Secure communication design for multi-user peer-to-peer wireless relay networks

In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisatio...

Full description

Saved in:
Bibliographic Details
Published inIET communications Vol. 10; no. 7; pp. 770 - 777
Main Authors Gong, Xiangwu, Long, Hang, Dong, Feihong, Yin, Hao
Format Journal Article
LanguageEnglish
Published The Institution of Engineering and Technology 05.05.2016
Subjects
Online AccessGet full text
ISSN1751-8628
1751-8636
DOI10.1049/iet-com.2015.0609

Cover

Abstract In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisation. First, considering user fairness, the authors study the max–min achievable secrecy rate problem subject to a total transmit power constraint. Mathematically, the optimisation problem is non-linear and non-convex. They propose a polynomial time algorithm based on the bisection technique to solve it. Second, they study the total transmit power minimisation problem which aims at minimising the total transmit power at relays such that individual secrecy rate for each user is satisfied. The total power optimisation problem is also non-convex, so they use the relaxation technique to transform it into a convex problem which can be efficiently solved by the gradient-based algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results shows that the proposed designs can significantly improve the performance of secure wireless communications.
AbstractList In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisation. First, considering user fairness, the authors study the max-min achievable secrecy rate problem subject to a total transmit power constraint. Mathematically, the optimisation problem is non-linear and non-convex. They propose a polynomial time algorithm based on the bisection technique to solve it. Second, they study the total transmit power minimisation problem which aims at minimising the total transmit power at relays such that individual secrecy rate for each user is satisfied. The total power optimisation problem is also non-convex, so they use the relaxation technique to transform it into a convex problem which can be efficiently solved by the gradient-based algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results shows that the proposed designs can significantly improve the performance of secure wireless communications.
Author Gong, Xiangwu
Yin, Hao
Long, Hang
Dong, Feihong
Author_xml – sequence: 1
  givenname: Xiangwu
  surname: Gong
  fullname: Gong, Xiangwu
  email: xiangwugong@hotmail.com
  organization: 2No. 95899 Unit, PLAAF, Beijing 100000, People's Republic of China
– sequence: 2
  givenname: Hang
  surname: Long
  fullname: Long, Hang
  organization: 3Beijing University of Posts and Telecommunications, Beijing 100876, People's Republic of China
– sequence: 3
  givenname: Feihong
  surname: Dong
  fullname: Dong, Feihong
  organization: 1College of Communications Engineering, PLA University of Science and Technology, Nanjing, People's Republic of China
– sequence: 4
  givenname: Hao
  surname: Yin
  fullname: Yin, Hao
  organization: 4Institute of China Electronic System Engineering Corporation, Beijing 100141, People's Republic of China
