Abstract

This paper investigates a joint robust scheme in a secrecy relay network where distributed relays perform cooperative beamforming and a friendly jammer transmits jamming signal to enhance the information security. Specifically, we consider the outage constraint secrecy rate maximization design with imperfect channel state information. Through semidefinite relaxation and one-dimensional search, we propose a two-layer optimization method to solve the nonconvex problem. In addition, the Bernstein-type inequality and large deviation inequality are utilized to convert the probabilistic constraint. Simulation results demonstrate the performance of the proposed design.

1. Introduction

Physical layer security is considered as a promising technique in wireless networks to prevent illegitimate eavesdropping on the confidential message. Recently, cooperative transmission using relays to improve the physical layer security in wireless network has attracted increasing attention [1], while the cooperative beamforming (CB) and cooperative jamming (CJ) are the most useful ways for improving the security in relay networks [2].

Specifically, in [3], the authors proposed a joint CB and jamming design to provide Bob with certain quality of service (QoS). In [4], the authors proposed a joint CB, jamming and power allocation to secure amplify-and-forward (AF) relay system, and was extend in [5] with considering hybrid opportunistic relaying and jamming, while in [6], the authors proposed a jamming scheme in secure AF relay system considering two-slot eavesdropping. Recently in [7], the authors proposed a destination-aided CJ scheme for the AF relay system when the relay is untrusted.

The above works assumed that the perfect channel state information (CSI) can be obtained. In practice, it may be difficult to obtain the perfect CSI due to channel estimation and quantization errors. To handle this obstacle, two kinds of robust secrecy design, e.g., the worst case (WC) design and the outage constraint (OC) design have been widely investigated. The WC secrecy design, which assumes that the CSI errors lie in a deterministic region, is an absolute safe design and the performance may be conservative. On the other hand, the OC method is a better choice when the CSI errors have certain probabilistic properties [8]. Specifically, the OC secrecy design was investigated for multiple-input single-output (MISO) system in [912] and for multiple-input multiple-output (MIMO) system in [1315], respectively. Among these works, the Bernstein-type inequality (BTI) and large deviation inequality (LDI) are widely used to convert the probabilistic constraint into convex constraint.

However, all of these works investigated the direct communication scenario, and the OC secrecy design in relay network with friendly jammer has not been investigated yet. Motivated by this observation, in this paper, we concentrate on the OC robust design in friendly jammer-assisted secrecy AF relay networks. Specifically, assuming that the CSI error can be modeled as certain probabilistic distribution, we investigate the outage constraint secrecy rate maximization (OCSRM) problem, via jointly optimizing the CB and jamming covariance. Here, we model the CSI uncertainty level as a function of the signal-to-noise ratio (SNR), which rarely appears in related works. To solve the formulated nonconvex problem, we derive a safe approximation of the outage secrecy rate, and then a two-layer optimization algorithm, which consists of one-dimensional search and semidefinite relaxation (SDR), was proposed. Furthermore, the probabilistic constraints are transformed by the BTI and LDI, respectively. Simulation results demonstrate the performance of the proposed method.

1.1. Notations

Throughout this paper, boldface lowercase and uppercase letters denote vectors and matrices, respectively. The transpose, conjugate transpose, and trace of matrix are denoted as , , and , respectively. denotes to stack the columns of matrix into a vector . indicates that is a positive semidefinite matrix. denotes the Frobenius norm. denotes elementwise product. represents a diagonal matrix with on the main diagonal. is an identity matrix with proper dimension. denotes the real part of a complex variable . denotes a circularly symmetric complex Gaussian random vector with mean and covariance . denotes the maximum generalized eigenvalue of matrix pair . denotes the mathematical expectation.

2. System Model and Problem Formulation

2.1. System model

We consider a cooperative relay network as shown in Figure 1, in which Alice communicates with Bob with the help of relays and a friendly jammer. The set of Eves is denoted as . We assume that no direct link exists between Alice and Bob or between Alice and Eves. Each node is equipped with a single antenna except the jammer, which is equipped with antennas. All the channels are flat-fading Rayleigh distribution. Specifically, the channel between Alice to relays, between relays to Bob and Eves, between the jammer to Bob and Eves are denoted by , , , , and , respectively, and we assume that these channels undergo flat Rayleigh fading. Since the relays operate in a half-duplex mode with the AF scheme, one transmission round is composed of two phases.

