1. Introduction
Due to the openness and the broadcast property of wireless communication, network security becomes a challenging issue. The physical layer security technique becomes appealing, because it guarantees the information being only accessed by the legitimate users rather than eavesdroppers. It makes use of the physical characteristics of wireless channels and is free of a security key, so that the information is transmitted securely in the sense that it can be decoded by legitimate users, but not eavesdroppers.
Physical layer security is widely studied from both the information theory aspect and the signal processing aspect for wiretap channels, like broadcast wiretap channels and Multiple-Input-Multiple-Output (MIMO) wiretap channels. The secure communication is managed through multiple-antenna system [
1,
2,
3,
4,
5,
6,
7,
8,
9] or node cooperation [
10,
11]. Research works on node cooperation are well explored. It is suitable for low-complexity networks, which cannot afford multiple antennas. Cooperative relay networks with Amplify-and-Forward (AF) [
12,
13,
14,
15] or Decode-and-Forward (DF) [
16,
17] protocols are mostly investigated. For one-way relay networks, the authors in [
18,
19] design the relay beamforming weights to maximize the secrecy rate and to minimize the relay transmit power; the secrecy outage probability is analyzed for both half-duplex [
20] and full-duplex relay networks [
21]; in [
22], the optimal relay selection schemes are considered, for both AF and DF protocols; the secure energy efficiency maximization model is proposed in [
23]; the asymptotic secrecy performance for the large-scale MIMO relaying scenario is analyzed in [
24], which concludes that the AF protocol is a better choice compared to DF under large transmit powers. Compared to one-way relay, two-way relay networks are more efficient for communications between user pairs. In [
25], the minimum per-user secrecy rate is maximized, and the source power allocation is analyzed, where the relay beamforming vector lies in the nullspace of the equivalent channel of the relay link from user nodes to the eavesdropper.
All the aforementioned references suppose that the CSI from users and from relays to eavesdroppers are perfectly known. In fact, it is very difficult to obtain the perfect CSI of the eavesdroppers. Assuming that no CSI of eavesdroppers is known, artificial noise is introduced in the literature, and enhances security: Wang et al. proposes a cooperative artificial noise transmission-based secrecy strategy and summarizes the relay beamforming design and power allocation problems as second order cone programming and linear programming problems [
14], respectively; Salem et al. sends the artificial noise in the nullspace of the legitimate channel and compares the cases in which that all relays are working and that only the best relay is used [
15]. In [
26], no CSI of eavesdroppers and imperfect CSI between users and jammers are assumed, and the secrecy performance is analyzed for the Cooperative Jamming (CJ) technique. Networks with imperfect CSI are often considered, as well. The multi-user downlink channel is considered in [
27], where the lower bound of the sum secrecy rate is maximized, and semi-definite relaxation and first order Tailor extension techniques are applied. In [
28], a multiple-antenna AF relay network with partial CSI and a bounded error region is considered, which maximizes the worst case secrecy rate, where a rank two relay beamformer is constructed via singular value decomposition. The secure communication switches between the DF relay protocol and the CJ technique in [
29], and the authors provide robust designs for the secrecy rate maximization and secrecy outage probability minimization problems. In [
30], both the source and the relay have multiple antennas, where they jointly design source and relay beamforming matrices, to minimize the relay power with Quality of Service (QoS) constraints. The worst case SNR at the eavesdropper is considered, which is approximated by its upper bound. For a two-way relay network with two users and one eavesdropper, Wang et al. assumes no CSI of the eavesdropper is available [
31]. The artificial noise technique is applied, and the relay transmit power for signals is minimized, while the QoS of two users are guaranteed. A second order cone programming problem is formed and solved by the interior point method.
In this paper, we consider the same communication model as [
31]. Differently, we assume that there is imperfect CSI from users and relays to the eavesdropper. By designing the relay beamforming weights, we build up the model to minimize the relay transmit power, while the QoS of the legitimate users are guaranteed, and the worst case achievable rate of the eavesdropper is upper bounded. Compared to [
31], the proposed model makes use of the imperfect CSI, and guarantees that the achievable rate of the eavesdropper is very low. Compared to the optimization model in [
31], the proposed model has an extra robust constraint for the eavesdropper, which leads to a much more difficult robust optimization problem [
32]. Usually, such problem is NP-hard. There is a lack of an efficient method to solve this kind of problem. We propose an efficient iterative algorithm to solve the problem with the line search technique. In each iteration, two Quadratically-Constrained Quadratic Programming (QCQP) subproblems and a one-dimensional subproblem are solved optimally; the iterative points always remain feasible. The optimality conditions of the robust optimization problem are also analyzed. Simulation results show that compared to [
31], our algorithm achieves a higher secrecy rate; the proposed algorithm is efficient and converges very quickly; numerically, more than 85% of the problems are solved optimally. The main contributions of our paper are listed as follows:
A new model to design the relay beamforming weights is proposed with the assumption of imperfect CSI and summarized as a robust optimization problem.
