Research Article | Open Access

Weiheng Jiang, Wenjiang Feng, "Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network", *International Journal of Antennas and Propagation*, vol. 2015, Article ID 530632, 15 pages, 2015. https://doi.org/10.1155/2015/530632

# Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

**Academic Editor:**Francisco Falcone

#### Abstract

The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate. We first analyze the challenges in solving this problem. The result indicates that our nonconvex joint power allocation is equivalent to a joint MS access control and power allocation. Then, by problem relaxation and the alternating optimization approach, two suboptimal joint MS access control and power allocation algorithms are proposed. These algorithms alternatively solve the subproblem of joint BS and UR power allocation and the subproblem of MS selection until system sum secrecy rate is nonincreasing. In addition, the convergence and computational complexity of the proposed algorithms are analyzed. Finally, simulations results are presented to demonstrate the performance of our proposed algorithms.

#### 1. Introduction

Broadcast is a fundamental property of the wireless medium. This property makes wireless communication susceptible to eavesdropping. Traditionally, this problem is typically addressed via upper layer approaches, such as the cryptographic protocols in the application layer which relies on computational complexity. Nowadays, information-theoretic security which exploits the properties of wireless channel to secure communications has received considerable attention.

In fact, the secret communication in the presence of an eavesdropper was first introduced and studied by Wyner who considered a wiretap channel model [1]. Wyner showed that when eavesdropper’s channel is a degraded version of the main channel, the source and destination can achieve a positive perfect information rate (defined as secrecy rate). The maximal secrecy rate from the source to the destination is defined as the secrecy capacity and for the degraded wiretap channel is given as the difference between the rate at the legitimate receiver and the rate at the eavesdropper. Inspired by the pioneering work of Wyner, Csiszar and Korner then considered the general broadcast wiretap channel [2]. Their research showed that even when the eavesdropper is not degraded with respect to the legitimate user, secure communication between the legitimate users is possible by exploiting the inherent randomness of the communication channel. Recently, the secret communication in wireless networks has been intensively studied for various scenarios [3–5].

Although the property of broadcasting makes wireless communication susceptible to eavesdropping, it also provides us with the opportunity to improve the security of wireless transmission by cooperation and relay [6, 7]. In recent years, the relay channel without security constraints has been studied under various scenarios. In most of these works, cooperation strategies such as decode-and-forward (DF), compress-and-forward (CF), and amplify-and-forward (AF) have been constructed to increase the transmission rate or reliability function [7, 8]. By using cooperative relay to enhance communication security, the research can be grouped into two types. The first type corresponds to the classical sense of cooperation, where the cooperating nodes strengthen the main transmission (from legitimate transmitter to the legitimate receiver) by using common relaying techniques such as AF and DF [6, 9–12]. For the strategies of the second type, the cooperating parties improve the secrecy performance of the system by weakening the eavesdropping link (from legitimate transmitter to the eavesdropper), such as the noise-forwarding [13], cooperative jamming [10–12, 14], and artificial noise [15]. For these works of cooperation enhanced secure communication, an important assumption is that the cooperation node is trustworthy. In other words, the cooperation (or relay) node is not an eavesdropper and does not make malicious attack. As pointed out in [16–18], the assumption that the relay node is trustworthy is not always true in some sense, since the relay node may not belong to the same party as the source or the destination. Under this situation, we may wonder whether secure communication between the source and the destination is still possible with the cooperation of untrusted node, especially in the scenario that no direct link can be established between the source and the destination. In fact, this involves untrusted relay (UR) cooperation secure communication which has already been discussed in [16–28].

The untrusted relay model was first studied in [16] for the general relay channel. The secrecy capacity of this system will be zero if the relay channel is degraded and will equal the wiretap channel capacity if the channel is reversely degraded. Although it is a pessimistic result, one might wonder whether there exists any situation where the cooperation of UR can enable a higher secrecy rate than simply treating it as an eavesdropper. The positive response came from He and Yener [17]. Their research showed that using an CF-based UR to relay information can surely achieve a higher secrecy rate than just treating the relay as an eavesdropper. Later in [18], with the assumption that there is no direct link between the source and the destination, the destination-based jamming (DBJ) scheme was proposed to obtain positive secrecy rate even though the relay is untrusted. Following these information-theoretical developments, the joint source and relay beamforming design problem for an untrusted MIMO relay channel was studied in [19] and the secrecy outage probability for untrusted AF relay channels was investigated in [20]. The work in [21] considered secrecy rate maximization problem in untrusted two-way relaying channels with friendly jammers. Then game theory-based distributed joint jammer selection and power allocation algorithm was presented therein. In [22], the authors studied joint transmit design and relay node selection for a relay network with a group of untrusted relay nodes. Reference [23] presented a comprehensive analysis of the secrecy capacity for two-hop AF cooperative systems with untrustworthy relay nodes. The work in [24] considered the optimal source and relay transmission design for the hybrid network with both internal and external wiretappers. The optimal signal transmission power is calculated therein. The untrusted relay cooperation scenario also had been discussed in the cognitive radio networks [25]. The authors considered that the secondary users (SUs) helped the primary users (PUs) to relay their confidential messages in reward for being allowed to share their spectrum bands. However, the PUs might be reluctant to accept the SUs’ help, since the SUs are untrustworthy and may try unauthorized decoding of the PUs’ messages. Further research about this topic could be found in [26–28].

All the above-mentioned literatures [16–28] only considered the secure communication between one pair of nodes by the cooperation of untrusted relay. Our work in this paper extends these works to the multiuser case. In particular, multiple OFDMA-based cell-edge mobile stations (MS) transmit confidential messages to base station (BS) only through an untrusted intermediate relay (UR). To be specific, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate. Firstly, we discuss the challenges in solving this problem. The result indicates that our nonconvex joint power allocation is equivalent to a joint MS access control and power allocation. Secondly, by problem relaxation and the alternating optimization approach, two suboptimal joint MS access control and power allocation algorithms are proposed. These algorithms alternatively solve the subproblem of joint BS and UR power allocation and the subproblem of MS selection until system sum secrecy rate is nonincreasing. Also, the convergence and computational complexity of the proposed algorithms are analyzed. Finally, simulations are conducted to evaluate the performance of our proposed algorithms. The following of the paper is organized as follows: system model and cooperation protocol are introduced in Section 2; the joint power allocation problem is discussed in Section 3 and suboptimal algorithms are also present therein; selected numerical results are shown in Section 4; and finally the conclusion is given.