In the first phase, Alice broadcasts its information which satisfies to the relays. Thus, the received signal at the relays is expressed as , where is the transmit power at Alice and is the additive noise at the relays with distribution .

In the second phase, the relays employ the CB vector to forward the information to the Bob, which grants Eves the opportunity to overhearing. Thus, the signal transmitted by the relays is given by .

To confuse Eves, the jammer emits jamming signal with distribution isotropically, where is the jamming covariance. Thus, the received signals at Bob and -th Eve are, respectively, given bywhere and are additive noises at Bob and -th Eve, with variance and , respectively.

The signal-to-interference-plus-noise ratios (SINRs) at Bob and -th Eve can be written aswhere , , , and , respectively.

Accordingly, the achievable secrecy rate for the relay network is given bywhere is the difference between the information rates for Bob and -th Eve, which can be expressed aswhere and are given as

2.2. Problem Formulation

Notably, we assume a practical scenario that the relays and jammer have perfect CSI of Bob but only imperfect CSI about Eves. Similar to [11], the channel error vectors are modeled as circularly symmetric complex Gaussian (CSCG) distribution, i.e.,where and are the estimated channel vectors, respectively, and and denote the channel uncertainty with covariance and , respectively. In addition, is independent of , for any . Similarly, is independent of , for any .

In this paper, we assume that and , with and denoting the channel uncertainty level. Besides, according to [16, 17], we consider two types of channel estimation error models:(1) and are fixed and independent of the average SNR.(2) and are functions of the average SNR. Take as example. The variance of the error can be modeled as , where is the variance of , e.g., , where denotes the link distance, and is the attenuation factor. In addition, is the transmit SNR, and depends on the cost of acquiring CSI in light of the training pilot power consumption and reflects the quality of channel estimation.

In this paper, we aim to maximize the outage secrecy rate via jointly designing the CB vector and jamming covariance . Specifically, the OCSRM problem is formulated aswhere is the secrecy outage probability, e.g., a parameter denoting the chance of falling below the target rate due to CSI uncertainty. Apparently, is the outage secrecy rate. In addition, , and denotes the sum power budget for the relays and jammer, while and stand for the individual power budget for the relays and the jammer, respectively.

It should be noted that (7a)–(7e) are nonconvex due to the coupled variables and constraints. Hence, in the following, we will propose an effective way to convert (7a)–(7e) into a solvable problem.

3. An SDR-Based Approach to the OCSRM Problem

In this section, we will derive an SDR-based approach to (7a)–(7e). Firstly, we decouple the probabilistic constraint in (7b). Since and are independent, we obtainwhere (see more details in [8]).

3.1. Relaxation of the OCSRM Problem

In this part, we will propose a two-layer optimization way to (7a)–(7e). To start with, we rewrite (7a)–(7e) aswhere is an introduced slack variable to simplify the objective function.

By substituting (2a) and (2b) into (9a)–(9c), we reexpress (9a)–(9c) as

Furthermore, utilizing the SDR [18], e.g., defining and neglecting the nonconvex constraint , we attain the following SDR problem:

3.2. An SDR-Based Line Search Method for (11a)–(11e)

We now focus on solving the relaxation (11a)–(11e). In fact, (11a)–(11e) can be reformulated as a single-variable optimization problem, which can be efficiently handled by SDR. To show this, note that

Then, we rewrite (11a)–(11e) aswhere and

does not have a closed form but is numerically tractable. In particular, (14a)–(14c) can be converted into a convex optimization problem. Specifically, via the Charnes–Cooper transformation [19], we introduce a change of variables , with . Then, (14a)–(14c) can be equivalently expressed as

3.3. Transformation of Probabilistic Constraints (15c)

The remaining challenging is that (15a)–(15f) have probabilistic constraints (15c), which is intractable. In the following, we will handle (15c) via the BTI and LDI, respectively.

