Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2015 (2015), Article ID 530632, 15 pages
http://dx.doi.org/10.1155/2015/530632
Research Article

Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

College of Communication Engineering, Chongqing University, Chongqing 400044, China

Received 13 October 2014; Revised 17 March 2015; Accepted 17 March 2015

Academic Editor: Francisco Falcone

Copyright © 2015 Weiheng Jiang and Wenjiang Feng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet
  2. I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  3. Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 29–40, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Ni, Z. Fei, C. Xing, D. Zhao, N. Wang, and J. Kuang, “Secrecy balancing over two-user MISO interference channels with rician fading,” International Journal of Antennas and Propagation, vol. 2013, Article ID 546260, 7 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. X. Zhou, L. Song, and Y. Zhang, Eds., Physical Layer Security in Wireless Communications, CRC Press, 2013.
  6. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Secure wireless communications via cooperation,” in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 1132–1138, Urbana Champaign, Ill, USA, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Communications Magazine, vol. 42, no. 10, pp. 68–73, 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. H. Halabian, A. Zainaldin, and I. Lambadaris, “Optimal joint resource allocation and power control in bidirectional relaying networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4520–4535, 2014. View at Publisher · View at Google Scholar
  9. Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, “On the application of cooperative transmission to secrecy communications,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 359–368, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Lin, J. Ge, Y. Yang, and Y. Ji, “Joint cooperative beamforming and artificial noise design for secrecy sum rate maximization in two-way AF relay networks,” IEEE Communications Letters, vol. 18, no. 2, pp. 380–383, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Liu, D. Tan, and G. Xu, “Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks,” in Proceedings of the IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID '13), pp. 1–5, Shanghai, China, October 2013. View at Publisher · View at Google Scholar
  12. C. Wang and H.-M. Wang, “Joint relay selection and artificial jamming power allocation for secure DF relay networks,” in Proceedings of the IEEE International Conference on Communication Workshops (ICC '14), pp. 819–824, IEEE, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar
  13. L. Lai and H. El Gamal, “The relay-eavesdropper channel: cooperation for secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005–4019, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735–2751, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Oohama, “Capacity theorems for relay channels with confidential messages,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 926–930, Nice, France, June 2007. View at Publisher · View at Google Scholar
  17. X. He and A. Yener, “Cooperation with an untrusted relay: a secrecy perspective,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3807–3827, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. X. He and A. Yener, “Two-hop secure communication using an untrusted relay,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, Article ID 305146, 13 pages, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Transactions on Signal Processing, vol. 60, no. 1, pp. 310–325, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. J. Huang, A. Mukherjee, and A. L. Swindlehurst, “Secure communication via an untrusted non-regenerative relay in fading channels,” IEEE Transactions on Signal Processing, vol. 61, no. 10, pp. 2536–2550, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Huang and A. L. Swindlehurst, “Joint transmit design and node selection for one-way and two-way untrusted relay channels,” in Proceedings of the 47th Asilomar Conference on Signals, Systems, and Computers (ACSSC '13), pp. 1555–1559, Pacific Grove, Calif, USA, November 2013.
  23. L. Sun, T. Zhang, Y. Li, and H. Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3801–3807, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. X.-Y. Li, L. Jin, and K.-Z. Huang, “A physical layer security transmission mechanism based on joint channel characteristics in relay system,” in Proceedings of the IEEE 14th International Conference on Communication Technology (ICCT '12), pp. 599–603, Chengdu, China, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Jeon, S. W. McLaughlin, I.-M. Kim, and J. Ha, “Secure communications with untrusted secondary nodes in cognitive radio networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 1790–1805, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO two-way communications with an untrusted relay,” IEEE Transactions on Signal Processing, vol. 62, no. 9, pp. 2185–2199, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. R. Bassily, E. Ekrem, X. He et al., “Cooperative security at the physical layer: a summary of recent advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,” IEEE Wireless Communications Letters, vol. 3, no. 3, pp. 289–292, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Zhang, U. Mitra, and M. Chiang, “Optimization of amplify-and-forward multicarrier two-hop transmission,” IEEE Transactions on Communications, vol. 59, no. 5, pp. 1434–1445, 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, Cambridge, UK, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  31. J. Zou and H. Xu, “Auction-based power allocation for multiuser two-way relaying networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 31–39, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. B. Wang, Z. Han, and K. J. R. Liu, “Distributed relay selection and power control for multiuser cooperative communication networks using stackelberg game,” IEEE Transactions on Mobile Computing, vol. 8, no. 7, pp. 975–990, 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. W.-H. Jiang and W.-J. Feng, “Joint relay and base station power control in the downlink for untrust-relay based cooperation cell network,” Reports, 2014. View at Google Scholar
  34. I. Hammerstrom and A. Wittneben, “Power allocation schemes for amplify-and-forward MIMO-OFDM relay links,” IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 2798–2802, 2007. View at Publisher · View at Google Scholar · View at Scopus
  35. Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, “Transmit solutions for MIMO wiretap channels using alternating optimization,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1714–1727, 2013. View at Publisher · View at Google Scholar · View at Scopus
  36. Y. Liu, J. Li, and A. P. Petropulu, “Destination assisted cooperative jamming for wireless physical-layer security,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 682–694, 2013. View at Publisher · View at Google Scholar · View at Scopus
  37. L. Grippo and M. Sciandrone, “On the convergence of the block nonlinear Gauss-Seidel method under convex constraints,” Operations Research Letters, vol. 26, no. 3, pp. 127–136, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. Y. Ma, A. Liu, and Y. Hua, “A dual-phase power allocation scheme for multicarrier relay system with direct link,” IEEE Transactions on Signal Processing, vol. 62, no. 1, pp. 5–16, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus