بهرهوری انرژی در شبکههای رله چندآنتنی دوجهتی امن
محورهای موضوعی : مهندسی برق و کامپیوترسیده فاطمه بزرگی 1 , سروش اخلاقی 2 *
1 - دانشگاه شاهد
2 - دانشگاه شاهد
کلید واژه: امنیت لایه فیزیکیبهرهوری انرژیرله دوجهتیشکلدهی پرتو,
چکیده مقاله :
این مقاله، به بررسی بهرهوری انرژی در شبکههای رله دوجهتی امن میپردازد. فرض ميشود كه در حضور يك شنودگر، دو كاربر تكآنتنی با كمك چند رله چندآنتنی تقويت و ارسال به مبادله اطلاعات با يكديگر اقدام ميكنند. در بازه زمانی اول، کاربران سیگنال خود را به سمت رله ارسال میکنند و در بازه زمانی دوم، رلهها با استفاده از ماتریس شکلدهی پرتو، سیگنال دریافتی را به گونهای به سمت کاربران ارسال میکنند که اطلاعات دریافتی شنودگر به حداقل برسد. با استفاده از دو روش شکلدهی پرتو در فضای پوچ (NSBF) و شکلدهی پرتو بر پایه همترازی تداخل (ILABF)، بهرهوری انرژی که نسبت نرخ مجموع امن به توان مصرفی کل شبکه است، محاسبه شده است. نشان داده میشود که مسألههای پیش رو غیر محدب است و با استفاده از روش آزادسازی نیمهمعین (SDR)، به صورت محدب تبدیل خواهند شد. این مسایل محدب با استفاده از روش نقطه درونی حل گردیدهاند و پاسخ آنها فرم بسته ندارد. در نتایج عددی، ملاحظه میشود که با استفاده از روش شکلدهی پرتو بر پایه همترازی تداخل، بهرهوری انرژی مقدار بیشتری را نسبت به روش شکلدهی پرتو در فضای پوچ که در پژوهشهای پیشین به کار رفته است، به خود اختصاص میدهد.
paper investigates the energy-efficiency in secrecy two-way relay networks. It is assumed that in the presence of several multi-antenna amplify-and-forward relays and a single eavesdropper, two single-antenna users exchange their confidential messages during two hops. In the first hop, both users send their messages to the relay nodes and during the second hop, the relays send the received signal to the users by using the beamforming matrix, to minimize the received information by the eavesdropper .In this way, using two beamforming strategies, named as Null-Space Beamforming (NSBF) and Information Leakage Alignment Beamforming (ILABF), the secrecy energy efficiency that is the ratio of total secrecy sum-rate to the total power consumption of the network is calculated. It is shown that the aforementioned problem is non-convex so it will be converted to the convex form, using the Semi-Definite Relaxation (SDR). This problem has not closed-form and is solved using the interior point method.In numerical results, it is observed that by using the information leakage alignment beamforming (ILABF) method, energy efficiency is allocated more value than the null-space beamforming (NSBF) approach that was used in previous studies.
[1] L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, "Secure cooperative communications with an untrusted relay: a NOMA-inspired jamming and relaying approach," IEEE Trans. on Information Forensics and Security, vol. 14, no. 12, pp. 3191-3205, Dec. 2019.
[2] M. Luo, X. Li, J. Wang, Q. Yin, W. Tang, and S. Li, "Secure transmission schemes for two-way relay networks," IEEE Access, vol. 7, pp. 50148-50158, Apr. 2019.
[3] S. F. Bozorgi and S. Akhlaghi, "Secrecy sum rate maximisation in multi-antenna two-way relay networks," IET Communications, vol. 14, no. 4, pp. 541-548, Mar. 2020.
[4] M. Gong, J. Zheng, and H. Chen, "Energy-efficient power allocation and user selection in amplify-and-forward relay networks," in Proc. 8th Int. Conf. on Wireless Communications & Signal Processing, WCSP'16, , 5 pp., Yangzhou, China, 13-15 Oct. 2016.
[5] M. Mirzaee and S. Akhlaghi, "Beamforming strategies for multi-antenna relay-assisted networks," IET Communications, vol. 10, no. 11, pp. 1384-1393, Jul. 2016.
[6] E. Khordad, S. Akhlaghi, and M. Mirzaee, "Maximising the minimum achievable secrecy rate of two-way relay networks using the null space beamforming method," IET Communications, vol. 11, no. 6, pp. 793-800, May 2017.
[7] B. Rankov and A. Wittneben, "Spectral efficient protocols for half-duplex fading relay channels," IEEE J. on Selected Areas in Communications, vol. 25, no. 2, pp. 379-389, Feb. 2007.
[8] J. Zhang and M. Haardt, "Energy efficient two-way non-regenerative relaying for relays with multiple antennas," IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1079-1083, Aug. 2015.
[9] D. Feng, C. Jiang, G. Lim, L. J. Cimini, G. Feng, and G. Y. Li, "A survey of energy-efficient wireless communications," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 167-178, Feb. 2013.
[10] Z. Fei, N. Li, C. Xing, and S. Gong, "Energy-efficient transceiver design for multi-pair two-way relay systems," China Communications, vol. 12, no. 9, pp. 133-140, Sept. 2015.
[11] K. Singh, M. Ku, and J. Lin, "Power control for achieving energy-efficient multiuser two-way balancing relay networks," in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP'14, pp. 2749-2753, Florence,Italy, 4-9 May 2014.
[12] I. Priyadharshini and S. Nandakumar, "The energy efficient power allocation for multiple relay-aided D2D communication in 5G networks using iterative algorithm," in Proc. Int. Conf. on Vision Towards Emerging Trends in Communication and Networking, ViTECoN'19, 5 pp., Vellore, India, 4-9 May 2019.
[13] A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
[14] I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
[15] A. Kalantari, S. Maleki, S. Chatzinotas, and B. Ottersten, "Secrecy energy efficiency optimization for MISO and SISO communication networks," in Proc. IEEE 16th Int. Workshop on Signal Processing Advances in Wireless Communications, SPAWC'15, pp. 21-25, Stockholm, Sweden, 28 Jun-1 Jul. 2015.
[16] J. Ouyang, M. Lin, W. Zhu, T. Hong, and B. Xu, "Distributed-relay beamforming for secrecy energy efficiency with coordinated eavesdroppers," IEEE Communications Letters, vol. 22, no. 5, pp. 1054-1057, Feb. 2018.
[17] S. Zhao, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, "Secure and energy-efficient beamforming for MIMO two-way untrusted relay systems," in Proc. IEEE Wireless Communications and Networking Conf., WCNC'19, 6 pp., Marrakesh, Morocco, 15-18 Apr. 2019.
[18] E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming," IEEE Trans. on Information Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
[19] S. Cui, A. J. Goldsmith, and A. Bahai, "Modulation optimization under energy constraints," in Proc. IEEE Int. Conf. on Communications, vol. 4pp. 2805-2811, , Anchorage, AK, USA, 11-15 May 2003.
[20] A. Charnes and W. W. Cooper, "Programming with linear fractional functional," Nav. Res. Logist. Q, vol. 9, no. 3-4, pp. 181-186, Sept. 1962.
[21] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming," Available at http://cvxr.com/cvx, Sept. 2010.
[22] S. Zhang, "Quadratic maximization and semidefinite relaxation," Math. Program, vol. 87, no. 3, pp. 453-465, May 2000.
[23] Z. Q. Luo, W. K. Ma, A. M. C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, Apr. 2010.