A novel algorithm is proposed, where the line search technique is applied. A sequence of QCQP subproblems and one-dimensional subproblems is solved optimally. The feasibility is preserved during iterations. Simulation results verify the efficiency of the proposed algorithm.
The optimality properties of the robust optimization problem are analyzed. Numerically, most problems are solved optimally.
The rest of the paper is organized as follows. The system model of the two-way relay network with one eavesdropper is shown in
Section 2. In
Section 3, the corresponding optimization problem is summarized, and a novel algorithm is proposed. Simulation results are shown in
Section 4. The conclusion is summarized in
Section 5.
Notations: Uppercase and lowercase bold-faced letters denote matrices and column vectors, respectively. and represent the real and complex domain, respectively. , and represent the Hermitian, transpose and conjugate of a matrix, respectively. represents the absolute value. By default, is the two-norm of a vector. is the Frobenius norm of a matrix. is the mathematical expectation of a random variable. represents the trace of a matrix. means the real part of a scaler, a vector or a matrix. represents the largest eigenvalue of a Hermitian matrix. is the diagonal matrix with diagonal entries as the elements of vector ; is the diagonal matrix with the same diagonal entries as matrix . represents that the random variable x obeys a Gaussian distribution with the mean as and variance as .
2. System Model
We consider a half-duplex wireless communication system where two legitimate users Alice (
) and Bob (
) exchange messages with
N relay nodes
, in the presence of an eavesdropper Eve, who eavesdrops signals from the two users and relays passively, as illustrated in
Figure 1. Suppose each user, each relay and Eve have a single antenna. The AF relay protocol is applied.
We assume that the perfect CSI between two users and relays is known, as
,
. However, due to limited feedback, it is difficult to obtain perfect CSI of Eve. Thus we assume the imperfect CSI for the channels from users and relays to the eavesdropper, and the norm-bounded error channel estimation is considered. The CSI between the users and the eavesdropper,
, and that between relays and the eavesdropper,
, are assumed to be imperfect and are estimated with bounded errors:
Here, and are the estimations, which are achievable; and are the bounded errors, . Such assumptions are practical in scenarios where some users and relays are turned into eavesdroppers and their CSI have already been partially estimated.
In the first phase, Alice and Bob transmit
,
to all relays, respectively, where
is the fixed transmit power and
is the information symbol with
. Then, relays receive:
where
is the noise at relays with zero mean and covariance matrix as
.
In the second phase, the
n-th relay multiples its received signal by its beamforming weight
and then broadcasts the signal to both users. Thus, the vector transmitted by relays is represented as
, where
and
. Alice receives:
where
is the local noise. It consists of the self-canceled signal, which is perfectly known by Alice and is canceled locally, the desired signal from Bob and the noise. The received signal at Bob has a similar expression.
Since the two source nodes subtract their self-canceled terms, the SNRs achieved at Alice and Bob can be respectively expressed as:
where
,
.
In both phases, Eve listens to the users and relays and receives signals as:
where
and
are the noise at Eve in the two phases, respectively. Suppose Eve is intelligent and tries to decode signals by combining the information received in both phases, which is expressed as:
where:
Suppose all the transmit signals and all the noises are independent of each other. The achievable rate of Eve is denoted as:
Here,
, and:
The detailed deduction is shown in
Appendix A. The definitions of
and
,
are shown in (5) and (1).
We want to design the relay beamforming vector
, to minimize the total relay transmit power, while requiring the SNRs of two legitimate users to be guaranteed and the achievable rate of Eve to be upper-bounded. Due to the imperfect CSI of Eve, the worst case achievable rate is considered. The model is summarized as follows:
where the relay transmit power is:
and
,
,
are the given thresholds. Here the achievable rate of Eve is required to be below the given threshold under any variation of channel coefficients. Due to the constraint (7c), we can guarantee that the achievable rate of Eve is very low. Because of this constraint, problem (7) is a robust optimization problem. It is equivalent to a QCQP problem with infinite constraints, which is usually NP-hard. In the following section, the problem is solved by a novel algorithm.
Remark 1. The model with perfect CSI and that with no CSI [31] are two extreme cases of the model (7). If we let , then the model degenerates to that with perfect CSI; if the parameters ε and , and go to infinity, then it becomes the model with no CSI. 3. Robust Optimization Model
In this section, we first approximate Problem (7) by a new robust optimization problem, where there are less parameters with uncertainty. Then, we propose a novel efficient algorithm to solve the approximated problem.