BookMark eNqFkE9PwyAYh4mZiZv6Abz1qAcmtIUWb7psarJlB_VMGH1rmG2Z0GbZt5c6Y4zxz-nHS34PL3lGaNDYBhA6o2RMSSouDbRY23ocE8rGhBNxgIY0YxTnPOGDz3OcH6GR92tCGONpOkTLB9CdgyiwddcYrVpjm6gAb56bqLQuqruqNbjz4KINgMOtxX1GW-OgAu-jEGoXNdBurXvxJ-iwVJWH0488Rk-z6ePkDs-Xt_eT6znWKaExVgmhKiMZE0W4KJjixarQKgxaKV2KEnjOdKFiTrNcZWUi8pUGVq5Elqc6F8kxOt-_u3H2tQPfytp4DVWlGrCdlzRPGCeMCx6qdF_VznrvoJQbZ2rldpIS2cuTQZ4MAmQvT_byApN9Y7Rp3920TpnqT_JqT25NBbv_V8nJ4im-mYVRxAG-2MN9bW071wSH8n76KCfLxRdmU5Shi3_o_v6xN_SpqQI
CitedBy_id crossref_primary_10_1049_iet_com_2016_1030
crossref_primary_10_1007_s11277_023_10243_4
crossref_primary_10_1049_iet_com_2019_0027
crossref_primary_10_1177_15501329221107582
Cites_doi 10.1109/TSP.2011.2161295
10.1109/TSP.2011.2167618
10.1109/TSP.2011.2172433
10.1109/TSP.2009.2020002
10.1049/iet‐com.2014.1112
10.1109/TIFS.2011.2148716
10.1002/j.1538‐7305.1975.tb02040.x
10.1109/TWC.2009.090323
10.1007/s11036‐010‐0275‐1
10.1109/TSP.2010.2092772
10.1109/TIT.2008.921908
10.1109/TSP.2013.2253774
10.1109/TSP.2011.2174790
10.1109/TSP.2014.2303942
10.1109/TWC.2012.070912.110789
10.1109/TWC.2015.2403367
10.1109/MSP.2010.936019
10.1109/TSP.2010.2092774
10.1109/LCOMM.2013.040213.130082
10.1109/LCOMM.2013.112513.131926
10.1109/TSP.2012.2189388
10.1109/JSAC.2007.070213
10.1109/LSP.2012.2227725
10.1109/ICC.2013.6655584
10.1109/TSP.2010.2078810
10.1109/TSP.2009.2038412
10.1109/TCOMM.2012.072612.110686
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2021 The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2021 The Institution of Engineering and Technology
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1049/iet-com.2015.0609
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database
CrossRef


DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8636
EndPage 777
ExternalDocumentID 10_1049_iet_com_2015_0609
CMU2BF01592
Genre article
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61201241
– fundername: Research Fund for the Doctoral Program of Higher Education
  grantid: 20130005120003
– fundername: National Key Technology R&D Program of China
  grantid: 2015ZX03002009-004
– fundername: Research Fund for the Doctoral Program of Higher Education
  funderid: 20130005120003
– fundername: National Natural Science Foundation of China
  funderid: 61201241
– fundername: National Key Technology R&D Program of China
  funderid: 2015ZX03002009‐004
GroupedDBID 0R
24P
29I
4IJ
5GY
6IK
8VB
AAJGR
ABPTK
ACGFS
ACIWK
AENEX
ALMA_UNASSIGNED_HOLDINGS
BFFAM
CS3
DU5
ESX
HZ
IFIPE
IPLJI
JAVBF
LAI
LOTEE
LXI
M43
MS
NADUK
NXXTH
O9-
OCL
QWB
RIE
RNS
RUI
U5U
UNMZH
ZL0
ZZ
.DC
0R~
0ZK
1OC
2QL
4.4
6OB
8FE
8FG
96U
AAHHS
AAHJG
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ACXQS
ADEYR
AEEZP
AEGXH
AEQDE
AFAZI
AFKRA
AIAGR
AIWBW
AJBDE
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
EBS
EJD
F8P
GOZPB
GROUPED_DOAJ
GRPMH
HCIFZ
HZ~
IAO
ITC
K1G
L6V
M7S
MCNEO
MS~
OK1
P62
PTHSS
ROL
S0W
~ZZ
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c4012-a301a70759dc40d5a6dbdcadc4caacf9fe685cda26178a7f398bce5fb9784c893
IEDL.DBID 24P
ISSN 1751-8628
IngestDate Fri Sep 05 06:03:10 EDT 2025
Wed Oct 29 21:47:57 EDT 2025
Thu Apr 24 22:52:29 EDT 2025
Wed Jan 22 16:30:52 EST 2025
Tue Jan 05 21:46:06 EST 2021
Thu May 09 18:05:37 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords radio networks
nonlinear programming
secrecy rate maximisation
amplify-and-forward protocol
minimax techniques
amplify and forward communication
power minimisation problem
nonconvex optimisation problem
relaxation technique
physical layer security technique
total power optimisation problem
gradient-based algorithm
relaxation theory
protocols
gradient methods
concave programming
