CSI knowledge of eavesdropper's channels, and the achievable secrecy rate follows the trend of a benchmark system where the eavesdropper's full CSI is available. In particular, the achievable system secrecy rate increases with the number of antennas at the legitimate users. Moreover, the optimal power allocated for the transmission of the AN increases with the system signal-to-noise ratio. The proposed computational method achieves a higher system secrecy rate than a conventional penalty function based approach. | |
dc.language | English | |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | |
dc.subject | Science & Technology | |
dc.subject | Technology | |
dc.subject | Engineering, Electrical & Electronic | |
dc.subject | Telecommunications | |
dc.subject | Engineering | |
dc.subject | Relays | |
dc.subject | Jamming | |
dc.subject | Wireless communication | |
dc.subject | Security | |
dc.subject | Optimization | |
dc.subject | Physical layer security | |
dc.subject | MIMO communication | |
dc.subject | Secure communication | |
dc.subject | amplify-and-forward relay | |
dc.subject | artificial noise | |
dc.subject | PHYSICAL LAYER SECURITY | |
dc.subject | PENALTY-FUNCTION METHOD | |
dc.subject | SECRECY | |
dc.subject | TRANSMISSION | |
dc.subject | COOPERATION | |
dc.title | Artificial Noise-Aided Secure Relay Communication with Unknown Channel Knowledge of Eavesdropper | |
dc.type | Journal Article | |
dcterms.source.volume | 20 | |
dcterms.source.number | 5 | |
dcterms.source.startPage | 3168 | |
dcterms.source.endPage | 3179 | |
dcterms.source.issn | 1536-1276 | |
dcterms.source.title | IEEE Transactions on Wireless Communications | |
dc.date.updated | 2022-07-17T08:19:18Z | |
curtin.note |
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
curtin.department | School of Elec Eng, Comp and Math Sci (EECMS) | |
curtin.accessStatus | Open access | |
curtin.faculty | Faculty of Science and Engineering | |
curtin.contributor.orcid | Rong, Yue [0000-0002-5831-7479] | |
dcterms.source.eissn | 1558-2248 | |
curtin.contributor.scopusauthorid | Rong, Yue [10044788600] | |
curtin.contributor.scopusauthorid | Li, Bin [57129085200] | |
curtin.contributor.scopusauthorid | Li, Bin [57129085200] |