3.1. Robust Model Formulation
In Problem (7), there are several parameters with uncertainty, which are coupled together and thus make the problem intractable. We tighten the constraint (7c) by replacing
with its upper bound
, where
,
It holds that:
for any
. The detailed deduction is shown in
Appendix B. Problem (7) is tightened as the following robust optimization problem:
Here, , and in Constraint (9c), is the equivalent form as . The parameters , in Problem (7) have been eliminated. Accordingly, any feasible point of Problem (9) is a feasible point of Problem (7).
In the rest of this section, we focus on solving the tightened Problem (9).
3.2. Algorithm Preserving Feasibility
As a robust optimization problem, Problem (9) is still difficult to solve and generally NP-hard. Usually, robust optimization problems are approximated, and the parameters with uncertainty are eliminated. Then, the classical optimization technique is used, and the approximated problem is solved directly. However, sometimes, the approximated problem is not a “good” approximation. It may cut off parts of the feasible region of the original problem and consequently lose the optimality property or even feasibility. To avoid these disadvantages, we propose an efficient iterative algorithm to solve Problem (9). In each iteration, the iterative point is updated by the line search technique, and it is always a feasible point of Problem (9). The optimality properties of Problem (9) are analyzed, as well.
3.2.1. Initialization
First, we initialize the algorithm by solving the following subproblem:
Here, . , , and ; is a scalar, and is a positive integer. and are two parameters to keep the initial point as an interior point of Problem (9).
By transformation, Equation (10) is equivalent to the following QCQP subproblem.
where
,
,
,
,
,
and
are defined below (3),
. Since Subproblem (11) only has three constraints, it is solved optimally by the Semi-Definite Relaxation (SDR) method [
33,
34].
Here, the constraints in Problem (9) are tightened as (10b) and (10c). The following lemma shows that solving (10) provides an initial feasible point of Problem (9).
Lemma 1. The optimal solution of subproblem (10), , is an interior point of problem (9).
The proof is shown in
Appendix C.
is a strictly feasible rather than a feasible point of Problem (9), thanks to the control parameters
and
in Subproblem (10).
3.2.2. Iterations Applying the Line Search Technique
In the
k-th iteration, suppose the iterative point
is an interior point of Problem (9) satisfying:
We will update
using the line search technique [
35] and preserve its feasibility according to Problem (9).
First, we solve two QCQP subproblems to obtain the search direction. The following subproblem is formulated:
It is equivalent to the subproblem below:
where
. Let
, and it is further transformed into the following QCQP subproblem:
It is solved optimally by the SDR method. Let be the optimal solution of (13). Then, , as satisfies (12b).
Taking
into Problem (9) and introducing the parameters
and
, we obtain the subproblem below:
It is equivalent to the QCQP subproblem with three constraints:
where
and
.
,
,
and
,
are defined below (11). It is solved optimally by the SDR method. Let
be the optimal solution of Subproblem (15). Apparently
satisfies (12a), but it may not satisfy (12b). Thus, we search along the line
to find a new iterative point
, which satisfies (12).
Next, we solve a one-dimensional subproblem to obtain the stepsize. Denote
t as the stepsize. We calculate the stepsize
t, so that the new iterative point
satisfies (12) and improves the objective function value of (9). The corresponding subproblem to obtain the stepsize is as follows:
For simplicity, we let
and
represent
and
, respectively. Denote
, for
. Then, the parameters are defined as:
Theorem 1. For any t satisfying Constraints (16b) and (16c), satisfies (12). Let be the optimal stepsize obtained from Subproblem (16), then the iterative point is updated as . By such an update strategy, is a feasible point of Problem (9), and the objective function of (9) decreases monotonically in each iteration.
The detailed proof is shown in
Appendix D. As a one-dimensional QCQP problem, Subproblem (16) is solved optimally by the analysis of line segment intersections, which is omitted due to the limited space. We might encounter the situation that
, where the iterative point gets stuck at some point. In this case, we increase the parameter
in Subproblem (16), hoping that the iterations continue, and the objective function is further improved.
3.2.3. Algorithm Framework and Optimality Analysis
The complete algorithm framework is described in Algorithm 1 on the next page.
Algorithm 1: Robust optimization algorithm |
|
In Algorithm 1, since the iterative points are all feasible for Problem (9) and the objective function decreases monotonically, the objective function value converges eventually. The obtained solution of Algorithm 1 is at least a feasible point of Problem (9) and, thus, is a feasible point of Problem (7). The following theorem shows the optimality property of Problem (9), whose proof is given in
Appendix E.
Theorem 2. If δ goes to infinity and , then is the optimal solution of Problem (9).
