QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty
Abstract
In this letter, we study relay-aided networks with presence of single eavesdropper. We provide joint beamforming design of the source and relay that can minimize the overall power consumption while satisfying our predefined quality-of-service (QoS) requirements. Additionally, we investigate the case that the channel between relay and eavesdropper suffers from channel uncertainty. Finally, simulation results are provided to verify the effectiveness of our algorithm.
Index Terms:
QoS, security, channel uncertainty, beamforming.I Introduction
Recently, research concerning secrecy capacity has captured considerable attentions, though initial concept of secure communication can be dated back to the 1970s [1]. Traditional high layer encryption-based method can hardly be applied in certain circumstances, e.g., wireless local area network (WLAN) or Ad hoc networks. Due to the fact that users’ random accessing and leaving are difficult to predict in WLAN scenario, establishing an appropriate high layer protocol is not an easy task. Additionally, in Ad hoc networks a complete transmission might take several hops and be relayed by other users. Consequently, how to guarantee secure communication has become a critical issue.
Roughly speaking, the research in this area can be classified into three categories. The first category falls into the artificial-noise based algorithm that relies on generating additional noise bringing more negative effect to the eavesdropper than to the legal user. In [2], the authors investigate a point-to-point system with the presence of an eavesdropper and it has been shown how secrecy can be achieved by adding artificial noise. The second category falls into beamforming based algorithm. For instance, a joint beamforming design of relay and source is proposed in [3] with the assumption that the relay also plays as an eavesdropper that tends to wiretap the user’s message. The last category is a combination of the above two sorts. Specifically, in [4] the authors study a broadcast scenario by utilizing both the artificial noise and beamforming together and simulation results demonstrate that joint design can achieve better performance.
It should be noticed that all the above studies are based on the perfect channel state information (CSI) assumptions. Although the channel between relay and legal user can be obtained through uplink feedback, such assumption is not appropriate for the channel between eavesdropper and relay since eavesdropper usually behaves in passive manner. Therefore, it is more practical to consider the imperfect CSI cases. In [5], the authors investigate a multipoint-to-mutlipoint system under norm-bounded error model and propose precoding designs that can maximize the users’ signal-to-interference-plus-noise-ratio (SINR). Besides, relay-aided multiple source-destination pairs networks have been studied in [6], where all channels suffer from norm-bounded errors. The authors provide relay precoding strategy that can minimize the power consumption while maintaining certain quality-of-service (QoS) requirements. Moreover, in [7] the authors tend to maximize the legal user’s SINR while constraining the eavesdropper’s SINR below a threshold.
In this letter, we will study relay-aided networks that beamforming technology is adopted at both source and relay. Additionally, we assume that the channel between relay and eavesdropper is not perfect, specifically, following the norm-bounded model. Our target is to minimize the sum power consumption of relay and source while satisfying the legal user’s QoS requirement and maintaining the eavesdropper’s signal-to-noise-ratio (SNR) below a threshold.
Notations: In this paper, we use bold uppercase and lowercase letters denote matrices and vectors, respectively; , and to denote the conjugate, transpose and conjugate transpose of a matrix or a vector, respectively; is an identity matrix; denotes the statistical expectation; and are the trace of a matrix and the real part of a variable, respectively; represents the matrix vectorization; denotes the Kronecker product; denotes the Frobenius norm; represents the property of semidefinite.
II System Model
Throughout this letter, we assume that Bob, equipped with single antenna, is a legal subscriber of cellular networks. At the same time, there also exists a single-antenna eavesdropper wiretapping the transmitting data for Bob. Besides, it is supposed that direct communication between source and Bob is inapplicable mainly due to the large-scale fading caused by long distance between them. As a result, relay technology has to be introduced so as to help the transmission shown in Fig. 1. The source and relay are equipped with antennas and antennas, respectively. Moreover, two timeslots are needed to complete a transmission process. In the first timeslot, the source transmits the message intended for Bob, which can be expressed as
(1) |
where denotes the beamforming vector executed at source; is the intended data for Bob which satisfies . The signal received at relay can be written as
(2) |
where represents the channel between relay and source; is the additive Gaussian noise which satisfies . Afterwards, the received data at relay will be multiplied by precoding matrix ,
(3) |
In the second timeslot, relay will broadcast the signal . The received signal at Bob can be expressed as
(4) |
where is the channel between relay and Bob which can be acquired by the feedback information from Bob and is the additive Gaussian noise at Bob satisfying . In this letter, we assume that the channel knowledge about is perfect. However, the channel between relay and eavesdropper cannot be guaranteed to be perfect. In this letter, we will adopt a norm-bound error model where the norm of channel estimation error is inferior to a threshold. The channel between relay and eavesdropper can be presented as
(5) |
where is estimated channel between eavesdropper and relay and is the channel estimation errors bounded by radius . Similarly, the received signal at eavesdropper is expressed as
(6) |
where is additive Gaussian noise satisfying .

III Joint Source and Relay Beamforming Design with Presence of Channel Uncertainty
In this letter, we aim to minimize the entire power consumption at source and relay while satisfying predefined QoS requirement for Bob and simultaneously constraining the SNR of eavesdropper below certain threshold, respectively. The SNR of Bob and eavesdropper can be expressed as
(7) |
and
(8) |
Hence, our optimization problem can be formulated as
(9a) | |||
(9b) | |||
(9c) |
where and denote the predefined thresholds for Bob and eavesdropper, respectively.
Define , the base station power can be turned into
(10) |
By introducing and , and with the help of equalities and [8], the relay’s power can be transformed as
(11) | |||||
Similarly, SNR of Bob can be rewritten as
(12) | |||||
Nevertheless, the SNR of eavesdropper is difficult to handle due to the presence of channel uncertainty. Therefore, we resort to optimizing the worst case of eavesdropper’s SNR. Here, we will separately find the upper bound of the numerator of and lower bound of the denominator of , respectively.
Before explicit computations of the lower and upper bounds, we will state the following two useful results [6] that will be utilized later. For the following two problems
(13) | |||
(14) |
their solutions can be given by
(15) | |||
(16) |
Then, given , , and , the following equalities hold
(17) |
where the equality (a) holds with the help of the equation ; the equalities (b) (c) and (d) hold with the help of [8].
Furthermore, we define and , where is the transformation matrix formed by ones and zeros, which can be built by observing the relationship between and . Then, (III) can be transformed into
(18) | |||||
Inserting (5) into the numerator of eavesdropper’s SNR (8) and omitting the terms involving second order channel uncertainties, the upper bound of ’s numerator can be written as
(19) | |||||
where the inequality holds by using (15). Similarly, the lower bound of ’s denominator can be expressed as
(20) | |||||
where the inequality holds by using (16). Thus, the optimization problem (9) can be reformulated as
(21) |
where
(22) | |||
(23) |
However, the optimizing problem (III) is non-convex due to the rank constraints. Therefore, we resort to semidefinite relaxation technique that firstly neglects these rank constraints, and the optimization problem turns to be
(24a) | |||
(24b) | |||
(24c) |
Additionally, the above problem is still non-convex for both and due to the bilinear properties [9]. Nevertheless, with fixed , the problem is convex for . Similarly, with fixed , the problem is convex for . Therefore, we can use iterative algorithm to solve the optimization problem (24), which is stated in Algorithm. 1.
To solve problem (24) we used CVX, a package for specifying and solving convex programs [10]. Let us denote and as the solution obtained from . If and , then we can use eigenvalue decomposition to obtain the optimal and ; Otherwise, randomization technique can be applied to obtain and [11]. Specifically, we generate a set of random dual vectors which conform the Gaussian distribution, i.e., and . Among these dual vectors, there might exist the pairs that violate the constraints of (24). Accordingly, we use and as the scale factors and denote and as the new candidate pair. The values of and could be obtained by setting the the constraints of (24) to equalities as shown in (25).