relay networks (telecommunication)
multiuser peer-to-peer wireless relay network
peer-to-peer computing
polynomials
max-min achievable secrecy rate problem
convex programming
mathematical analysis
secure wireless communication design
polynomial time algorithm
computer network security
nonlinear optimisation problem
convex problem
numerical evaluation
minimisation
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4012-a301a70759dc40d5a6dbdcadc4caacf9fe685cda26178a7f398bce5fb9784c893
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1835605696
PQPubID 23500
PageCount 8
ParticipantIDs wiley_primary_10_1049_iet_com_2015_0609_CMU2BF01592
iet_journals_10_1049_iet_com_2015_0609
crossref_primary_10_1049_iet_com_2015_0609
proquest_miscellaneous_1835605696
crossref_citationtrail_10_1049_iet_com_2015_0609
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 2016-05-05
PublicationDateYYYYMMDD 2016-05-05
PublicationDate_xml – month: 05
  year: 2016
  text: 2016-05-05
  day: 05
PublicationDecade 2010
PublicationTitle IET communications
PublicationYear 2016
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Bloch, M.; Barros, J.; Rodrigues, M.R.D. (C1) 2008; 54
Huang, J.; Swindlehurst, A.L. (C2) 2011; 59
Krikidis, I.; Thompson, J.; Mclaughlin, S. (C11) 2009; 8
Bornhorst, N.; Pesavento, M.; Gershman, A.B. (C18) 2012; 60
Lei, J.; Han, Z.; Vasquez-Castro, M.A. (C24) 2011; 6
Gong, X.; Long, H.; Yin, H. (C13) 2015; 9
Wang, H.M.; Luo, M.; Xia, X.G. (C29) 2013; 20
Du, H.; Ratnarajah, T.; Pesavento, M. (C8) 2012; 60
Rankov, B.; Wittneben, A. (C15) 2007; 25
Wyner, A.D. (C6) 1975; 54
Wang, C.; Wang, H.M. (C19) 2015; 14
Walid, S.; Zhu, H.; Tamer, B. (C21) 2011; 16
Dong, L.; Han, Z.; Petropulu, A.P. (C10) 2010; 50
Fazeli-Dehkordy, S.; Shahbazpanahi, S.; Gazor, S. (C17) 2009; 57
Luo, Z.Q.; Ma, W.K.; So, A.C. (C28) 2010; 27
Zheng, G.; Choo, L.C.; Wong, K.K. (C12) 2011; 59
Mukherjee, A.; Swindlehurst, A.L. (C22) 2011; 59
Geraci, G.; Egan, M.; Yuan, J. (C3) 2012; 60
Vishwakarma, S.; Chockalingam, A. (C14) 2013; 17
Fakoorian, S.A.A.; Swindlehurst, A.L. (C4) 2013; 61
Jeong, C.; Kim, I.; Kim, D.I. (C7) 2012; 60
Pei, M.; Swindlehurst, A.L.; Ma, D. (C23) 2014; 18
Liu, Y.F.; Dai, Y.H.; Luo, Z.Q. (C25) 2011; 59
Pei, M.Y.; Wei, J.B.; Wong, K. (C9) 2012; 11
Cheng, Y.; Pesavento, M. (C16) 2012; 60
Yang, Y.; Sun, C.; Zhao, H. (C5) 2014; 62
2012; 60
2009; 57
2015; 14
2010; 27
2013; 17
2013; 61
2013; 20
1996
2009; 8
2006
2008; 54
2011; 59
2014; 18
1975; 54
2013
2014; 62
2015; 9
2011; 16
2011; 6
2012; 11
2007; 25
2010; 50
e_1_2_8_29_1
e_1_2_8_24_1
e_1_2_8_25_1
e_1_2_8_26_1
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_5_1
e_1_2_8_4_1
e_1_2_8_7_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
e_1_2_8_20_1
e_1_2_8_21_1
e_1_2_8_22_1
e_1_2_8_23_1
Luenberger D.G. (e_1_2_8_28_1) 2006
Golub G. (e_1_2_8_27_1) 1996
e_1_2_8_17_1
e_1_2_8_18_1
e_1_2_8_19_1
e_1_2_8_13_1
e_1_2_8_14_1
e_1_2_8_15_1
e_1_2_8_16_1
e_1_2_8_10_1
e_1_2_8_11_1
e_1_2_8_12_1
e_1_2_8_30_1
References_xml – volume: 8
  start-page: 5003
  issue: 10
  year: 2009
  end-page: 5011
  ident: C11
  article-title: Relay selection for secure cooperative networks with jamming
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 60
  start-page: 3025
  issue: 11
  year: 2012
  end-page: 3029
  ident: C3
  article-title: Secrecy sum-rates for multiuser MIMO regularized channel inversion precoding
  publication-title: IEEE Trans. Commun.
– volume: 59
  start-page: 351
  issue: 1
  year: 2011
  end-page: 361
  ident: C22
  article-title: Robust beamforming for security in MIMO wiretap channels with imperfect CSI
  publication-title: IEEE Trans. Signal Process.
– volume: 59
  start-page: 4871
  issue: 10
  year: 2011
  end-page: 4884
  ident: C2
  article-title: Cooperative jamming for secure communications in MIMO relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 17
  start-page: 912
  issue: 5
  year: 2013
  end-page: 915
  ident: C14
  article-title: Decode-and-forward relay beamforming for secrecy with finite-alphabet input
  publication-title: IEEE Commun. Lett.
– volume: 59
  start-page: 1317
  issue: 3
  year: 2011
  end-page: 1322
  ident: C12
  article-title: Optimal cooperative jamming to enhance physical layer security using relays
  publication-title: IEEE Trans. Signal Process.
– volume: 11
  start-page: 3025
  issue: 9
  year: 2012
  end-page: 3029
  ident: C9
  article-title: Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 60
  start-page: 2962
  issue: 6
  year: 2012
  end-page: 2973
  ident: C16
  article-title: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 27
  start-page: 20
  issue: 3
  year: 2010
  end-page: 34
  ident: C28
  article-title: Semidefinite relaxation of quadraticoptimization problems: from its practical deployments and scope of applicability to key theoretical results
  publication-title: IEEE Signal Process. Mag.
– volume: 59
  start-page: 1142
  issue: 3
  year: 2011
  end-page: 1157
  ident: C25
  article-title: Coordinated beamforming for MISO interference channel: complexity analysis and efficient algorithms
  publication-title: IEEE Trans. Signal Process.
– volume: 18
  start-page: 50
  issue: 1
  year: 2014
  end-page: 53
  ident: C23
  article-title: On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling
  publication-title: IEEE Commun. Lett.
– volume: 9
  start-page: 1751
  issue: 8
  year: 2015
  end-page: 8628
  ident: C13
  article-title: Robust AF relay beamforming for security with MSE constraint
  publication-title: IET Commun.
– volume: 61
  start-page: 2620
  issue: 10
  year: 2013
  end-page: 2631
  ident: C4
  article-title: Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
  publication-title: IEEE Trans. Signal Process.
– volume: 60
  start-page: 221
  issue: 1
  year: 2012
  end-page: 232
  ident: C18
  article-title: Distributed beamforming for multi-group multicasting relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 20
  start-page: 39
  issue: 1
  year: 2013
  end-page: 42
  ident: C29
  article-title: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
  publication-title: IEEE Signal Process. Lett.
– volume: 57
  start-page: 3053
  issue: 8
  year: 2009
  end-page: 3062
  ident: C17
  article-title: Multiple peer-to-peer communications using a network of relays
  publication-title: IEEE Trans. Signal Process.
– volume: 54
  start-page: 1355
  issue: 8
  year: 1975
  end-page: 1387
  ident: C6
  article-title: The wire-tap channel
  publication-title: Bell. Syst. Tech. J.
– volume: 14
  start-page: 3280
  issue: 6
  year: 2015
  end-page: 3293
  ident: C19
  article-title: Joint beamforming and power allocation for secrecy in peer-to-peer relay networks
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 60
  start-page: 310
  issue: 1
  year: 2012
  end-page: 325
  ident: C7
  article-title: Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
  publication-title: IEEE Trans. Signal Process.
– volume: 25
  start-page: 379
  issue: 2
  year: 2007
  end-page: 389
  ident: C15
  article-title: Spectral efficient protocols for halfduplex fading relay channels
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 6
  start-page: 661
  issue: 3
  year: 2011
  end-page: 671
  ident: C24
  article-title: Secure satellite communication systems design with individual secrecy rate constraints
  publication-title: IEEE Trans. Inf. Forens. Secur.
– volume: 54
  start-page: 2515
  issue: 6
  year: 2008
  end-page: 2534
  ident: C1
  article-title: Wireless information-theoretic security
  publication-title: IEEE Trans. Inf. Theory
– volume: 60
  start-page: 781
  issue: 2
  year: 2012
  end-page: 792
  ident: C8
  article-title: Joint transceiver beamforming in MIMO cognitive radio network via second-order cone programming
  publication-title: IEEE Trans. Signal Process.
– volume: 16
  start-page: 231
  year: 2011
  end-page: 245
  ident: C21
  article-title: Distributed coalition formation games for secure wireless transmission
  publication-title: Mob. Netw. Appl.
– volume: 62
  start-page: 2111
  issue: 8
  year: 2014
  end-page: 2126
  ident: C5
  article-title: Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 50
  start-page: 1875
  issue: 3
  year: 2010
  end-page: 1888
  ident: C10
  article-title: Improving wireless physical layer security via cooperating relays
  publication-title: IEEE Trans. Signal Process.
– volume: 60
  start-page: 3025
  issue: 11
  year: 2012
  end-page: 3029
  article-title: Secrecy sum‐rates for multiuser MIMO regularized channel inversion precoding
  publication-title: IEEE Trans. Commun.
– volume: 60
  start-page: 221
  issue: 1
  year: 2012
  end-page: 232
  article-title: Distributed beamforming for multi‐group multicasting relay networks
  publication-title: IEEE Trans. Signal Process.
– start-page: 6128
  year: 2013
  end-page: 6132
– volume: 50
  start-page: 1875
  issue: 3
  year: 2010
  end-page: 1888
  article-title: Improving wireless physical layer security via cooperating relays
  publication-title: IEEE Trans. Signal Process.
– volume: 60
  start-page: 781
  issue: 2
  year: 2012
  end-page: 792
  article-title: Joint transceiver beamforming in MIMO cognitive radio network via second‐order cone programming
  publication-title: IEEE Trans. Signal Process.
– volume: 9
  start-page: 1751
  issue: 8
  year: 2015
  end-page: 8628
  article-title: Robust AF relay beamforming for security with MSE constraint
  publication-title: IET Commun.
– year: 1996
– volume: 20
  start-page: 39
  issue: 1
  year: 2013
  end-page: 42
  article-title: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper'r CSI
  publication-title: IEEE Signal Process. Lett.
– volume: 25
  start-page: 379
  issue: 2
  year: 2007
  end-page: 389
  article-title: Spectral efficient protocols for halfduplex fading relay channels
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 57
  start-page: 3053
  issue: 8
  year: 2009
  end-page: 3062
  article-title: Multiple peer‐to‐peer communications using a network of relays
  publication-title: IEEE Trans. Signal Process.
– volume: 16
  start-page: 231
  year: 2011
  end-page: 245
  article-title: Distributed coalition formation games for secure wireless transmission
  publication-title: Mob. Netw. Appl.
– volume: 59
  start-page: 351
  issue: 1
  year: 2011
  end-page: 361
  article-title: Robust beamforming for security in MIMO wiretap channels with imperfect CSI
  publication-title: IEEE Trans. Signal Process.
– volume: 54
  start-page: 2515
  issue: 6
  year: 2008
  end-page: 2534
  article-title: Wireless information‐theoretic security
  publication-title: IEEE Trans. Inf. Theory
– volume: 6
  start-page: 661
  issue: 3
  year: 2011
  end-page: 671
  article-title: Secure satellite communication systems design with individual secrecy rate constraints
  publication-title: IEEE Trans. Inf. Forens. Secur.
– volume: 59
  start-page: 1317
  issue: 3
  year: 2011
  end-page: 1322
  article-title: Optimal cooperative jamming to enhance physical layer security using relays
  publication-title: IEEE Trans. Signal Process.