Further numerical analysis for the optimality property is shown in
Section 4.
4. Simulations
In this section, the performance of the proposed algorithm is evaluated. Each element of the channel coefficients between each user and relays
,
is randomly generated according to the complex Gaussian distribution
. The channel coefficients from users to Eve
,
, obey
. The channel coefficient from each relay to Eve is randomly generated according to
, where different values of
represent different distances between relays and Eve. The CSI estimated error bound from relays to Eve is
, and that from each user to Eve is
,
. Let all the local noise covariance be the same:
. Let the SNR thresholds for both legitimate users be the same:
,
. In the proposed algorithm, the stopping parameter
and the initial value of the parameter
are set as
and one, respectively; if there is no specific explanation, the stopping parameter
and the parameter
are set as 15 and
, respectively. In the proposed algorithm, parameters
and
are used to keep the iterative points as the interior points of Problem (9). For each plotted point, 1000 realizations are generated, and the average result is shown. Each QCQP subproblem with dimension higher than one is solved by the SDR method, which is implemented based on the software CVX (Version 2.0) [
36].
First we compare our proposed algorithm and the non-robust model with perfect CSI. The non-robust model is problem (7) with given
,
, for
, which is a QCQP problem and solved optimally by the SDR method. In
Figure 2, the relay transmit power obtained by both algorithms are depicted, with respect to different relay numbers and different SNR thresholds
. It indicates that the performance of the proposed algorithm is very close to the non-robust model, which verifies the efficiency of the proposed algorithm. Our proposed model works better to balance the performance and the feedback overhead, because the perfect CSI requires more feedback. It is observed that relays use less total power when more relays are involved in the transmission process. This illustrates the effectiveness of node cooperation. Also, more relay transmit power is used when
increases.
Second, we compare our proposed algorithm with the model in [
31] (Section V), where both algorithms are designed for the same communication model. In [
31], no CSI of Eve is assumed, and the artificial noise technique is applied. Assuming that the total relay power is fixed, the model in [
31] is to minimize the relay transmit power for signals and let relays use the rest of the power to send the artificial noise. The corresponding optimization problem is just Problem (7) without Constraint (7c):
Let
and
be the relay power for signals obtained by our proposed algorithm solving (7) and by the method in [
31] solving (17), respectively. Apparently,
. In the comparison, for fairness, we suppose that both algorithms use the same total relay transmit power
: the proposed algorithm uses all the power to transmit signals; Wang et al. uses power
to transmit signals and power
to transmit the artificial noise [
31]. This is illustrated in
Table 1.
In this case, the achievable rate of Eve by [
31] is calculated as:
where
and
is defined below (6). Based on the above assumptions, we plot the achieved secrecy rate
by the two algorithms with respect to different relay numbers and different
in
Figure 3. The parameter
is the upper bound of the achievable rate of Eve in Algorithm 1. It does not appear in the model of [
31], but affects its achieved secrecy rate through
. We observe that the achieved secrecy rate by the proposed algorithm is higher than that of [
31], and the difference becomes larger with the increment of relay numbers. This shows the beneficial effect of using CSI.
Third, we test the sensitivity of the proposed algorithm according to parameters
and
. The two parameters are used to keep the iterative points as the interior point of Problem (9) and control the accuracy of the achieved solution.
Figure 4 shows the results by the proposed algorithm with three groups of parameters:
= 0.1,
= 15;
= 0.1,
= 20;
= 0.01,
= 15. The three curves representing the three groups are close to each other, which implies that the algorithm is not sensitive to the parameters.
Fourth, the achieved relay transmit power with respect to the iterations is plotted in
Figure 5. From top to bottom are the curves representing the relay number
N = 4, 8 and 12. The three convergence curves show similar trends, regardless of
N.
Figure 5 shows that the objective function reduces rapidly in the first three iterations and converges in about five iterations. The observation coincides with the conclusion in Theorem 1 that the objective function value decreases monotonically. It also provides numerical evidence that our proposed algorithm converges very quickly.
Fifth, we analyze the optimality of the achieved solutions by our proposed algorithm. In the algorithm framework, there are two stopping criteria. The first criterion is that
, and
and
are sufficiently close to each other. According to Theorem 2, the iterative point satisfying this criterion is roughly the optimal solution of Problem (9). The second stopping criterion is simply that
. It only guarantees feasibility rather than optimality. In
Table 2, we list the number of realizations out of the 1000 that exit the algorithm by satisfying the first stopping criterion, with respect to different relay numbers. It indicates that more than 85% of the realizations obtain the optimal solution of Problem (9). This shows that our proposed algorithm is efficient to solve the problem.
From the above simulation results, we can see that our proposed algorithm is efficient and converges very quickly.