#### 2. System Model and Cooperation Protocol

##### 2.1. System Model

As depicted in Figure 1, the system investigated herein is about a single cell network with one BS and multiple cell-edge MS which have secure communication requirements with BS in the uplink. Define the MS set by and , and MS are indexed by . Each of the MS in has already been allocated one orthogonal channel (in frequency-domain with unit bandwidth, such as OFDMA-based broadband wireless network). Since these MS are all far away from BS, no direct link between MS and BS can be established. Suppose that another MS (not in ) or heterogeneous network node is happening to be in the right place and has the will of cooperating with these MS as a volunteer of relay. (We do not discuss the motivations of UR cooperation and only focus on the joint power optimization. As in [21], the incentives of UR cooperation can be analyzed by game theory.) Unfortunately, this (relay) node (denoted by UR) may not belong to the same operator as BS and MS and thus has lower security clearance. Therefore, the UR has a dual role and acts as both an essential helper and a potential eavesdropper but not making any malicious attack. Under this setup, effective scheme should be introduced to complete the confidential message transmission and also to protect them not to be wiretapped by the UR. In this paper, there are no extra jammers existing and the DBJ scheme [18] is adopted to achieve the goal; that is, the BS plays the role of jammer. In addition, the following assumptions are used in our paper: (i) the cooperation strategy of UR is AF-based and full channel state information (CSI) is available at all nodes; (ii) BS, MS, and UR are all equipped with single antenna and operated in half-duplex mode; (iii) all MS transmit with fixed power; that is, , . The system aims at maximizing system sum secrecy rate by joint UR and BS power allocation. (Although the joint optimization of BS, UR, and MS power allocation can further improve the system sum secrecy rate, for simplicity, we only consider the problem of joint BS and UR power allocation herein.)

##### 2.2. Cooperation Protocol

In our considered scenario, the MS-BS secure communication process is performed by two phases. During the first phase (Phase I, shown with solid lines in Figure 1), MS send their confidential messages to UR over their allocated channels. Simultaneously, the BS injects interference signals in the form of Gaussian noise over multiple MS working channels. Thus, the received signal at UR over channel (for MS-) iswhere is the BS jamming signal power over channel-. and (both with unit energy) denote the transmit modulated symbol by MS- and the jamming signal by BS over channel , respectively. Suppose that all channels are reciprocal; we use and (or ) to denote the channel coefficients from MS- to UR and from UR to BS over channel , respectively. stands for a complex valued additive white Gaussian noise (AWGN) at UR in channel such that .

During the secondary phase (Phase II, shown with dashed line in Figure 1), UR normalizes its received signals over different channels and forwards the scaled versions to BS. In channel , the signal regenerated by UR is , where is the normalized factor at UR for MS- and is the power allocated by UR for MS-. Thus, the signal received at BS for MS- is , , where is the AWGN at BS over the channel for MS- and . Then, after canceling the self-interference, that is, , the instantaneous received signal at the BS over channel can be written asLet , , and (since , we have ). Then, the instantaneous received signal SNR (signal to noise ratio) at the UR (which is denoted by ) and at the BS (which is denoted by ) for MS- can be expressed as, respectively,

#### 3. Jammer and Relay Power Allocation under Individual Power Constraint

In this section, the problem of system sum secrecy rate maximization is first introduced and we analyze the challenges in solving this problem. Second, the alternating optimization (AO) approach is provided to handle our problem and then an AO algorithm is given. The convergence and computational complexity of the AO algorithm are also analyzed. Finally, another suboptimal algorithm with lower complexity is presented.

##### 3.1. Secrecy Rate Maximization Problem

As mentioned earlier, in our considered system, BS plays the role of jammer and relay is untrusted. The system aims to maximize sum secrecy rate by joint BS and UR power allocation. From [18, 21], we know that the achievable secrecy rate for MS- at the BS iswhere the factor is due to the fact that the communication is divided into two phases and we will omit it below. , , and represent the capacity between MS- and BS and between MS- and UR, without the secrecy constraint, respectively. Based on the formulation of and in (3), it is obvious that the obtained secrecy rate for MS- depends on both relay power and jammer power . Therefore, the joint optimization of BS and UR power allocation to maximize sum secrecy rate is required. Since the UR and BS have independently power constraint, consequently, the optimization problem (OP1) that we seek to solve iswhere and denote the power allocation vectors at UR and BS for the MS in , respectively. and are the corresponding power constraints at UR and BS, respectively. is an indicator function such that if the event is true and otherwise. Constraint (5c) comes from the fact that the direct link between BS and MS does not exist. Therefore, zero jamming or relay power always leads to zero secrecy rate.

With the problem definition in (5a), (5b), and (5c), it is noted that three factors make OP1 hard to deal with: (i) the nonsmooth property of which is caused by the nonnegative constraint of the secrecy rate definition; (ii) the nonconvex property of (with respect to and ), even without considering the nonnegative constraint of the secrecy rate definition; (iii) the potential combinatorial property of OP1 which is caused by the coupled relationship between and defined in (5c). In order to handle OP1, an important lemma is introduced first as below.

Lemma 1. *For MS-, , with transmit power and secrecy rate definition (4), the sufficient and necessary condition for MS- to obtain positive secrecy rate is that the allocated jamming power and relay power satisfy**Also, the necessary condition for all MS in to obtain positive secrecy rate is that the UR power should satisfy (7). (One can note that the lower bound of condition (7) is loose, because we have assumed that the allocated jamming power is for . In fact, we can attain more tightly conditions by assuming that, for , . Actually, this is unnecessary. Our purpose is to declare that OP1 is equivalent to a problem of joint MS access control and power allocation.) Consider*

*Proof. *Please see Appendix A.

