Correlated channel model-based secure communications in dual-hop wireless communication networks

This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Frontiers of information technology & electronic engineering 2017-06, Vol.18 (6), p.796-807
Hauptverfasser: Yuan, Zhen-hua, Chen, Chen, Cheng, Xiang, Lv, Guo-cheng, Yang, Liu-qing, Jin, Ye
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 807
container_issue 6
container_start_page 796
container_title Frontiers of information technology & electronic engineering
container_volume 18
creator Yuan, Zhen-hua
Chen, Chen
Cheng, Xiang
Lv, Guo-cheng
Yang, Liu-qing
Jin, Ye
description This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.
doi_str_mv 10.1631/FITEE.1700023
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918725565</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>672545903</cqvip_id><sourcerecordid>2918725565</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</originalsourceid><addsrcrecordid>eNp1kL1PwzAQxS0EElXpyG7B7OKvOPGIqhYqVWIps3Ecp01J7NZOhPjvMbSAGJjudPq9e3cPgGuCp0QwcrdYrufzKckxxpSdgRHFMkOSMnz-3ZOCX4JJjLuEEEFkLosReJn5EGyre1tBs9XO2RZ2vrItKnVMs2jNECw0vusG1xjdN95F2DhYDbpFW7-Hb03S2xj_MtDZ_s2H13gFLmrdRjs51TF4XszXs0e0enpYzu5XyDBGelRpzDiRhGhe44JLKSzVUpZEVIXAuCgxr6nmOJ1tMlHYMmc6fUCMqUquKWdjcHvcuw_-MNjYq50fgkuWiqbXc5plIksUOlIm-BiDrdU-NJ0O74pg9Zmj-spRnXJM_PTIx8S5jQ2_W_8T3JwMtt5tDknz4yDSDTyTmLEPMmd_-w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918725565</pqid></control><display><type>article</type><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</creator><creatorcontrib>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</creatorcontrib><description>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</description><identifier>ISSN: 2095-9184</identifier><identifier>EISSN: 2095-9230</identifier><identifier>DOI: 10.1631/FITEE.1700023</identifier><language>eng</language><publisher>Hangzhou: Zhejiang University Press</publisher><subject>Algorithms ; Antennas ; Beamforming ; Business metrics ; Channels ; Codes ; Communication networks ; Communications Engineering ; Communications networks ; Computer Hardware ; Computer Science ; Computer Systems Organization and Communication Networks ; Correlation ; Eavesdropping ; Electrical Engineering ; Electronic surveillance ; Electronics and Microelectronics ; Ergodic processes ; Instrumentation ; Lower bounds ; Maximization ; Networks ; Optimization ; Receivers &amp; amplifiers ; Relay ; Wireless communications ; Wireless networks</subject><ispartof>Frontiers of information technology &amp; electronic engineering, 2017-06, Vol.18 (6), p.796-807</ispartof><rights>Zhejiang University and Springer-Verlag GmbH Germany 2017</rights><rights>Zhejiang University and Springer-Verlag GmbH Germany 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</citedby><cites>FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/89589A/89589A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1631/FITEE.1700023$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918725565?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Yuan, Zhen-hua</creatorcontrib><creatorcontrib>Chen, Chen</creatorcontrib><creatorcontrib>Cheng, Xiang</creatorcontrib><creatorcontrib>Lv, Guo-cheng</creatorcontrib><creatorcontrib>Yang, Liu-qing</creatorcontrib><creatorcontrib>Jin, Ye</creatorcontrib><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><title>Frontiers of information technology &amp; electronic engineering</title><addtitle>Frontiers Inf Technol Electronic Eng</addtitle><addtitle>Frontiers of Information Technology & Electronic Engineering</addtitle><description>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</description><subject>Algorithms</subject><subject>Antennas</subject><subject>Beamforming</subject><subject>Business metrics</subject><subject>Channels</subject><subject>Codes</subject><subject>Communication networks</subject><subject>Communications Engineering</subject><subject>Communications networks</subject><subject>Computer Hardware</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Correlation</subject><subject>Eavesdropping</subject><subject>Electrical Engineering</subject><subject>Electronic surveillance</subject><subject>Electronics and Microelectronics</subject><subject>Ergodic processes</subject><subject>Instrumentation</subject><subject>Lower bounds</subject><subject>Maximization</subject><subject>Networks</subject><subject>Optimization</subject><subject>Receivers &amp; amplifiers</subject><subject>Relay</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>2095-9184</issn><issn>2095-9230</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kL1PwzAQxS0EElXpyG7B7OKvOPGIqhYqVWIps3Ecp01J7NZOhPjvMbSAGJjudPq9e3cPgGuCp0QwcrdYrufzKckxxpSdgRHFMkOSMnz-3ZOCX4JJjLuEEEFkLosReJn5EGyre1tBs9XO2RZ2vrItKnVMs2jNECw0vusG1xjdN95F2DhYDbpFW7-Hb03S2xj_MtDZ_s2H13gFLmrdRjs51TF4XszXs0e0enpYzu5XyDBGelRpzDiRhGhe44JLKSzVUpZEVIXAuCgxr6nmOJ1tMlHYMmc6fUCMqUquKWdjcHvcuw_-MNjYq50fgkuWiqbXc5plIksUOlIm-BiDrdU-NJ0O74pg9Zmj-spRnXJM_PTIx8S5jQ2_W_8T3JwMtt5tDknz4yDSDTyTmLEPMmd_-w</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Yuan, Zhen-hua</creator><creator>Chen, Chen</creator><creator>Cheng, Xiang</creator><creator>Lv, Guo-cheng</creator><creator>Yang, Liu-qing</creator><creator>Jin, Ye</creator><general>Zhejiang University Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope></search><sort><creationdate>20170601</creationdate><title>Correlated