Firstly, using the following identity , we obtain and .

Then, we transform (15a)–(15f) intowhere .

It should be noted that the outage probability in (16b) can be characterized by the quadratic inequality with respect to (w.r.t.) and , e.g., (16b) can be safely approximated via the following BTI and LDI, respectively.

Lemma 1 (BTI [11]). For any , , and , the following inequalities hold:where and are slack variables. Moreover, (17) is convex w.r.t. all the variables .

To use Lemma 1, we first define and , where and , respectively.

Then, the part in the braces of (16b) can be equivalently rewritten as

Furthermore, (18) can be rewritten aswhere , , , and are given as

Combining all these equations, (16a)–(16c) can be recast as the following convex problem:which can be efficiently solved by available solvers such as CVX [20].

It should be mentioned that for the obtained , if , we can attain the optimal via matrix eigenvector decomposition. On the other hand, if , we employ the Gaussian randomization (GR) method to generate the suboptimal rank-one solution [18].

In the above part, we have utilized the BTI to transform the probabilistic constraint. To reduce the computational complexity, in the following we will utilize the LDI to convert the probabilistic constraint.

Lemma 2 (LDI [11]). Let , and let , be given variables. Then, for any and , we havewhere and .

By Lemma 2 and following the similar way in [11], (16b) can be transformed into the following relationships:where is the solution to (see more details in reference [11]).

Thus, (16a)–(16c) can be recast as the following convex problem:which can also be solved by CVX. Similar to (21a), GR is utilized to extract the rank-one solution.

Following the theory in [11], we obtain the complexity comparison between the BTI and LDI methods, which are shown in Table 1, where denotes the accuracy requirement. From the comparison, we can see that the LDI method achieves lower complexity than the BTI method.

4. Simulation Results

In this section, simulation results are presented to evaluate the performance of the proposed design. The channels , , , , and are assumed to be independent and identically distributed complex Gaussian random variables with zero mean and unit variance. We set , , , , , , , , , and . In addition, we compare our design with the following methods: (1) the proposed design in the case of perfect Eves’ CSI, which can be seen as the upper bound of the robust design; (2) the no jam case, e.g., setting while only optimizing ; and (3) the fixed CSI uncertainty model with BTI method, and . These methods are denoted as “BTI method,” “LDI method,” “perfect CSI case,” “no jam method,” and “fixed CSI uncertainty,” respectively.

Firstly, we compare the outage secrecy rates versus the total power budget , and the result is shown in Figure 2. From this figure, we can see that the outage secrecy rates increase with the increase of , while the BTI method outperforms the LDI method and the no jam method. In addition, the performance gap between perfect and imperfect CSI cases is apparent, especially for relative large , which shows the influence of the CSI error on the security. Besides, the fixed CSI uncertainty model suffers certain performance loss, especially for relative large , since when tends to large, according to the function model, the corresponding CSI tends to smaller. However, the fixed CSI uncertainty model cannot reflect this relationship, thus leading to performance loss.

Next, we investigate the effect of the number of the relays on the outage secrecy rate. Figure 3 shows the relationship between the outage secrecy rate and the number of the relays. From this figure, we can see that for all these methods, higher outage secrecy rate can be achieved with more relays, since higher spatial degrees of freedom can be utilized to improve the secrecy performance.

Lastly, Figure 4 investigates the relationship between the outage secrecy rate versus the secrecy outage probability. As can be seen in this figure, with the increase of , the outage secrecy rate tends to increase. This is mainly due to the fact that with the increase of , the relay network permits more chance to outage, and thus the threshold of outage rate tends to increase, e.g., the outage secrecy rate tends to increase.

5. Conclusion

In this paper, we have investigated the OCSRM design in secrecy AF relay networks, via jointly optimizing the CB and jamming covariance. To solve the formulated nonconvex problem, we derived a safe approximation of the outage secrecy rate, and then a two-layer optimization algorithm was proposed. Simulation results demonstrated the performance of the proposed method.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this article.

Acknowledgments

This study was supported by the Industry-University-Research Cooperation Project of Jiangsu Province under grant no. BY2018282.