(25) |
Finally, the candidate pair that can achieve the minimum value of objective function (24a) can be viewed as a quasi-optimal solution. The randomization technique applied in this letter is summarized in Algorithm. 2.
IV Simulation Results
Numerical results are demonstrated in this section so as to verify the effectiveness of our proposed method. Without loss of generality, we set and . The simulation results are averaged over 1000 channel realizations.
Firstly, we investigate the power consumption versus different thresholds of (24) in Fig. 2. The non-robust precoding scheme corresponds to the case of setting in (24). From Fig. 2, we can observe that with fixed and , the robust precoding scheme will always consume more power than the non-robust precoding scheme, which is reasonable since the worst-case is considered in our robust scheme. Similar performance can also be seen in [6]. Besides, for both of the robust beamforming scheme and the non-robust beamforming scheme, as the thresholds become tighter, more power comsumption is expected which is in consistent with our analysis. However, such comparison cannot show the actual performance of robust precoding scheme. The actual performance will be illustrated in Fig. 3.
Then, we examine distribution of the eavesdropper’s SNR with distinct values of and . With fixed values of and , we can observe that for the non-robust precoding scheme almost half of eavesdropper’s SNRs will be larger than the preset thresholds. Oppositely, the majority of our robust scheme’s SNRs will be less than these thresholds. Additionally, since our designed beamforming vector is to constrain SNR of eavesdropper for the worst-case channel error, it might result in performance degradation for other channel error cases. Thus, that is why there are still SNRs that are larger than the thresholds for our robust precoding.


V Conclusion
This letter proposes a source and relay secure optimization design with presence of channel uncertainty. It aims at minimizing the sum power consumption of source and relay while satisfying certain prefixed QoS requirements. Finally, simulation results verify the effectiveness of our algorithm compared with non-robust precoding scheme.
References
- [1] A. D. Wyner, ”The Wire-Tap Channel,” Bell Sys. Tech. J., pp. 1355-1387, October 1975.
- [2] S. Goel and R. Negi, ”Guaranteeing Secrecy using Artificial Noise,” Wireless Communications, IEEE Transactions on , vol. 7, no. 6, pp. 2180-2189, June 2008.
- [3] C. Jeong, I. Kim and D. Kim, ”Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System,” Signal Processing, IEEE Transactions on, vol. 60, no. 1, pp. 310-325, January 2012.
- [4] W. Liao, T. Chang, W. Ma and C. Chi, ”QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach,” Signal Processing, IEEE Transactions on, vol. 59, no. 3, pp. 1202-1216, March 2011.
- [5] A. Tajer, N. Prasad, and X. Wang, ”Robust linear precoder design for multi-cell downlink transmission,” Signal Processing, IEEE Transactions on, vol. 59, no. 1, pp. 235-251, 2011.
- [6] B. K. Chalise and L. Vandendorpe, ”MIMO Relay Design for Multipoint-to-Multipoint Communications With Imperfect Channel State Information,” Signal Processing, IEEE Transactions on, vol. 57, no. 7, pp. 2785-2796, July 2009.
- [7] Y. Pei, Y. Liang, L. Zhang, K. Teh and K. Li, ”Secure communication over MISO cognitive radio channels,” Wireless Communications, IEEE Transactions on, vol. 9, no. 4, pp. 1494-1502, April 2010.
- [8] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, 1985.
- [9] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
- [10] CVX Research, Inc. CVX: Matlab software for disciplined convex programming, version 2.0 beta. http://cvxr.com/cvx, September 2012.
- [11] Y. Huang and D. P. Palomar, ”Rank-constrained separable semidefinite programming with applications to optimal beamforming,” Signal Processing, IEEE Transactions on, vol. 58, no. 2, pp. 664-678, February 2010.