channel model-based secure communications in dual-hop wireless communication networks</title><author>Yuan, Zhen-hua ; Chen, Chen ; Cheng, Xiang ; Lv, Guo-cheng ; Yang, Liu-qing ; Jin, Ye</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-da0341911a4f084996e2a99b16d86008b04f2a40197c568eb73a9791ccdb4a243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Antennas</topic><topic>Beamforming</topic><topic>Business metrics</topic><topic>Channels</topic><topic>Codes</topic><topic>Communication networks</topic><topic>Communications Engineering</topic><topic>Communications networks</topic><topic>Computer Hardware</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Correlation</topic><topic>Eavesdropping</topic><topic>Electrical Engineering</topic><topic>Electronic surveillance</topic><topic>Electronics and Microelectronics</topic><topic>Ergodic processes</topic><topic>Instrumentation</topic><topic>Lower bounds</topic><topic>Maximization</topic><topic>Networks</topic><topic>Optimization</topic><topic>Receivers &amp; amplifiers</topic><topic>Relay</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuan, Zhen-hua</creatorcontrib><creatorcontrib>Chen, Chen</creatorcontrib><creatorcontrib>Cheng, Xiang</creatorcontrib><creatorcontrib>Lv, Guo-cheng</creatorcontrib><creatorcontrib>Yang, Liu-qing</creatorcontrib><creatorcontrib>Jin, Ye</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Frontiers of information technology &amp; electronic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuan, Zhen-hua</au><au>Chen, Chen</au><au>Cheng, Xiang</au><au>Lv, Guo-cheng</au><au>Yang, Liu-qing</au><au>Jin, Ye</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Correlated channel model-based secure communications in dual-hop wireless communication networks</atitle><jtitle>Frontiers of information technology &amp; electronic engineering</jtitle><stitle>Frontiers Inf Technol Electronic Eng</stitle><addtitle>Frontiers of Information Technology & Electronic Engineering</addtitle><date>2017-06-01</date><risdate>2017</risdate><volume>18</volume><issue>6</issue><spage>796</spage><epage>807</epage><pages>796-807</pages><issn>2095-9184</issn><eissn>2095-9230</eissn><abstract>This article is focused on secure relay beamformer design with a correlated channel model in the relay-eavesdropper network. In this network, a single-antenna source-destination pair transmits secure information with the help of an amplify-and-forward (AF) relay equipped with multiple antennas, and the legitimate and eavesdropping channels are correlated. The relay cannot obtain the instantaneous channel state information (CSI) of the eavesdropper, and has only the knowledge of correlation information between the legitimate and eavesdropping channels. Depending on this information, we derive the conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied for the approximate ergodic secrecy rate:(1) the generalized match-andforward (GMF) beamformer to maximize the legitimate channel rate, and (2) the general-rank beamformer (GRBF).In addition, one lower-bound-maximizing (LBM) beamformer at the relay is discussed for maximizing the lower bound of the ergodic secrecy rate. We find that the GMF beamformer is the optimal rank-one beamformer, that the GRBF is the iteratively optimal beamformer, and that the performance of the LBM beamformer for the ergodic secrecy rate gets close to that of the GRBF for the approximate secrecy rate. It can also be observed that when the relay has lower power or the channel gain of the second hop is low, the performance of the GMF beamformer surpasses that of the GRBF. Numerical results are presented to illustrate the beamformers' performance.</abstract><cop>Hangzhou</cop><pub>Zhejiang University Press</pub><doi>10.1631/FITEE.1700023</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2095-9184
ispartof Frontiers of information technology & electronic engineering, 2017-06, Vol.18 (6), p.796-807
issn 2095-9184
2095-9230
language eng
recordid cdi_proquest_journals_2918725565
source ProQuest Central UK/Ireland; Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Algorithms
Antennas
Beamforming
Business metrics
Channels
Codes
Communication networks
Communications Engineering
Communications networks
Computer Hardware
Computer Science
Computer Systems Organization and Communication Networks
Correlation
Eavesdropping
Electrical Engineering
Electronic surveillance
Electronics and Microelectronics
Ergodic processes
Instrumentation
Lower bounds
Maximization
Networks
Optimization
Receivers & amplifiers
Relay
Wireless communications
Wireless networks
title Correlated channel model-based secure communications in dual-hop wireless communication networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A19%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Correlated%20channel%20model-based%20secure%20communications%20in%20dual-hop%20wireless%20communication%20networks&rft.jtitle=Frontiers%20of%20information%20technology%20&%20electronic%20engineering&rft.au=Yuan,%20Zhen-hua&rft.date=2017-06-01&rft.volume=18&rft.issue=6&rft.spage=796&rft.epage=807&rft.pages=796-807&rft.issn=2095-9184&rft.eissn=2095-9230&rft_id=info:doi/10.1631/FITEE.1700023&rft_dat=%3Cproquest_cross%3E2918725565%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918725565&rft_id=info:pmid/&rft_cqvip_id=672545903&rfr_iscdi=true