DOI QR코드

DOI QR Code

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo (National Digital Switching System Engineering & Technological R&D Center) ;
  • Huang, Kai-zhi (National Digital Switching System Engineering & Technological R&D Center) ;
  • Chen, Ya-jun (National Digital Switching System Engineering & Technological R&D Center)
  • Received : 2017.10.05
  • Accepted : 2018.01.02
  • Published : 2018.06.30

Abstract

In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Keywords

References

  1. Zhang H, Liu H, and Cheng J, "Downlink Energy Efficiency of Power Allocation and Wireless Backhaul Bandwidth Allocation in Heterogeneous Small Cell Networks," IEEE Transactions on Communications, to be published.
  2. Li B, Fei Z, Chu Z, "Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer," IEEE Systems Journal, to be published.
  3. H. Zhang, S. Huang, and C. Jiang, "Energy Efficient User Association and Power Allocation in Millimeter Wave Based Ultra Dense Networks with Energy Harvesting Base Stations," IEEE Journal on Selected Areas in Communications, vol. 35, no. 9, pp. 1936-1947, September, 2017. https://doi.org/10.1109/JSAC.2017.2720898
  4. Li B, Fei Z and Chu Z, "Optimal Transmit Beamforming for Secure SWIPT in a Two-Tier HetNet," IEEE Communications Letters, vol. 21, no. 11, pp. 2476-2479, November, 2017. https://doi.org/10.1109/LCOMM.2017.2734759
  5. Zhang X N, Tan Z H and Xu S Y, "Utility maximization based on cross-layer design for multi-service in macro-femto heterogeneous networks," IEEE Transactions on Wireless Communication, vol. 12, pp. 5607-5620, November, 2013. https://doi.org/10.1109/TWC.2013.092313.121797
  6. Li N, Tao X and Wu H, "Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, September, 2016. https://doi.org/10.1109/TVT.2015.2493178
  7. Li N, Tao X and Xu J, "Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback," IEEE Communications Letters, vol. 18, no. 6, pp.969-972, June, 2014. https://doi.org/10.1109/LCOMM.2014.2319821
  8. Zhang H, Xing H, and Cheng J, "Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming," IEEE Transactions on Industrial Informatics, vol. 12, no. 5, pp. 1714-1725, Octember, 2017. https://doi.org/10.1109/TII.2015.2489610
  9. Zheng C, Zhu Z and Hussein J, "Robust Optimization for AN-Aided Transmission and Power Splitting for Secure MISO SWIPT System," IEEE Communications Letters, vol. 20, no. 8, pp. 1571-1574, August, 2016. https://doi.org/10.1109/LCOMM.2016.2572684
  10. Zhong Zhi-hao, Peng Jian-hua and Luo Wen-yang, "A Tractable Approach to Analyzing the Physical-Layer Security in K-Tier Heterogeneous Cellular Networks," China Communications, vol. 12, no. 1, pp. 166-173, December, 2015. https://doi.org/10.1109/CC.2015.7386165
  11. Wang H M, Zheng T X and Yuan J, "Physical layer security in heterogeneous cellular networks," IEEE Transactions on Communications, vol. 64, no. 3, pp. 1204-1219, March, 2016. https://doi.org/10.1109/TCOMM.2016.2519402
  12. Wu H, Tao X and Li N, "Secrecy Outage Probability in Multi-RAT Heterogeneous Networks," IEEE Communications Letters, vol. 20, no. 1, pp. 53-56, January, 2016. https://doi.org/10.1109/LCOMM.2015.2499748
  13. Zhong Zhi-hao, Luo Wen-yu, and Peng Jian-hua, "Secrecy Performasnce Analysis of Cooperative Transmisson and Cooperative jamming in K-tier Heterogeneous Cellular Networks," Science China: Information Science, vol. 1, pp. 004-011, January, 2016.
  14. Xu M, Tao X and Yang F, "Enhancing Secured Coverage with CoMP Transmission in Heterogeneous Cellular Networks," IEEE Communications Letters, vol. 20, no. 11, pp. 2272-2275, November, 2016. https://doi.org/10.1109/LCOMM.2016.2598536