By Lemma 1, the exact nonlinear coupled relationship between and which is caused by nonnegative secrecy rate definition is characterized by (6). For (7), it is worth strengthening that it is just the necessary condition for the system to promise all MS in to achieve positive secrecy rate but not sufficient condition. Thus, if (7) is false, then surely some MS in will be rejected by the system due to overload; while if it is true, then it is still possible for some MS in being rejected. Therefore, in essence, OP1 is equivalent to the following joint MS access control and power allocation problem (which is denoted by OP2): where is a MS subset. This subset is determined by the MS access control so that all MS in this subset can achieve positive secrecy rate. Define , and let and denote the power allocation vectors by UR and BS for MS in , respectively. (Although in OP1 we have used and to denote the power allocation vectors at UR and BS for the MS in , resp., for notational convenience, we use and below to denote the power allocation vectors at UR and BS for the MS in , resp.) In (8a), we define . Thus, is equivalent to under the condition that (6) (or (8c)) is satisfied. Constraint (8c) comes from (6) and (5c), in which is a function of .

For OP2, constraint (8c) and MS access control requirements make OP2 still a mixed integer nonlinear programming (MINLP) and thus intractable. However, from OP2, a relaxed joint MS access control and power allocation problem can be attained as below (which is denoted by OP3): where the constraint (8c) is removed from OP2.

By observing OP3, one can find that it has three important properties: (i) OP3 can be decomposed into two subproblems: the inner joint power allocation and the outer MS access selection; (ii) the inner subproblem has convex constraint set; (iii) the optimal solution of OP3 and OP2 has the following relationship.

Proposition 2. *Let be the optimal solution for OP3; then it is also the optimal solution for OP2. (Since both OP3 and OP2 are combinatorial-based problems, their optimal solution may be not unique. However, Proposition 2 is still valid for the case of more than one optimal solution.)*

*Proof. *Please see Appendix B.

Due to the properties of OP3, solving OP3 instead of OP2 would be more sensible. However, there are four challenges should be overcome: (i) OP3 is still a MINLP which is known to be nondeterministic polynomial-time hard (NP-hard); (ii) although OP3 could be handled by alternatively solving the outer and inner subproblem, the attained solution may be outside the feasible region of OP2 (because we have removed constraint (8c) to get OP3); (iii) the objective function of the inner subproblem is not jointly concave with decision variables; (iv) the outer subproblem of OP3 is combinatorial-based and we cannot construct rules about the optimal . In this paper, we provide a suboptimal scheme to explore the solution for OP3. In addition, it is proved that the obtained solution is at least suboptimality for OP2. To be specific, our suboptimal scheme is as follows: (i) we alternatively solve the inner and outer subproblem of OP3; (ii) in handling the inner subproblem, alternative optimization could be used as well. Although the objective function of OP3 is nonconcave, BS power optimization problem has unique solution with previously given UR power allocation; also, the optimal UR power allocation problem is convex for fixed BS power allocation; (iii) the outer subproblem of OP3 can be handled by a heuristic scheme. Based on the above analysis, in the following, our focus is on handling OP3 by AO approach.

##### 3.2. AO Approach and the Algorithm

In this subsection, we first assume that the MS access set has been predetermined and alternatively discuss the relay and jammer power allocation. Then, a suboptimal MS access control scheme is proposed.

###### 3.2.1. Optimal Relay Power Allocation under Fixed Jamming

We first discuss relay power allocation under fixed jamming power and predetermined MS set . Then, we have the following optimization problem OP4:Since both and are fixed and also constraint (10b) is convex, it follows from [29] that OP4 is a degraded AF-based relay network power allocation problem with parallel orthogonal Gaussian relay channels. Therefore, the optimal solution of OP4 can be characterized by the following theorem.

Theorem 3. *For OP4, its optimal solution is as follows:**where , , , and takes the value such that .*

*Proof. *Please see Appendix C.

At the moment, one may note that, in the above relay power allocation, we have not used the conditions presented in Lemma 1 to restrict the relay power allocation or to exclude MS which cannot promise positive secrecy rate. The explanation is as follows: the purpose of introducing Lemma 1 is to uncover the fact that the joint relay and jammer power allocation is essentially equivalent to the joint MS access control and power allocation. In that case, the access control rather than power allocation is used to exclude MS which obtains negative secrecy rate.

###### 3.2.2. Optimal Jamming under Fixed Relay Power Allocation

Now, our attention turns to the jamming power allocation at BS for given and . Thus, we have the following optimization problem OP5:It is obvious that the jamming power constraint (12b) is convex. Therefore, the focus is on the objective function (12a). In order to verify the convexity of the objective function, we take the derivative of with respect to , , and then havewhere , , , and . It can be noted that if (from Lemma 1, one may notice that it is the necessary condition for MS- to obtain positive secrecy rate), then is a quasi-concave function of and takes the maximum atNamely, is an increasing function of for and a decreasing function of for , while if (from Theorem 3, one can find that this is possible after the relay power allocation), then we have , , and , . Therefore, the objective function is a monotonically increasing and concave function with respect to . With the BS power constraint , it is known that will be maximized at . Following these analyses, three cases may appear for OP5: (i) for we have and then the objective function is quasi-concave and OP5 becomes nonconvex (but quasi-concave); (ii) for we have and then the objective function is concave and OP5 is a convex programming; (iii) let , and also but let ; then OP5 is a hybrid quasi-concave and concave problem. Nevertheless, it is still possible to analyze and derive the optimal solution of OP5 by the KKT conditions [30]. In other words, the KKT conditions are the necessary conditions (not sufficient conditions due to may be nonconcavity of with respect to , ). Among the KKT conditions, we havewhere is the Lagrange multiplier associated with the power constraint (12b) and . Based on (15), we use the following theorem to characterize the properties of the solution for OP5.

Theorem 4. *For OP5 with given and and , if , let be defined as (14); if , let . Also let be the real positive root of (15) for given and define . The unique solution of OP5 is denoted by , then we have the following: *(1)*If , then and ; otherwise, , where and is null set; takes the value such that .*(2)*If , then the term is a decreasing function of .*

*Proof. *Please see Appendix D.

By the results in Theorem 4, for jamming power allocation, we first calculate the jamming power , , for each accessed MS. If , that is, the sum of jamming power demand is less than or equal to the available power at BS, then all MS in will be allocated the jamming power , , while if , we should perform a bisection search to obtain the optimal Lagrange multiplier and calculate the corresponding jamming power , , by (15).

