Abstract

We consider a secrecy dual-hop amplify-and-forward (AF) untrusted relay network, where the relay is willing to forward the signal to the destination while acting as a potential eavesdropper. Assuming that all these nodes are equipped with multiple antennas, we propose a joint destination aided cooperative jamming and precoding at both the source and the relay scheme, with the objective to maximize the worst case secrecy rate. The formulated problem is highly non-convex due to the maximization of the difference of several logarithmic determinant (log-det) functions in the CSI uncertainty region. To handle this challenge, we propose to linearize these log-det terms. After linearization, we tackle the CSI uncertainty based on epigraph reformulation and the sign-definiteness lemma. Finally, an alternating optimization (AO) algorithm is proposed to solve the reformulated problem. Numerical results are provided to demonstrate the performance of the proposed scheme.

1. Introduction

Due to the openness of wireless transmission medium, wireless information is susceptible to eavesdropping. Thus, the secure communication is a critical issue for wireless systems [1]. Physical layer security (PLS) is a newly emerging secrecy communication technique [2]. Relay is considered as a popular approach to extend network coverage and provide spatial degrees of freedom (DoF) [3]. PLS method in relay networks has raised great attention [4].

In practice, relay is not always helpful for secure communication. A misbehaving relay may try to eavesdrop the confidential information from the source node, which is termed as untrusted relay [5]. The untrusted multiple-input multiple-output (MIMO) relay was first studied in [6], in which a joint beamforming design was proposed. Furthermore, the untrusted two-way MIMO relay systems are studied in [7, 8], while, in [9], the authors investigated a novel joint destination-aided cooperative jamming (CJ) and precoding scheme at both the source and the untrusted relay node, which was further extended to untrusted energy harvested relay network in [10].

Recently, in [11], the authors proposed a joint beamforming alignment method with suboptimal power allocation for a untrusted two-way relay. In [12], the authors investigated the secrecy performance of untrusted relay systems with a full-duplex jamming destination, while, in [13], the authors investigated the energy-efficient secure transmission design for the internet of things (IoT) with an untrusted relay. In [14], the authors investigated the secure transmission in untrusted wireless-powered two-way relay networks.

All these above literatures consider perfect channel state information (CSI) case. However, in practice, perfect CSI is hard to obtain due the channel estimation and quantization errors. To overcome this obstacle, in [15], the authors investigated the untrusted amplify-and-forward (AF) relay design with imperfect CSI, while, in [16], the authors proposed an artificial noise (AN) aided secure precoding for untrusted two-way MIMO relay systems with imperfect CSI.

Based on these observations, in this paper, we investigated the robust secrecy design in a untrusted AF MIMO relay network. Specifically, assuming that all the nodes are equipped with multiple antennas and only imperfect CSI can be obtained, we propose a robust destination-aided CJ scheme to maximize the worst-case secrecy rate. However, the formulated problem is highly non-convex and challenging to solve. To handle this challenge, we propose to linearize the difference of multiple logarithmic determinant (log-det) functions. After linearization, we tackle the channel uncertainty based on epigraph reformulation and the sign-definiteness lemma. Finally, an alternating optimization (AO) method is proposed to solve the reformulated problem. Simulation results demonstrate the performance of our proposed design.

The rest of this paper is organized as follows. The system model and problem formulation are described in Section 2. The AO based method is discussed in Section 3. Numerical results are provided in Section 4, and Section 5 concludes the paper.

Notations. Throughout this paper, boldface lowercase and uppercase letters denote vectors and matrices, respectively. The transpose, conjugate transpose, and trace of matrix are denoted as , , and , respectively. denotes stacking the columns of matrix into a vector . indicates that is a positive semidefinite matrix. and represent the Frobenius norm and the Kronecker product, respectively. denotes the real part of a complex variable . and indicates and the statistical expectation, respectively. denotes by zeros matrix. denotes by zeros matrix. denotes by identity matrix. denotes by identity matrix. denotes a circularly symmetric complex Gaussian random vector with mean and covariance .

2. System Model and Problem Statement

2.1. System Model

Let us consider a secure MIMO relay system, which consists of one source node (S), one relay (R), and one destination (D), as shown in Figure 1. It is assumed that S, R, and D are equipped with , , and antennas, respectively. The channel coefficients between S to R, D to R, and R to D are denoted as , , and , respectively.

In this paper, R is assumed to forward the signal to D and, at the same time, acts as an eavesdropper (Eve) which interprets the signal from S. Besides, we assume that only imperfect S, D, and R’s CSIs can be obtained. Based on the bounded CSI model in [15, 16], the imperfect CSIs are modeled aswhere , , and denote the estimates of , , and , respectively; , , and are their respective channel uncertainties; , , and denote the respective sizes of the bounded channel uncertainties region.

In the first phase, the signal vector () is precoded by the precoding matrix , and the jamming vector () is emitted by D with precoding matrix to protect the confidential information. Both and satisfy . Thus, the received signal at R can be expressed aswhere is the noise vector at the relay with .

In the second phase, R utilizes precoding matrix to forward the information; thus, the received signal at D can be expressed aswhere is the noise vector at the destination with .

Furthermore, can be expressed as

Here, we assume that D can partially remove the self interference signal based on the estimated CSI, and the high-order term with respect to (w.r.t) the uncertain CSI is small enough compared with the channel strength. Thus, the received signal at D can be approximately given by

Accordingly, the worst case secrecy rate can be expressed aswhere and denote the mutual information at R and D, respectively, and are given bywith and being given asand

2.2. Problem Statement

In this paper, we investigated the joint precoding matrices design to maximize the worst case secrecy rate, under the power constraints at the respective nodes. Mathematically, the problem can be formulated aswhere , , and are the maximum achievable powers for S, D, and R, respectively.

