JOURNAL ARTICLE

Achievable rate region with secrecy constraints for secure communication in two‐way relay networks

Yunchuan YangWenbo WangHui Zhao

Year: 2013 Journal:   International Journal of Communication Systems Vol: 28 (2)Pages: 231-249   Publisher: Wiley

Abstract

SUMMARY In this paper, we consider a two‐way relay network consisted of two sources and multiple relays in the presence of an eavesdropper, where the cooperative beamforming strategy is applied to exploit the cooperative diversity to support the secure communication as illustrated in Figure 1. Naturally, we are interested in the beamforming strategy and power allocation to maximize the achievable sum secrecy rate. However, the corresponding problem is equivalent to solve a product of three correlated generalized Rayleigh quotients problem and difficult to solve in general. Because of the openness of wireless medium, the information rate leakage to the eavesdropper cannot be canceled perfectly. To some extent, ‘almost perfect secrecy’, where the rate leakage to the eavesdropper is limited, is more interesting from the practical point of view. In this case, we concern ourself mainly the achievable rate region for general case where the rate at the eavesdropper is regarded as the measurement of secrecy level. Two beamforming approaches, optimal beamforming and null space beamforming, are applied to investigate the achievable rate region with total power constraint and the rate constraint at the eavesdropper, which can be obtained by solving a sequence of the weighted sum inverse‐signal‐to‐noise‐ratio minimization (WSISM) problem. Because of the non‐convexity of WSISM problem, an alternating iteration algorithm is proposed to optimize the relay beamforming vector and two sources' transmit power, where two subproblems need to be solved in each iteration. Meanwhile, we provide the convergence analysis of proposed algorithm. Through the numerical simulations, we verify the effectiveness of proposed algorithm. Copyright © 2013 John Wiley & Sons, Ltd.

Keywords:
Beamforming Computer science Relay Mathematical optimization Artificial noise Rate of convergence Wireless Channel (broadcasting) Power (physics) Computer network Telecommunications Physical layer Mathematics

Metrics

6
Cited By
0.62
FWCI (Field Weighted Citation Impact)
44
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Achievable secrecy rate region of two-way communication with secret key feedback

Li TaoShidong Zhou

Journal:   Tsinghua Science & Technology Year: 2018 Vol: 23 (2)Pages: 126-134
JOURNAL ARTICLE

Achievable Rate Region of Energy-Harvesting Based Secure Two-Way Buffer-Aided Relay Networks

Yulong NieXiaolong LanYong LiuQingchun ChenGaojie ChenLisheng FanDong Tang

Journal:   IEEE Transactions on Information Forensics and Security Year: 2020 Vol: 16 Pages: 1610-1625
JOURNAL ARTICLE

Secrecy Achievable Rate of Two-Way Illegitimate Full-Duplex Relay-Assisted NOMA with CCI

Volkan Özduran

Journal:   Wireless Personal Communications Year: 2023 Vol: 132 (2)Pages: 865-888
© 2026 ScienceGate Book Chapters — All rights reserved.