– volume: 27
  start-page: 20
  issue: 3
  year: 2010
  end-page: 34
  article-title: Semidefinite relaxation of quadraticoptimization problems: from its practical deployments and scope of applicability to key theoretical results
  publication-title: IEEE Signal Process. Mag.
– volume: 61
  start-page: 2620
  issue: 10
  year: 2013
  end-page: 2631
  article-title: Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
  publication-title: IEEE Trans. Signal Process.
– volume: 54
  start-page: 1355
  issue: 8
  year: 1975
  end-page: 1387
  article-title: The wire‐tap channel
  publication-title: Bell. Syst. Tech. J.
– volume: 18
  start-page: 50
  issue: 1
  year: 2014
  end-page: 53
  article-title: On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling
  publication-title: IEEE Commun. Lett.
– volume: 62
  start-page: 2111
  issue: 8
  year: 2014
  end-page: 2126
  article-title: Algorithms for secrecy guarantee with null space beamforming in two‐way relay networks
  publication-title: IEEE Trans. Signal Process.
– year: 2006
– volume: 60
  start-page: 310
  issue: 1
  year: 2012
  end-page: 325
  article-title: Joint secure beamforming design at the source and the relay for an amplify‐and‐forward MIMO untrusted relay system
  publication-title: IEEE Trans. Signal Process.
– volume: 11
  start-page: 3025
  issue: 9
  year: 2012
  end-page: 3029
  article-title: Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 14
  start-page: 3280
  issue: 6
  year: 2015
  end-page: 3293
  article-title: Joint beamforming and power allocation for secrecy in peer‐to‐peer relay networks
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 60
  start-page: 2962
  issue: 6
  year: 2012
  end-page: 2973
  article-title: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer‐to‐peer relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 59
  start-page: 4871
  issue: 10
  year: 2011
  end-page: 4884
  article-title: Cooperative jamming for secure communications in MIMO relay networks
  publication-title: IEEE Trans. Signal Process.
– volume: 17
  start-page: 912
  issue: 5
  year: 2013
  end-page: 915
  article-title: Decode‐and‐forward relay beamforming for secrecy with finite‐alphabet input
  publication-title: IEEE Commun. Lett.
– volume: 59
  start-page: 1142
  issue: 3
  year: 2011
  end-page: 1157
  article-title: Coordinated beamforming for MISO interference channel: complexity analysis and efficient algorithms
  publication-title: IEEE Trans. Signal Process.
– volume: 8
  start-page: 5003
  issue: 10
  year: 2009
  end-page: 5011
  article-title: Relay selection for secure cooperative networks with jamming
  publication-title: IEEE Trans. Wirel. Commun.
– ident: e_1_2_8_3_1
  doi: 10.1109/TSP.2011.2161295
– ident: e_1_2_8_19_1
  doi: 10.1109/TSP.2011.2167618
– ident: e_1_2_8_8_1
  doi: 10.1109/TSP.2011.2172433
– volume-title: Linear and nonlinear programming