###### 3.2.3. Access Control Scheme and Alternating Optimization Algorithm

Based on the alternative optimization result, a suboptimal access control scheme which can find a feasible suboptimal solution for OP3 (or OP2) is provided herein. The main idea of this scheme is as follows: when the alternative relay and jamming power optimization is convergent, we remove the MS in which has obtained the minimal (general) secrecy rate and then repeat the procedure until the system sum (general) secrecy rate does not increase. Therefore, the proposed suboptimal MS access control scheme and the AO-based power allocation together solve OP3. Hence, we have the following Algorithm 5.

*Algorithm 5 (alternative relay power optimization and jamming power optimization (OptROptJam)). *

*Step 1*. Initialize and let , .

*Step 2*. Based on Theorems 3 and 4, alternatively optimize the relay and jamming power until convergence and obtain and , respectively; then go to Step 3.

*Step 3*. Calculate the system sum (general) secrecy rate ; if , then let and ; go to Step 2, where ; otherwise, the algorithm is finished.

In Algorithm 5, represents the iteration time of the algorithm, and denotes the accessed MS subset at . In this paper, we set ; that is, all MS are accessed by the system at the beginning. is the start point of the algorithm; that is, we set a jamming power vector and then perform relay power iteration. The rule of start point setting is that it should satisfy the corresponding power constraint. The convergence condition in Step 2 is that the difference of two rounds of alternative relay and jamming power optimization is less than a threshold . In Step 3, if there are more than one MS feedback from , then one of them is randomly removed.

*Suboptimality and Convergence*. For Algorithm 5, its optimality is affected by two factors: (i) the optimality of the access control scheme and (ii) the performance of alternative power optimization. For the former, the rules of constructing the optimal MS access set are unclear. Thus, it is difficult to judge the optimality of the proposed suboptimal access control scheme. In this paper, we use simulation result to demonstrate its performance. For the alternating-based power optimization approach, in general, it may fail to locate the stationary points, not to mention the global convergence to the optimal solution. However, we have the following conclusion for Algorithm 5.

Proposition 6. *Algorithm 5 always has the limit point and any limit point generated by Algorithm 5 is at least a suboptimal solution for OP2.*

*Proof. *Please see Appendix E.

*Complexity*. The complexity of Algorithm 5 is mainly affected by the alternative optimization and the access control. The former involves searching two optimal Lagrange multipliers which have the approximate complexity of and , respectively, where and are provided in Theorems 3 and 4, respectively, and is the tolerable error presented in Algorithm 5. The approximate complexity of the proposed access control scheme is , where is the number of MS in the system.

##### 3.3. Another Suboptimal Algorithm

For two reasons, we propose another suboptimal algorithm for our problem: (i) pursuing lower complexity algorithm and (ii) as the benchmark scheme of Algorithm 5. This suboptimal algorithm is based on two suboptimal power allocation strategies at UR and BS, respectively, that is, equal relay power allocation and optimal proportional jamming power allocation. More precisely, at iteration , the relay and jamming power allocation rules are as follows, respectively:where is defined in Theorem 4. From (16) and (17), one can find that UR equally allocates its power to the accessed MS at and the BS power allocation is based on proportional rule. In particular, if , then the obtained jamming power for MS- () is ; otherwise, its jamming power is in proportion to . The access control scheme for this new suboptimal algorithm is the same as Algorithm 5. To sum up, we have another suboptimal algorithm (Algorithm 7) which is summarized as below.

*Algorithm 7 (equal relay power allocation and optimal proportional jamming power allocation (EROptPJam)). *

*Step 1*. Initialize and .

*Step 2*. Perform relay and jamming power allocation based on (16) and (17), respectively; then we have and and go to Step 3.

*Step 3*. Calculate the system sum (general) secrecy rate and if , then let and ; go to Step 2, where ; otherwise, the algorithm is finished.

One can note that the complexity of Algorithm 7 is significantly lower. This is because we do not need to perform any power iteration but just calculate the jamming power by (14) for given relay power allocation. Therefore, it is of no doubt that Algorithm 7 has lower complexity but experiences worse performance than Algorithm 5.

#### 4. Simulations Results

In this section, we present simulation results to demonstrate the performance of all proposed algorithms. Our simulation scenario is shown in Figure 2, where the BS is located at (100 m, 0 m), and multiple MS are randomly distributed over the dashed rectangle region where the coordinate is limited from −100 m to 0 m, and the coordinate ranges from 50 m to −50 m. The coordinate of the UR is fixed at 0 m, while its coordinate varies from 0 m to 100 m. The simulation scenario and parameters’ setting are similar to those in [31, 32]. The channel gains are , where is the distance between any two nodes, for example, BS and UR, or MS and UR, and the path-loss exponent is ; represents fading and is taken here as . In the simulation, the noise variance is W and is the convergence threshold of the proposed alternatively optimization algorithms. In order to better understand the performance of our proposed algorithms, two other benchmark schemes are introduced as follows.

*JoPowerOpt (Joint Power Constraint-Based Alternating Optimization) [33]*. This algorithm is based on joint BS and UR power constraint. In other words, the system has power constraint . The procedure of this algorithm is similar to OptROptJam. It is obvious that, with joint power constraint, system can obtain better performance for its ability to balance power usage between jamming and relay [34].

*ExJoPowerOpt (Extension of Joint Power Constraint-Based Alternating Optimization) [33]*. This algorithm extends JoPowerOpt to the scenario with individual power constraint. The main idea is that when JoPowerOpt is convergent, we separately check the conditions of BS power constraint and UR power constraint ; if both of them are satisfied, then ExJoPowerOpt is over; otherwise, let and repeat JoPowerOpt, where is a small positive constant.

##### 4.1. General Secrecy Rate

In this section, we plot the MS (e.g., MS-) general secrecy rate as a function of relay power and jamming power , and the result is shown in Figure 3. BS is located at (100 m, 0 m), and UR is located at (10 m, 0 m), and MS- is located at (−90 m, 5 m). The transmission power of MS- is . From Figure 3, we can observe that, for given jamming power , is an increasing and concave function of , while, for given , the convexity of with respect to depends on the value of . If is too small, then is a concave function of . When becomes larger, then is quasi-concave of . This is consistent with our theoretic analysis. In addition, from Figure 3, we can find that if the relay power is too small, that is, the necessary condition (6) in Lemma 1 is not satisfied, then MS- obtains negative general secrecy rate. (In fact, the negative general secrecy rate has no physical meaning and it is introduced for convenient illustration. Herein, the negative general secrecy rate denotes the zero value of secrecy rate.)

