Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 7843843, 12 pages
https://doi.org/10.1155/2017/7843843
Research Article

A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach

1State Key Lab of ISN, Xidian University, Xi’an, Shaanxi, China
2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada

Correspondence should be addressed to Qiao Liu; moc.liamg@sellihcadniw

Received 20 October 2016; Revised 24 December 2016; Accepted 29 December 2016; Published 2 March 2017

Academic Editor: Jing Zhao

Copyright © 2017 Qiao Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Vaze and R. W. Heath, “Capacity scaling for MIMO two-way relaying,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 1451–1455, Nice, France, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  2. W. Nam, S.-Y. Chung, and Y. H. Lee, “Capacity of the Gaussian two-way relay channel to within 1/2 bit,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5488–5494, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Vaze and J. Heath, “On the capacity and diversity-multiplexing tradeoff of the two-way relay channel,” IEEE Transactions on Information Theory, vol. 57, no. 7, pp. 4219–4234, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. H. J. Yang, J. Chun, and A. Paulraj, “Asymptotic capacity of the separated MIMO two-way relay channel,” IEEE Transactions on Information Theory, vol. 57, no. 11, pp. 7542–7554, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. T. Yang, X. Yuan, L. Ping, I. B. Collings, and J. Yuan, “A new physical-layer network coding scheme with eigen-direction alignment precoding for MIMO two-way relaying,” IEEE Transactions on Communications, vol. 61, no. 3, pp. 973–986, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Z. Fang, X. Yuan, and X. Wang, “Towards the asymptotic sum capacity of the MIMO cellular two-way relay channel,” IEEE Transactions on Signal Processing, vol. 62, no. 16, pp. 4039–4051, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. G. Zheng, “Joint beamforming optimization and power control for full-duplex MIMO two-way relay channel,” IEEE Transactions on Signal Processing, vol. 63, no. 3, pp. 555–566, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. Y. Dong, M. J. Hossain, and J. Cheng, “Performance of wireless powered amplify and forward relaying over nakagami-m fading channels with nonlinear energy harvester,” IEEE Communications Letters, vol. 20, no. 4, pp. 672–675, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. A. O. Hero, “Secure space-time communication,” IEEE Transactions on Information Theory, vol. 49, no. 12, pp. 3235–3249, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: the MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088–3104, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. P. Parada and R. Blahut, “Secrecy capacity of SIMO and slow fading channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '05), pp. 2152–2155, Adelaide, Australia, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, “On the Gaussian MIMO wiretap channel,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 2471–2475, Nice, France, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas—part II: the MIMOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515–5532, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4961–4972, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Transactions on Information Theory, vol. 55, no. 6, pp. 2547–2553, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. Y. Oohama, “Capacity theorems for relay channels with confidential messages,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 926–930, IEEE, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Transactions on Signal Processing, vol. 60, no. 1, pp. 310–325, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO two-way communications with an untrusted relay,” IEEE Transactions on Signal Processing, vol. 62, no. 9, pp. 2185–2199, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. Z. Ding, M. Peng, and H.-H. Chen, “A general relaying transmission protocol for MIMO secrecy communications,” IEEE Transactions on Communications, vol. 60, no. 11, pp. 3461–3471, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, “Secure beamforming design for physical layer network coding based MIMO two-way relaying,” IEEE Communications Letters, vol. 18, no. 7, pp. 1270–1273, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Q. Liu, G. Gong, Y. Wang, and H. Li, “A novel physical layer security scheme for MIMO two-way relay channels,” in Proceedings of the IEEE Globecom Workshops (GC '15), pp. 1–6, San Diego, Calif, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. O. Longoria-Gandara and R. Parra-Michel, “Estimation of correlated MIMO channels using partial channel state information and DPSS,” IEEE Transactions on Wireless Communications, vol. 10, no. 11, pp. 3711–3719, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Chen, W. Yao, and L. Hanzo, “Semi-blind adaptive spatial equalization for MIMO systems with high-order QAM signalling,” IEEE Transactions on Wireless Communications, vol. 7, no. 11, pp. 4486–4491, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. C.-L. Wang and H.-C. Wang, “Optimized joint fine timing synchronization and channel estimation for MIMO systems,” IEEE Transactions on Communications, vol. 59, no. 4, pp. 1089–1098, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. G. H. Golub and C. F. Van Loan, Matrix Computations, vol. 3, JHU Press, 2012.