3. An Alternating Optimization (AO) Method

The formulated problem is highly non-convex due to the maximization of the difference of several log-det functions in the CSI uncertainty region. In this section, we will propose to linearize these log-det terms and tackle the CSI uncertainty based on epigraph reformulation.

Firstly, we introduce the following Lemma.

Lemma 1 (see [17]). Define by matrix function,where is any positive definite matrix. Then, the following three equations hold true.

Equation 1. For any positive definite matrix , we have and

Equation 2. For any positive definite matrix , we have and

Equation 3. We have

Equations 1 and 2 can be proven by the first-order optimality condition, while Equation 3 directly follows from Equations 1 and 2 and the identity .

Equations (10a), (10b), and (10c) are hard to handle due to the coupled variables and non-convex objective and constraints. In the following, we will decouple (10a), (10b), and (10c) based on these above equations.

To utilize the above equations, we rewritten aswhere

Furthermore, the matrix functions and are as follows:

Based on the above relationships, (10a), (10b), and (10c) can be rewritten as

Furthermore, by introducing auxiliary variables , and denoting , , we obtain the following relationships:

Equations (21a)–(21m) are still hard to handle due to the CSI uncertainty. Next, we will transform (21a)–(21m) into a more convenient reformulation and employ the following sign-definiteness lemma to handle the CSI uncertainty.

Lemma 2 (the sign-definiteness Lemma [18]). Given a Hermitian matrix and arbitrary matrices , the semi-infinite linear matrix inequality (LMI)holds if and only if there exist real numbers such thatFirstly, via the Schur complement [19], (21a) can be transformed intoTo handle the uncertainties with respect to and , we denoteand , , , .

Then, based on Lemma 2, can be reformulated aswhere are introduced auxiliary variables.

By substituting , , , , and into (25), (26) can be recast as

Similarly, the constraints (21b)–(21e), (21g), (21h), and (21j)–(21l) can be transformed into the following LMIs:where are introduced auxiliary variables.

Lastly, the robust relay power constraint (e.g., (10c)) can be turned into the following LMIs:where and are introduced auxiliary variables.

Bases on these operations, we obtain the following problem:

To this end, we have turned (10a), (10b), and (10c) into an equivalent problem (40a)–(40e). Equations (40a)–(40e) are still non-convex with respect to all these optimization variables, but is convex with respect to given variables when other variables are fixed. Specifically, these variables can be divided into four groups, , , , . Then, (40a)–(40e) can be decoupled into four subproblems with respect to these variables. Both these subproblems can be effectively solved by the convex optimization tool CVX [20], and the optimal local solution to (10a), (10b), and (10c) can be achieved in an alternating method.

4. Simulation Results

In this section, we evaluate the performance of our design through Monte Carlo simulations. The simulation settings are assumed as follows: , , , . Each entry of , , and is randomly generated by and the channel uncertainties are . In addition, we compare our algorithm with the following methods: the perfect CSI case, which can be treated as the upper bound of our robust design; the no jamming method, e.g., setting with only optimize and . The three methods are legend as “the proposed design”, “the perfect CSI case”, and “the no jamming case”, respectively.

Firstly, we investigated the convergency performance of our proposed AO method by comparing the worst case secrecy rate with the iterative numbers. Figure 2 shows four examples of the convergence behavior with random channel realizations. From this figure, we can see that the proposed AO algorithm can always converge to the optimal solution in limited iterative numbers.

In Figure 3, we show the worst case secrecy rate versus the source transmit power . From this figure, we can see that increase with the increase of for our proposed design and the perfect CSI case. On the other hand, for the no jamming case, firstly increase with the increase of to some point, then decrease. This is a typical phenomenon in untrusted relay case.

In Figure 4, we illustrate the impact of the destination transmit power on . From this figure, we can see that increase with the increase of for all these methods. Since in this case, the more jamming signal used to interfere the untrusted relay, the high secrecy performance can be obtained.

In Figure 5, we show the worst case secrecy rate versus the relay transmit power . From this figure, we can see that increase with the increase of for our proposed design and the perfect CSI case. On the other hand, for the no jamming case, firstly increase with the increase of , then decrease at some point.

In Figure 6, we illustrate the impact of the relay antenna numbers on the worst case secrecy rate . It is an interesting result that as the number of antennas of the relay increases, firstly increase to a certain point and then decrease. This is because that as the DoF of the relay increases, the untrusted relay has more ability to cancel the jamming signal and further intercepts the confidential message successfully.

5. Conclusion

In this paper, we investigated an AF MIMO relay system where the relay is untrusted. Assuming that only imperfect CSI can be obtained, we aim to maximize the worst case secrecy rate via designing the precoding matrices. To solve the formulated highly non-convex problem, we propose to linearize the difference of multiple log-det functions. After linearization, we handle the CSI uncertainty based on epigraph reformulation and the sign-definiteness lemma. Finally, an AO method was proposed to solve the reformulated problem. Simulation results demonstrated the performance of our proposed design.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the Natural Science Foundation of China under Grant no. 61673108, the Colleges and Universities Natural Science Foundation in Jiangsu Province under Contract no. 18KJB510010, the Industry-University-Research Cooperation Project of Jiangsu province under Grant no. BY2018282, the Open Project Program of the Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, China, under Contract no. UASP1801, and the Fundamental Research Funds for the Central Universities under Contract no. 2242016K30013.