##### 4.2. Performance under Different System Parameters

In this section, we evaluate the performance of the proposed algorithms under different UR positions, number of MS, and the available BS and UR power.

We first evaluate the system performance under different UR positions and the results are presented in Figures 4–6. In the simulation, the UR is initially placed at (80 m, 0 m) and moves to (5 m, 0 m) along a line. Therefore, UR moves away from nearby the BS to far from the BS. The power constraints are W at BS and W at UR. The number of MS in the system is , and the transmit power of each MS is W, . Figure 4 illustrates the achievable system sum secrecy rate versus the UR-BS distance. It is clear that the attained secrecy rates are decreasing functions of UR-BS distance. This result can be attributed to three factors: (i) the decrease of multiple MS access gain (this can be explained by Lemma 1 and verified in Figure 5; we know that when UR moves away from BS, the number of successively accessed MS decrease); (ii) the decrease of BS jamming efficiency (if UR-BS distance increases, then the channel conditions between UR and BS become worse); (iii) the increase eavesdropping ability of UR (if UR moves away from BS, then the channel conditions between UR and MS become better).

From Figure 4, one can note that the algorithm JoPowerOpt outperforms other three algorithms in the performance of system sum secrecy rate. However, we must highlight that JoPowerOpt is based on the scenario with joint power constraint. Thus, it is impractical for realistic system, and it is introduced just for performance comparison. The algorithm OptROptJam takes the second place, while the performance gap between JoPowerOpt and OptROptJam is small when UR is far away from the BS and it becomes larger if UR is closer to BS. Finally, this performance gap decreases if UR is nearby the BS. The increase of this performance gap is due to the fact that joint power constraint-based algorithm has the ability to balance power usage between relay and jamming. Thus, it can result in higher efficiency in resource usage, while the decrease of performance gap owes to the channel degradation between MS and UR, especially if UR is very close to BS. Moreover, in Figure 4, one can observe that the performance gap between OptROptJam and EROptPJam/ExJoPowerOpt is large when UR is far away from BS and then is reduced when UR moves to BS. In fact, the reasons for performance gap reduction for EROptPJam and ExJoPowerOpt are similar: when UR moves towards BS, all channels between MS and UR are going to be bad and the channel gains between UR and BS are going to be the same. Therefore, with the movement of UR, the optimal proportional jamming is then equal to the optimal jamming, and the performance of optimal relay power allocation is approximated by equal relay power allocation. From this figure, one can note that the performance gain by optimal relay power allocation (or optimal jamming power allocation) is only little when UR is close to BS.

Figure 6 shows how BS power consumption is varying with UR-BS distance. One can observe that, for all proposed algorithms, the total jamming power consumption at BS increases if UR moves away from BS. This increase is consistent with intuitive and theoretic analysis; that is, the BS jamming efficiency is high when UR is close to BS (better channel conditions between UR and BS) and it is low if UR is far away from the BS (worse channel conditions between UR and BS). In Figure 6, we see that if UR-BS distance is larger than 50 m, the algorithms OptROptJam and EROptPJam render the BS to use its whole available power to jam, while if UR-BS distance keeps decreasing, then the total jamming power consumption at BS is sharply reduced. By Figure 6, it is not difficult to uncover the reasons why algorithm ExJoPowerOpt attains worse system sum secrecy rate performance. If the UR is far away from the BS, the jamming power consumption of ExJoPowerOpt is about 1.5 W (right now, the jamming power consumption of ExJoPowerOpt is the same as JoPowerOpt). Because we have W, about 2 W ( W) power is allocated to UR to perform relay. We know that, except the joint power constraint, algorithm ExJoPowerOp should also satisfy the individual power constraint at BS and UR as well. This indicates that we need to perform until the power allocated to UR is not larger than 1.5 W. This procedure finally renders the total used jamming power at BS less than 1.2 W. This power is smaller than that used by JoPowerOpt. Hence, it experiences some performance loss.

We then analyze the system performance under different MS numbers, and the results are depicted in Figures 7 and 8. The simulation is done with the parameters , W, and UR is located at (10 m, 0 m). From Figure 7, we see that the system sum secrecy rates are increasing if the number of MS becomes larger. The improvement of secrecy rate can be attributed to the multiple MS access gain (i.e., see Figure 8). In other words, the more MS in the system leads to the higher efficiency. If the number of MS is few, we note that the performance gaps among these four algorithms are small. If the number of MS increases, the performance gap between JoPowerOpt and OptROptJam is still not too much but JoPowerOpt always outperforms OptROptJam, while the performance gap between OptROptJam/JoPowerOpt and EROptPJam/ExJoPowerOpt becomes larger as the number of MS increases. For EROptPJam, the increase of performance gap is due to its equal relay power allocation rule. For ExJoPowerOpt, individual power constraints limit its performance. In addition, depending on the number of MS, EROptPJam obtains better secrecy rate performance when the MS number is small, and ExJoPowerOpt dominates EROptPJam if the number of MS becomes larger. From this simulation result, one can note that if the MS number is large, we should optimize both relay and jammer power to obtain better system performance; if the MS number is only a few, the suboptimal algorithm EROptPJam is enough. From Figure 8, although the number of successively accessed MS increases when the number of MS becomes larger, one can find that the number of MS be rejected by the system increases as well, while ExJoPowerOpt always accesses the least MS among these algorithms.