  15. Liu Y, Chen H H and Wang L, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges," IEEE Transactions on Information Forensics and Security, vol. 19, no. 1, pp. 347-376, August, 2017.
  16. Y Wang, Z Miao and L Jiao, "Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study," IEEE Access, vol. 4, no. 99, pp. 9082-9092, December, 2017.
  17. LUO Z Q, MA W K and SO A C, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20-34, April, 2010. https://doi.org/10.1109/MSP.2010.936019
  18. S. Yang, T. Lv, and L. Hanzo, "Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM," IEEE Transactions on Vehicular Technology, vol. 62, no. 4, pp. 1667-1677, December, 2013. https://doi.org/10.1109/TVT.2012.2235190
  19. BECK A, BEN-TAL A and TETRUASHVILI L, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," Journal of Global Optimization, vol. 47, no. 1, pp. 29-51, May, 2010. https://doi.org/10.1007/s10898-009-9456-5
  20. CHARNES A, COOPER W, "Programming with linear fractional functionals," Naval Research Logistics Quarterly, vol. 9, no. 3, pp. 181-186, March, 2010.
  21. Y Ren, T Lv and H Gao, "Secure Wireless Information and Power Transfer in Heterogeneous Networks," IEEE Access, vol. 5, no. 99, pp. 4967-4979, June, 2017. https://doi.org/10.1109/ACCESS.2017.2682277
  22. Lv T, Gao H and Cao R, "Coordinated Secure Beamforming in K-User Interference Channel with Multiple Eavesdroppers," IEEE Wireless Communication Letters, vol. 5, no. 2, pp. 212-215, January, 2016. https://doi.org/10.1109/LWC.2016.2519905
  23. Y.-S. Shiu, S.-Y and Chang.-H, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Communication, vol. 18, no. 2, pp. 66-74, April, 2011. https://doi.org/10.1109/MWC.2011.5751298
  24. Zhang Li-jian, Jin Liang and Luo Wen-yu, "Secure coordinated beamforming for multiuser MISO interference channels," Journal on Communications, vol. 36, no. 11, pp. 41-51, November, 2015.
  25. D. Lopez-Perez, "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Communication, vol. 18, no. 3, pp. 22-30, June, 2011. https://doi.org/10.1109/MWC.2011.5876497
  26. WAJID I, PESAVENTO M and ELDAR Y C, "Robust downlink beamforming with partial channel state information for conventional and cognitive radio networks," IEEE Transactions on Signal Processing, vol. 61, no. 14, pp. 3656-3670, May, 2013. https://doi.org/10.1109/TSP.2013.2265682
  27. Ponukumati D, Gao F and Bode M, "Robust coordinated downlink beamforming for multicell-cognitive radio networks," in Proc. of IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 719-723, September 8-11, 2013.
  28. Nasseri S, Le T A and Nakhai M R, "Robust and power efficient interference management in downlink multi-cell networks," in Proc. of IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1097-1101, September 8-11, 2013.
  29. WAJID I, ELDAR Y C and GERSHMAN A B, "Robust downlink beamforming for cognitive radio networks," in Proc. Of GLOBECOM'10, Florida, USA, pp. 1254-1258, December 6-10, 2010.
  30. Z.-Q. Luo, W.-K. Ma and A. M.-C, ''Semidefinite relaxation of quadratic optimization problems,'' IEEE Signal Processing Magzine, vol. 27, no. 3, pp. 20-34, April, 2010.
  31. Zhang L, Jin L, Luo W, ''Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints," Science China Information Sciences, vol. 59, no. 2, pp.1-13, January, 2016.
  32. Li B, Fei Z, ''Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels," Science China Information Sciences, vol. 61, no. 2, pp. 1-12, February, 2018. https://doi.org/10.1007/s11432-017-9235-7
  33. S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 640-649, May, 2011. https://doi.org/10.1109/TIFS.2011.2156788
  34. Zhu F, Yao M, "Improving Physical Layer Security for CRNs Using SINR-Based Cooperative Beamforming," IEEE Transactions on Vehicular Technology, vol. 1, no. 1, pp. 1-7, March, 2016.