  year: 2006
  ident: e_1_2_8_28_1
– ident: e_1_2_8_18_1
  doi: 10.1109/TSP.2009.2020002
– ident: e_1_2_8_14_1
  doi: 10.1049/iet‐com.2014.1112
– ident: e_1_2_8_25_1
  doi: 10.1109/TIFS.2011.2148716
– ident: e_1_2_8_7_1
  doi: 10.1002/j.1538‐7305.1975.tb02040.x
– ident: e_1_2_8_12_1
  doi: 10.1109/TWC.2009.090323
– ident: e_1_2_8_22_1
  doi: 10.1007/s11036‐010‐0275‐1
– ident: e_1_2_8_26_1
  doi: 10.1109/TSP.2010.2092772
– volume-title: Matrix computations
  year: 1996
  ident: e_1_2_8_27_1
– ident: e_1_2_8_2_1
  doi: 10.1109/TIT.2008.921908
– ident: e_1_2_8_5_1
  doi: 10.1109/TSP.2013.2253774
– ident: e_1_2_8_9_1
  doi: 10.1109/TSP.2011.2174790
– ident: e_1_2_8_6_1
  doi: 10.1109/TSP.2014.2303942
– ident: e_1_2_8_10_1
  doi: 10.1109/TWC.2012.070912.110789
– ident: e_1_2_8_20_1
  doi: 10.1109/TWC.2015.2403367
– ident: e_1_2_8_29_1
  doi: 10.1109/MSP.2010.936019
– ident: e_1_2_8_13_1
  doi: 10.1109/TSP.2010.2092774
– ident: e_1_2_8_15_1
  doi: 10.1109/LCOMM.2013.040213.130082
– ident: e_1_2_8_24_1
  doi: 10.1109/LCOMM.2013.112513.131926
– ident: e_1_2_8_17_1
  doi: 10.1109/TSP.2012.2189388
– ident: e_1_2_8_16_1
  doi: 10.1109/JSAC.2007.070213
– ident: e_1_2_8_30_1
  doi: 10.1109/LSP.2012.2227725
– ident: e_1_2_8_21_1
  doi: 10.1109/ICC.2013.6655584
– ident: e_1_2_8_23_1
  doi: 10.1109/TSP.2010.2078810
– ident: e_1_2_8_11_1
  doi: 10.1109/TSP.2009.2038412
– ident: e_1_2_8_4_1
  doi: 10.1109/TCOMM.2012.072612.110686
SSID ssj0055644
Score 2.096807
Snippet In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of...
In this study, physical layer security techniques are studied for multi‐user peer‐to‐peer relay networks using amplify‐and‐forward protocol in the presence of...
SourceID proquest
crossref
wiley
iet
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 770
SubjectTerms Algorithms
amplify and forward communication
amplify‐and‐forward protocol
computer network security
concave programming
convex problem
convex programming
Design engineering
gradient methods
gradient‐based algorithm
mathematical analysis
max‐min achievable secrecy rate problem
minimax techniques
minimisation
multiuser peer‐to‐peer wireless relay network
nonconvex optimisation problem
nonlinear optimisation problem
nonlinear programming
numerical evaluation
Optimization
peer‐to‐peer computing
physical layer security technique
polynomial time algorithm
Polynomials
power minimisation problem
protocols
radio networks
relaxation technique
relaxation theory
Relay networks
relay networks (telecommunication)
secrecy rate maximisation
secure wireless communication design
Social networks
Systems design
total power optimisation problem
Wireless communication
SummonAdditionalLinks – databaseName: IET Digital Library Open Access