At last, how system sum secrecy rate is affected by available UR and BS power is analyzed, and the result is shown in Figure 9. The number of MS in the system is , and UR is located at (10 m, 0 m). Available power at BS is varying from W to W and total power at UR is varying in . From Figure 9, we can find that the secrecy rates of OptROptJam, EROptPJam, and JoPowerOpt are all increasing functions of available UR and BS power. In fact, the conclusion that the system sum secrecy rate is an increasing function of relay power is consistent with theoretic analysis (in the proof of Theorem 3). Also, since the UR is located at 90 m far away from the BS, from Figure 6, we know that the increase of jamming power still can improve the system secrecy rate performance. Although the increasing of UR power will significantly improve the obtained secrecy rate for ExJoPowerOpt, if the UR power is small, the secrecy rate for ExJoPowerOpt seems to remain unchanged with the increase of BS power. In other words, right now the system secrecy rate is restricted by the UR power (for its individual power constraint requirements). Additionally, in Figure 9, one can see that JoPowerOpt always attained the highest secrecy rate, and OptROptJam takes the second place. This performance difference has been explained in Figure 4. For EROptPJam and ExJoPowerOpt and the given power matrix plane (formulated by the UR and BS power), if we define a diagonal line (the blue dashed line in Figure 9) from point to point , then ExJoPowerOpt obtained better performance on the right side and EROptPJam achieves higher secrecy rate on the other side. This result can be explained as that, due to the additional individual power constraint, the secrecy rate performance of ExJoPowerOpt is more sensitive to the unbalance of available UR and BS power.

#### 5. Conclusion

In this work, based on the DBJ secure communication protocol [18], joint BS and UR power allocation to maximize system sum secrecy rate is discussed for the untrusted relay cooperation OFDMA network. We develop the joint power optimization problem and our analysis indicates that the joint power allocation is equivalent to joint MS access control and power allocation. By problem relaxation and using the dual alternating optimization approach, two suboptimal MS access control and power allocation algorithms are proposed, that is, the algorithms OptROptJam and EROptPJam. The former is iteration-based algorithm and we have proved its convergence, while the complexity of this algorithm is . The later can be implemented without any iteration and it has the complexity of . Two other benchmark schemes are introduced for performance comparison. These two benchmark algorithms both have the approximate complexity of . Our simulation results indicate that (i) the benchmark scheme JoPowerOpt always has the best secrecy rate performance. However, it is based on joint BS and UR power constraint. Thus, it is useless for realistic system; (ii) our proposed algorithm OptROptJam takes the second place in secrecy rate performance. At some UR and BS power region, if the UR is far away from BS, the performance gap between JoPowerOpt and OptROptJam is only little; (iii) the secrecy rate performance of both ExJoPowerOpt and EROptPJam depends on particular system parameters. Additionally, if UR is close to BS or the number of MS is small, the performance gap between JoPowerOpt/OptROptJam and ExJoPowerOpt/EROptPJam is negligible.

#### Appendices

#### A. Proof of Lemma 1

First, condition (6) can be directly derived from the positive secrecy rate condition . Based on (6), it is easy to obtain the following relationship: The last strict inequality comes from the fact that no direct link exists between BS and MS and then zero jamming power always leads to zero secrecy rate. In order to obtain positive secrecy rate we must have , .

#### B. Proof of Proposition 2

Let and denote the feasible region of OP2 and OP3, respectively. Then we have (8b) and (8c)} and (8b)}. It is obvious that and .

In order to prove this proposition, we should first prove . In other words, the optimal solution of OP3 is in the feasible region of OP2. Because both the feasible access subsets of OP2 and OP3 are the subset of , then must be in the feasible access subset of OP2. Moreover, we have . Hence, in order to have , it is equivalent to proving that, for , we have and . In the following, we use contradiction approach to finish this proof. At first, we assume that lets one of the following four cases be true.

*Case 1. *
If and , then we have .

*Case 2. *If and , then we have − .

*Case 3. *If and , then we have .

*Case 4. *If and , then based on Lemma 1 we have .

Therefore, for , if does not satisfy the condition that and , then MS- obtains negative secrecy rate (without considering the triviality case). By solving the outer subproblem of OP3, we can remove this MS (i.e., MS-) from the system and render an increase of the system sum secrecy rate even without power reallocation. This violates the assumption that is the optimal solution for OP3. Thus, we must have .

In fact, under the conclusion that , OP3 is equivalent to OP2. Then, is the optimal solution for OP3 indicating that it is also the optimal solution for OP2.

#### C. Proof of Theorem 3

For given and , it is obvious that constraint (10b) is convex. Thus, our focus is on the objective function. For or , we have the following: (i) and (ii) and , . Hence, the objective function is an increasing function of , , and it is also concave with respect to . Therefore, OP4 is a convex programming. Introducing Lagrangian coefficient , corresponding to the constraint in (10b), the Lagrangian associated with OP4 is as follows:The KKT conditions [30] can be written asSubstituting the expansion of into (C.2) and after some transformations, then the optimal relay power for MS satisfies the following quadratic equation:Since and , , then it is not difficult to prove that the nonnegative solution of the above quadratic equation is (11). As mentioned earlier, the objective function is an increasing function of , . Thus, the optimal Lagrangian coefficient satisfies and (C.3); that is, ; otherwise, that is, and it is possible to increase the objective function value by allocating the remainder relay power to any MS in without violating the power constraint. As the optimization problem in hand is convex, the Lagrangian coefficient can be calculated using Newton method or the interior point method such that the KKT condition in (C.3) is satisfied.

#### D. Proof of Theorem 4

For the first part of , we know that the condition could be true under two cases: (i) for we have and . In other words, for MS-, , the optimal jamming power that can maximize its (general) secrecy rate is ; also the sum of MS (in ) jamming power requirement is less than or equal to the available power at BS. Under this situation, BS has no reasons not to allocate the optimal jamming power to these MS; otherwise, the system (general) secrecy rate will not be maximized; (ii) and ; that is to say, we have only one MS in the system and the allocated relay power for this MS is too small. Then, our previous analysis indicated that the (general) secrecy rate of this MS is an increasing function of and the optimal jamming strategy is . In addition, we can note that, no matter which case the system belongs to, we always have . Thus, we have the first part of .

