Secrecy Rate and Optimal Power Allocation of the Amplify-and-Forward Relay Wire-Tap System

  • Cuong Dang The University of Akron, Akron, OH, USA
  • Leonardo J. Rodr´ıguez McGill University, Montr´eal, Qu´ebec, Canada
  • Nghi H. Tran The University of Akron, OH, USA
  • Forrest Sheng Bao The University of Akron, USA
  • Shivakumar Sastry The University of Akron, USA

Abstract

In this research work, we investigate the secrecy rate and optimal power allocation schemes for a half-duplex (HD) wire-tap Rayleigh fading channel in which a source wishes to communicate securely to a destination in the presence of an eavesdropper and under the aid of an amplify-and-forward (AF) relay. The secrecy capacity and the corresponding optimal power allocation schemes are examined under both individual and joint power constraints. Due to the absence of an insightful expression of the secrecy rate for a given power allocation scheme, determining such secrecy capacity is challenging. To overcome this issue, we first propose a novel method to calculate the expectation of an exponentially distributed random variable using the exponential integral function. By exploiting this calculation, we then establish the average secrecy rate of the considered AF relay channel in closed-form. By examining the quasi-concavity of the optimal power allocation problem, it is then concluded that the problem is quasi-concave. As such, the globally optimal solution exists and is unique for both individual and joint power constraints. A simple root finding method then can be applied into the derived close-formed formula to approximately calculate the optimal power allocation scheme to achieve the secrecy capacity. Numerical results are then provided to confirm the accuracy of the derived formula and the optimality of the proposed power allocation.

Downloads

Download data is not yet available.

References

[1] C. Dang, L. Rodr´ıguez, D.-A. Le, F. Bao, and N. H. Tran, “Secrecy rate of the amplify-and-forward relay wire-tap channel in rayleigh fading,” in Mobile and Wireless Tech., Jun. 2015, pp. 25–32.
[2] R. Pabst, B. H. Walke, D. Schultz, P. Herhold, H. Yanikomeroglu, S. Mukherjee, H. Viswanathan, M. Lott,
W. Zirwas, M. Dohler, H. Aghvami, D. Falconer, and G. Fettweis, “Relay-based deployment concepts for wireless
and mobile broadband radio,” IEEE Commun. Mag., vol. 42, no. 9, pp. 80–89, Sep. 2004.
[3] K. Loa, C.-C. Wu, S.-T. Sheu, Y. Yuan, M. Chion, D. Huo, and L. Xu, “IMT-advanced relay standards [WiMAX/LTE
update],” IEEE Commun. Mag., vol. 48, no. 8, pp. 40–48, Aug. 2010.
[4] L. Rodriguez, N. H. Tran, and T.Le-Ngoc, “Optimal power adaptation for cooperative af relaying with channel side information,” IEEE Trans. Veh. Technol., vol. 62, no. 7, pp. 3164–3174, Sept 2013.
[5] N. Tran, L. Rodriguez, T. Le-Ngoc, and H. Bahrami, “Precoding and symbol grouping for naf relaying in bicm systems,”IEEE Trans. Veh. Technol., vol. 62, no. 6, pp. 2607–2617, July 2013.
[6] M. Hasna and M.-S. Alouini, “Outage probability of multihop transmission over nakagami fading channels,” IEEE Commun. Lett., vol. 7, no. 5, pp. 216–218, May 2003.
[7] ——, “End-to-end performance of transmission systems with relays over rayleigh-fading channels,” IEEE Trans. Wireless Commun., vol. 2, no. 6, pp. 1126–1131, Nov 2003.
[8] ——, “A performance study of dual-hop transmissions with fixed gain relays,” vol. 3, no. 6, Nov 2004, pp. 1963–1968.
[9] L. Rodriguez, N. H. Tran, and T.Le-Ngoc, “Optimal power allocation and capacity of full-duplex AF relaying under residual self-interference,” IEEEWireless Commun. Lett., vol. 3, no. 2, pp. 233–236, Apr. 2014.
[10] A. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
[11] E. Tekin and A. Yener, “The general Gaussian multipleaccess and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, Jun. 2008.
[12] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” IEEE Trans. Inf. Theor., vol. 57, no. 5, pp. 3153–3167, May 2011.
[13] I. Krikidis, J. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
[14] L. Dong, Z. Han, A. Petropulu, and H. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
[15] J. Li, A. Petropulu, and S. Weber, “On cooperative relaying schemes for wireless physical layer security,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985–4997, Oct. 2011.
[16] G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,”IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
[17] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310–320, Feb. 2012.
[18] Z. Ding, K. Leung, D. Goeckel, and D. Towsley, “On the application of cooperative transmission to secrecy communications,” IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359–368, Feb. 2012.
[19] H.-M.Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532–3545, Jul. 2012.
[20] L. Rodriguez, N. H. Tran, and T.Le-Ngoc, “Optimal power allocation schemes for single-relay AF wire-tap channels,” in Proc. IEEE Int. Conf. Commun. Electron., Da Nang, Vietnam, 30 Jul.-1 Aug. 2014.
[21] X. Chen, C. Zhong, C. Yuen, and H. H. Chen, “Multi-antenna relay aided wireless physical layer security,” IEEE Commun. Mag., vol. 53, no. 12, pp. 40–46, Dec 2015.
[22] X. Chen, L. Lei, H. Zhang, and C. Yuen, “Large-scale mimo relaying techniques for physical layer security: Af or df?” IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135–5146, Sept 2015.
[23] X. Chen, J. Chen, H. Zhang, Y. Zhang, and C. Yuen, “On secrecy performance of a multi-antenna jammer aided secure communications with imperfect csi,” IEEE Trans. Veh. Technol., vol. PP, no. 99, pp. 1–1, 2015.
[24] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004.
[25] M. K. Simon and M. S. Alouini, Digital Communication over Fading Channels: A Unified Approach to Performance Analysis, 1st ed. New York: Wiley, 2000.
[26] J. Shao, M.-S. Alouini, and A. Goldsmith, “Impact of fading correlation and unequal branch gains on the capacity of diversity systems,” in Proc. IEEE Veh. Technol. Conf., vol. 3, Jul. 1999, pp. 2159–2163 vol.3.
[27] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions. Dover Publications, Inc., New York, 1965.

Published
2016-08-31
How to Cite
DANG, Cuong et al. Secrecy Rate and Optimal Power Allocation of the Amplify-and-Forward Relay Wire-Tap System. Journal of Science and Technology: Issue on Information and Communications Technology, [S.l.], v. 2, n. 1, p. 1-8, aug. 2016. ISSN 1859-1531. Available at: <http://ict.jst.udn.vn/index.php/jst/article/view/19>. Date accessed: 22 nov. 2024. doi: https://doi.org/10.31130/jst.2016.19.