Correlated channel model-based secure communications in dual-hop wireless communication networks
This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and...
Gespeichert in:
Veröffentlicht in: | Frontiers of information technology & electronic engineering 2017-06, Vol.18 (6), p.796-807 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 807 |
---|---|
container_issue | 6 |
container_start_page | 796 |
container_title | Frontiers of information technology & electronic engineering |
container_volume | 18 |
creator | Yuan, Zhen-hua Chen, Chen Cheng, Xiang Lv, Guo-cheng Yang, Liu-qing Jin, Ye |
description | This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance. |
doi_str_mv | 10.1631/FITEE.1700023 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918725565</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>672545903</cqvip_id><sourcerecordid>2918725565</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</originalsourceid><addsrcrecordid>eNp1kL1PwzAQxS0EElXpyG7B7OKvOPGIqhYqVWIps3Ecp01J7NZOhPjvMbSAGJjudPq9e3cPgGuCp0QwcrdYrufzKckxxpSdgRHFMkOSMnz-3ZOCX4JJjLuEEEFkLosReJn5EGyre1tBs9XO2RZ2vrItKnVMs2jNECw0vusG1xjdN95F2DhYDbpFW7-Hb03S2xj_MtDZ_s2H13gFLmrdRjs51TF4XszXs0e0enpYzu5XyDBGelRpzDiRhGhe44JLKSzVUpZEVIXAuCgxr6nmOJ1tMlHYMmc6fUCMqUquKWdjcHvcuw_-MNjYq50fgkuWiqbXc5plIksUOlIm-BiDrdU-NJ0O74pg9Zmj-spRnXJM_PTIx8S5jQ2_W_8T3JwMtt5tDknz4yDSDTyTmLEPMmd_-w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918725565</pqid></control><display><type>article</type><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</creator><creatorcontrib>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</creatorcontrib><description>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</description><identifier>ISSN: 2095-9184</identifier><identifier>EISSN: 2095-9230</identifier><identifier>DOI: 10.1631/FITEE.1700023</identifier><language>eng</language><publisher>Hangzhou: Zhejiang University Press</publisher><subject>Algorithms ; Antennas ; Beamforming ; Business metrics ; Channels ; Codes ; Communication networks ; Communications Engineering ; Communications networks ; Computer Hardware ; Computer Science ; Computer Systems Organization and Communication Networks ; Correlation ; Eavesdropping ; Electrical Engineering ; Electronic surveillance ; Electronics and Microelectronics ; Ergodic processes ; Instrumentation ; Lower bounds ; Maximization ; Networks ; Optimization ; Receivers & amplifiers ; Relay ; Wireless communications ; Wireless networks</subject><ispartof>Frontiers of information technology & electronic engineering, 2017-06, Vol.18 (6), p.796-807</ispartof><rights>Zhejiang University and Springer-Verlag GmbH Germany 2017</rights><rights>Zhejiang University and Springer-Verlag GmbH Germany 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</citedby><cites>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89589A/89589A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1631/FITEE.1700023$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918725565?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Yuan, Zhen-hua</creatorcontrib><creatorcontrib>Chen, Chen</creatorcontrib><creatorcontrib>Cheng, Xiang</creatorcontrib><creatorcontrib>Lv, Guo-cheng</creatorcontrib><creatorcontrib>Yang, Liu-qing</creatorcontrib><creatorcontrib>Jin, Ye</creatorcontrib><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><title>Frontiers of information technology & electronic engineering</title><addtitle>Frontiers Inf Technol Electronic Eng</addtitle><addtitle>Frontiers of Information Technology & Electronic Engineering</addtitle><description>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</description><subject>Algorithms</subject><subject>Antennas</subject><subject>Beamforming</subject><subject>Business metrics</subject><subject>Channels</subject><subject>Codes</subject><subject>Communication networks</subject><subject>Communications Engineering</subject><subject>Communications networks</subject><subject>Computer Hardware</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Correlation</subject><subject>Eavesdropping</subject><subject>Electrical Engineering</subject><subject>Electronic surveillance</subject><subject>Electronics and Microelectronics</subject><subject>Ergodic processes</subject><subject>Instrumentation</subject><subject>Lower bounds</subject><subject>Maximization</subject><subject>Networks</subject><subject>Optimization</subject><subject>Receivers & amplifiers</subject><subject>Relay</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>2095-9184</issn><issn>2095-9230</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kL1PwzAQxS0EElXpyG7B7OKvOPGIqhYqVWIps3Ecp01J7NZOhPjvMbSAGJjudPq9e3cPgGuCp0QwcrdYrufzKckxxpSdgRHFMkOSMnz-3ZOCX4JJjLuEEEFkLosReJn5EGyre1tBs9XO2RZ2vrItKnVMs2jNECw0vusG1xjdN95F2DhYDbpFW7-Hb03S2xj_MtDZ_s2H13gFLmrdRjs51TF4XszXs0e0enpYzu5XyDBGelRpzDiRhGhe44JLKSzVUpZEVIXAuCgxr6nmOJ1tMlHYMmc6fUCMqUquKWdjcHvcuw_-MNjYq50fgkuWiqbXc5plIksUOlIm-BiDrdU-NJ0O74pg9Zmj-spRnXJM_PTIx8S5jQ2_W_8T3JwMtt5tDknz4yDSDTyTmLEPMmd_-w</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Yuan, Zhen-hua</creator><creator>Chen, Chen</creator><creator>Cheng, Xiang</creator><creator>Lv, Guo-cheng</creator><creator>Yang, Liu-qing</creator><creator>Jin, Ye</creator><general>Zhejiang University Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope></search><sort><creationdate>20170601</creationdate><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><author>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Antennas</topic><topic>Beamforming</topic><topic>Business metrics</topic><topic>Channels</topic><topic>Codes</topic><topic>Communication networks</topic><topic>Communications Engineering</topic><topic>Communications networks</topic><topic>Computer Hardware</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Correlation</topic><topic>Eavesdropping</topic><topic>Electrical Engineering</topic><topic>Electronic surveillance</topic><topic>Electronics and Microelectronics</topic><topic>Ergodic processes</topic><topic>Instrumentation</topic><topic>Lower bounds</topic><topic>Maximization</topic><topic>Networks</topic><topic>Optimization</topic><topic>Receivers & amplifiers</topic><topic>Relay</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuan, Zhen-hua</creatorcontrib><creatorcontrib>Chen, Chen</creatorcontrib><creatorcontrib>Cheng, Xiang</creatorcontrib><creatorcontrib>Lv, Guo-cheng</creatorcontrib><creatorcontrib>Yang, Liu-qing</creatorcontrib><creatorcontrib>Jin, Ye</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Frontiers of information technology & electronic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuan, Zhen-hua</au><au>Chen, Chen</au><au>Cheng, Xiang</au><au>Lv, Guo-cheng</au><au>Yang, Liu-qing</au><au>Jin, Ye</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Correlated channel model-based secure communications in dual-hop wireless communication networks</atitle><jtitle>Frontiers of information technology & electronic engineering</jtitle><stitle>Frontiers Inf Technol Electronic Eng</stitle><addtitle>Frontiers of Information Technology & Electronic Engineering</addtitle><date>2017-06-01</date><risdate>2017</risdate><volume>18</volume><issue>6</issue><spage>796</spage><epage>807</epage><pages>796-807</pages><issn>2095-9184</issn><eissn>2095-9230</eissn><abstract>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</abstract><cop>Hangzhou</cop><pub>Zhejiang University Press</pub><doi>10.1631/FITEE.1700023</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2095-9184 |
ispartof | Frontiers of information technology & electronic engineering, 2017-06, Vol.18 (6), p.796-807 |
issn | 2095-9184 2095-9230 |
language | eng |
recordid | cdi_proquest_journals_2918725565 |
source | ProQuest Central UK/Ireland; Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Algorithms Antennas Beamforming Business metrics Channels Codes Communication networks Communications Engineering Communications networks Computer Hardware Computer Science Computer Systems Organization and Communication Networks Correlation Eavesdropping Electrical Engineering Electronic surveillance Electronics and Microelectronics Ergodic processes Instrumentation Lower bounds Maximization Networks Optimization Receivers & amplifiers Relay Wireless communications Wireless networks |
title | Correlated channel model-based secure communications in dual-hop wireless communication networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A19%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Correlated%20channel%20model-based%20secure%20communications%20in%20dual-hop%20wireless%20communication%20networks&rft.jtitle=Frontiers%20of%20information%20technology%20&%20electronic%20engineering&rft.au=Yuan,%20Zhen-hua&rft.date=2017-06-01&rft.volume=18&rft.issue=6&rft.spage=796&rft.epage=807&rft.pages=796-807&rft.issn=2095-9184&rft.eissn=2095-9230&rft_id=info:doi/10.1631/FITEE.1700023&rft_dat=%3Cproquest_cross%3E2918725565%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918725565&rft_id=info:pmid/&rft_cqvip_id=672545903&rfr_iscdi=true |