Now we prove the second part of , in which the condition is true. One can note that this condition could be true under three cases: (i) for , we have and ; (ii) let and let , ; (iii) for , we have and . As mentioned earlier, no matter which case is true for the system, the optimal solution of OP5 must satisfy (15). According to the value of , the solution of (15) can be separately discussed as follows: (S1) If (), then from (13) we know that and , where , . Moreover, it is easy to verify that , which indicates that is a monotonic decreasing function of and takes the maximum at . Following these properties of , we know that the solution of (15) under may have two subcases: (S1-1) if , then (15) has unique real positive root and if we let it be , then and ; (S1-2) if , then (15) has no real positive root and ; then . (S2) If (), then from (13) we know that in and in . Therefore, if is the real positive root of (15) for , then we have . In order to check the number of real positive root of (15), substituting (13) into (15) and after some simplifications, then we have the following quartic equation:Let ; then , , , , . Since we have , , and . Furthermore, the condition indicates that and (we have used the condition ); then using the* Descartes rule of sign*, the number of positive root of (D.1) at most is two. More precisely, if and , then the number of positive roots of (D.1) at most is two; if and , or and , then the number of positive roots of (D.1) at most is one; if and , then the number of positive roots of (D.1) is zero. If we define the set of real positive root of (D.1) be for given (for ) and thus . Then, we may have , or , or . (S2-1) For the case , let . Without loss of generality, we further assume that . Since for , is an increasing function for . Then, we have and then . Therefore, is the optimal solution. (S2-2) For the case , we have and then is the optimal solution. (S2-3) For the case , we have . Therefore, the real positive root set of (D.1) is null and .

From the KKT conditions, we know that, at the optimal solution , the BS power constraint must be satisfied. Thus, takes the value to have . To sum up, we have conclusion .

For conclusion , we only need to prove that is a decreasing function of . Similarly, according to the value of , it can be separately discussed as follows: (S1) If (), then our previous analysis indicated that is a decreasing function in . Thus, with the increase of , the solution of will decrease. Therefore, or is a decreasing function of . (S2) If (), rigorously proving that is a decreasing function of is difficult and we leverage a legend to finish this proof. First, we define following two functions:

Then, we know that the solution of (D.1) is the -coordinate of the cross-point of and . The real positive solution of (D.1) is the -coordinate of the cross-point in the interval . For , we have , , and . For , we have , , and (the condition is omitted for no sense). Then, we plot the instances of these two functions in Figure 10 (where we use to denote the variable ), in which we have taken four different values of ; that is, , , , and . From these two functions, we know that, with the increase of , for example, , both and its first derivative will increase in , while the tendency of will remain unchanged. Then, from Figure 10, we can note that the -coordinates of the cross-points of these two functions in interval under different values of are . This is consistent with our previous analysis. That is to say, under the condition , the number of real positive roots of (D.1) would be two or one or zero. Moreover, from Figure 10, we can find that and . Therefore, with the increase of , defined by will decrease, and the term increases. It is clear that the decrease and increase of these two terms will be equal if reaches a certain value (let it be ). If keeps increasing (larger than ), the operator will give feedback as zero. Thus we have the conclusion for the case .

#### E. Proof of Proposition 6

For OP3 with given , we can observe that (i) the alternative relay and jamming power optimization belongs to the nonlinear Gauss-Seidel (GS) method where the optimization vector is only partitioned into two component vectors [29, 33–38]; (ii) both the relay and jamming power optimization has the unique solution for giving the other. Therefore, the alternating optimization can surely converge [37]. For the access control procedure, the termination condition is that the system sum (general) secrecy rate is not increasing. Thus, it is obvious that the access control is convergent for no more than times of MS remove. Also, the convergence of alternative power optimization and access control scheme are not affected by each other. Hence, Algorithm 5 always has a limit point. Moreover, both the alternative power optimization and access control result in nondecreasing objective values. The access control scheme promises that all accessed MS can achieve positive secrecy rate (i.e., the limit point generated by Algorithm 5 is in the feasible region of OP2). Then, the limit point generated by Algorithm 5 is at least a suboptimal solution for OP2.

#### Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgment

This work was supported by Fundamental Research Funds for the Central Universities (CDJXS11162236).

#### References

- A. D. Wyner, “The wire-tap channel,”
*The Bell System Technical Journal*, vol. 54, no. 8, pp. 1355–1387, 1975. View at: Publisher Site | Google Scholar | MathSciNet - I. Csiszar and J. Korner, “Broadcast channels with confidential messages,”
*IEEE Transactions on Information Theory*, vol. 24, no. 3, pp. 339–348, 1978. View at: Publisher Site | Google Scholar | MathSciNet - Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches,”
*IEEE Signal Processing Magazine*, vol. 30, no. 5, pp. 29–40, 2013. View at: Publisher Site | Google Scholar - J. Ni, Z. Fei, C. Xing, D. Zhao, N. Wang, and J. Kuang, “Secrecy balancing over two-user MISO interference channels with rician fading,”
*International Journal of Antennas and Propagation*, vol. 2013, Article ID 546260, 7 pages, 2013. View at: Publisher Site | Google Scholar - X. Zhou, L. Song, and Y. Zhang, Eds.,
*Physical Layer Security in Wireless Communications*, CRC Press, 2013. - L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Secure wireless communications via cooperation,” in
*Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing*, pp. 1132–1138, Urbana Champaign, Ill, USA, September 2008. View at: Publisher Site | Google Scholar - A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,”
*IEEE Communications Magazine*, vol. 42, no. 10, pp. 68–73, 2004. View at: Publisher Site | Google Scholar - H. Halabian, A. Zainaldin, and I. Lambadaris, “Optimal joint resource allocation and power control in bidirectional relaying networks,”
*IEEE Transactions on Vehicular Technology*, vol. 63, no. 9, pp. 4520–4535, 2014. View at: Publisher Site | Google Scholar - Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, “On the application of cooperative transmission to secrecy communications,”
*IEEE Journal on Selected Areas in Communications*, vol. 30, no. 2, pp. 359–368, 2012. View at: Publisher Site | Google Scholar - M. Lin, J. Ge, Y. Yang, and Y. Ji, “Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks,”
*IEEE Communications Letters*, vol. 18, no. 2, pp. 380–383, 2014. View at: Publisher Site | Google Scholar - W. Liu, D. Tan, and G. Xu, “Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks,” in
*Proceedings of the IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID '13)*, pp. 1–5, Shanghai, China, October 2013. View at: Publisher Site | Google Scholar - C. Wang and H.-M. Wang, “Joint relay selection and artificial jamming power allocation for secure DF relay networks,” in
*Proceedings of the IEEE International Conference on Communication Workshops (ICC '14)*, pp. 819–824, IEEE, Sydney, Australia, June 2014. View at: Publisher Site | Google Scholar - L. Lai and H. El Gamal, “The relay-eavesdropper channel: cooperation for secrecy,”
*IEEE Transactions on Information Theory*, vol. 54, no. 9, pp. 4005–4019, 2008. View at: Publisher Site | Google Scholar | MathSciNet - E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming,”
*IEEE Transactions on Information Theory*, vol. 54, no. 6, pp. 2735–2751, 2008. View at: Publisher Site | Google Scholar | MathSciNet - S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,”
*IEEE Transactions on Wireless Communications*, vol. 7, no. 6, pp. 2180–2189, 2008. View at: Publisher Site | Google Scholar - Y. Oohama, “Capacity theorems for relay channels with confidential messages,” in
*Proceedings of the IEEE International Symposium on Information Theory (ISIT '07)*, pp. 926–930, Nice, France, June 2007. View at: Publisher Site | Google Scholar - X. He and A. Yener, “Cooperation with an untrusted relay: a secrecy perspective,”
*IEEE Transactions on Information Theory*, vol. 56, no. 8, pp. 3807–3827, 2010. View at: Publisher Site | Google Scholar | MathSciNet - X. He and A. Yener, “Two-hop secure communication using an untrusted relay,”
*EURASIP Journal on Wireless Communications and Networking*, vol. 2009, Article ID 305146, 13 pages, 2009. View at: Publisher Site | Google Scholar - C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,”
*IEEE Transactions on Signal Processing*, vol. 60, no. 1, pp. 310–325, 2012. View at: Publisher Site | Google Scholar | MathSciNet - J. Huang, A. Mukherjee, and A. L. Swindlehurst, “Secure communication via an untrusted non-regenerative relay in fading channels,”
*IEEE Transactions on Signal Processing*, vol. 61, no. 10, pp. 2536–2550, 2013. View at: Publisher Site | Google Scholar | MathSciNet - R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,”
*IEEE Transactions on Vehicular Technology*, vol. 61, no. 8, pp. 3693–3704, 2012. View at: Publisher Site | Google Scholar - J. Huang and A. L. Swindlehurst, “Joint transmit design and node selection for one-way and two-way untrusted relay channels,” in
*Proceedings of the 47th Asilomar Conference on Signals, Systems, and Computers (ACSSC '13)*, pp. 1555–1559, Pacific Grove, Calif, USA, November 2013. View at: Google Scholar - L. Sun, T. Zhang, Y. Li, and H. Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,”
*IEEE Transactions on Vehicular Technology*, vol. 61, no. 8, pp. 3801–3807, 2012. View at: Publisher Site | Google Scholar - X.-Y. Li, L. Jin, and K.-Z. Huang, “A physical layer security transmission mechanism based on joint channel characteristics in relay system,” in
*Proceedings of the IEEE 14th International Conference on Communication Technology (ICCT '12)*, pp. 599–603, Chengdu, China, November 2012. View at: Publisher Site | Google Scholar - H. Jeon, S. W. McLaughlin, I.-M. Kim, and J. Ha, “Secure communications with untrusted secondary nodes in cognitive radio networks,”
*IEEE Transactions on Wireless Communications*, vol. 13, no. 4, pp. 1790–1805, 2014. View at: Publisher Site | Google Scholar - J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO two-way communications with an untrusted relay,”
*IEEE Transactions on Signal Processing*, vol. 62, no. 9, pp. 2185–2199, 2014. View at: Publisher Site | Google Scholar | MathSciNet - R. Bassily, E. Ekrem, X. He et al., “Cooperative security at the physical layer: a summary of recent advances,”
*IEEE Signal Processing Magazine*, vol. 30, no. 5, pp. 16–28, 2013. View at: Publisher Site | Google Scholar - L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,”
*IEEE Wireless Communications Letters*, vol. 3, no. 3, pp. 289–292, 2014. View at: Publisher Site | Google Scholar - W. Zhang, U. Mitra, and M. Chiang, “Optimization of amplify-and-forward multicarrier two-hop transmission,”
*IEEE Transactions on Communications*, vol. 59, no. 5, pp. 1434–1445, 2011. View at: Publisher Site | Google Scholar - S. Boyd and L. Vandenberghe,
*Convex Optimization*, Cambridge University Press, Cambridge, UK, 2004. View at: Publisher Site | MathSciNet - J. Zou and H. Xu, “Auction-based power allocation for multiuser two-way relaying networks,”
*IEEE Transactions on Wireless Communications*, vol. 12, no. 1, pp. 31–39, 2013. View at: Publisher Site | Google Scholar - B. Wang, Z. Han, and K. J. R. Liu, “Distributed relay selection and power control for multiuser cooperative communication networks using stackelberg game,”
*IEEE Transactions on Mobile Computing*, vol. 8, no. 7, pp. 975–990, 2009. View at: Publisher Site | Google Scholar - W.-H. Jiang and W.-J. Feng, “Joint relay and base station power control in the downlink for untrust-relay based cooperation cell network,”
*Reports*, 2014. View at: Google Scholar - I. Hammerstrom and A. Wittneben, “Power allocation schemes for amplify-and-forward MIMO-OFDM relay links,”
*IEEE Transactions on Wireless Communications*, vol. 6, no. 8, pp. 2798–2802, 2007. View at: Publisher Site | Google Scholar - Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, “Transmit solutions for MIMO wiretap channels using alternating optimization,”
*IEEE Journal on Selected Areas in Communications*, vol. 31, no. 9, pp. 1714–1727, 2013. View at: Publisher Site | Google Scholar - Y. Liu, J. Li, and A. P. Petropulu, “Destination assisted cooperative jamming for wireless physical-layer security,”
*IEEE Transactions on Information Forensics and Security*, vol. 8, no. 4, pp. 682–694, 2013. View at: Publisher Site | Google Scholar - L. Grippo and M. Sciandrone, “On the convergence of the block nonlinear Gauss-Seidel method under convex constraints,”
*Operations Research Letters*, vol. 26, no. 3, pp. 127–136, 2000. View at: Publisher Site | Google Scholar | MathSciNet - Y. Ma, A. Liu, and Y. Hua, “A dual-phase power allocation scheme for multicarrier relay system with direct link,”
*IEEE Transactions on Signal Processing*, vol. 62, no. 1, pp. 5–16, 2014. View at: Publisher Site | Google Scholar | MathSciNet

#### Copyright

Copyright © 2015 Weiheng Jiang and Wenjiang Feng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.