  dbid: IDLOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagLDAgnqK8ZBBiQDLQJHbjEQoVIAoLldgsx3YQEkorKAP_nu-SFFoJAVNeFyu5S3zfne_B2IF3rVjpOBchwDZJYBGILHJBqChAXdvMakf-jt6duuonN4_y8Ts92j8_Ua8MMfa4kbc8VJkHFLqNefik5nHVkAT49gQEgiI_oMrk8amibL65CNZ51GBz1xe3ZGJVM7OUqmzuCo3ZEkDy6dcq5w-DTOmpWVyegqCTQLbURN0ltlhDSH5WyXyZzYRihS1MFBZcZfelGz1wN5n-wX0ZrcEBU3kZRyjIQ8GHuEmMBoK2nCoXv2Dy45Tj8sGLKkj8bY31u5cPnStRt04QDgZTJCz-W9sGHNAeJ7y0ymfeWRw4a12u86BS6byleuypbeexTjMXZJ7BqEwcMMw6axSDImwwLiG6FmCDDdolKvdW-nZIUx3Bss7i3DbZ6ZhRxtV1xam9xYsp17cTbcA8g_c1xFtDvG2yo69bhlVRjd-ID-ncWOy_Ee5PEV5fPpjOfe-bwAx93mR7Yyka_Ei0OmKLMHjHuMCisO2UVk0Wl-L9-9lMp9ePzrs41NHmf59zi81jX5VRk3KbNUav72EHyGaU7dYf7Cc5uvUz
  priority: 102
  providerName: Institution of Engineering and Technology
Title Secure communication design for multi-user peer-to-peer wireless relay networks
URI http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0609
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0609
https://www.proquest.com/docview/1835605696
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVBHI
  databaseName: IET Digital Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: IDLOA
  dateStart: 20130104
  isFulltext: true
  titleUrlDefault: https://digital-library.theiet.org/content/collections
  providerName: Institution of Engineering and Technology
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NTuMwEB6x5bJ7QPyK8ieDVntACtAkduNjKVSAtrAHKnGzHNuRkKq0gnLgxiPwjDwJn522tFoJJC6R7dhW4vF4vhmPx0S_rWkkQiZF5Bx0kxQaQZTHxkUidhDXOtfSeHtH91pc9NKrO363QO3JWZgqPsTU4OY5I6zXnsF1Xt1CAlALIt67UeQdPiDB-NGJ8If4FhvAM36ax-m_yXLMuQg3ukJMNiLA92y6tSmP_-tiTjj9wOs53DmLXoP46SzT0hg3slZF6BVacOUq_ZqJJrhGvWA7d8zMnvlgNrhoMGBTFpwH315evWGCDdEM6dEAD59mPmhxH-se88dbnllZ-Yc_rlOvc37bvojGtyZEBrpSHGmwrG4CCUiLAsu1sLk1GhmjtSlk4UTGjdU-FHumm0Uis9w4XuTQJ1MD-LJBtXJQuk1iHFRrADFoJ00qCqu5bboskzGU6jwpdJ1OJsOlzDikuL_Zoq_C1nYqFYZQ4a-VH2HlR7hOh9MmwyqexmeV__iyMVc9flbxYK7i5fmtat90PyqooS3qtD-hpQIP-Y0RXbrBE_oFDIVaJ6SoUxKI_PW3qXa3F592kJXx1rdabdNPlIvgPcl3qDZ6eHK7QDijfC_M4D1avDz7e9N6B7Nk-i8
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NTsMwDLZgHIAD4leM34AQB6QCa5usOcJg2oABh03iFqVJKiGhboJx4MYj8Iw8CXa6jU1IIHGp0tSJWqeOPzuOA3BgTSUSMsoC59A2idEiCNLQuECEDtW1TrU05O9o3YpGJ7564A9TcDHcC1Pkhxg53Egy_HxNAk4O6cLgjClJ5qPrBxTxgSqMH58K2sU3E4uKIBMsjO-H8zHnwh_pinqyEiB-T0Zrm_LkRxcT2mkaH08Az3H46vVPfREWBsCRnRUjvQRTLl-G-bF0givQ8c5zx8z4pg9mfYwGQ3DKfPTg5_sHeSZYD5thud_FC5UZZS1-womP0f6WN5YXAeIvq9CpX7ZrjWBwbEJg0FgKA40yq6sIBaTFCsu1sKk1Gm-M1iaTmRMJN1ZTLvZEV7NIJqlxPEvRoIwN4pc1KOXd3K0D4zhsFYQM2kkTi8xqbqsuSWSIVnUaZboMp0N2KTPIKU5HWzwpv7YdS4UsVPjVijisiMNlOBo16RUJNX4jPqS6gVi9_Ea4P0HYvGyr2l3rm0D1bFaGveFYKhQiWhnRueu-Yr-IQ9GuE1KUIfKD_Pe7qVqrE57X8VaGG_9qtQuzjXbrRt00b683YQ5phA-l5FtQ6j-_um2EO_10x__NX1F__A8
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NahsxEB6cFEp6KP1JqdM_NYQeAtvEuyt5dWztmLiN3RxiyE1oJS0Uwto0ziG3PkKfsU_Sb7S2Y1NIoZdF0o7ErqTRfDMajYgOvOtkSmdVEgJ0kxwaQVKmLiQqDRDXtrTasb1jNFank_zLpbxsUX95FqaJD7EyuDFnxPWaGTzMfNUonDkHyfwe5gl7fECEyY_Hik_xPcglJCLHd87Pl-uxlCpe6Qo52UmA34vV3qY--quJDem0hdcbwHMdvkb5M3hCjxfAUXxqRvoptUL9jB6thRN8TpNoPA_CrR_6ED76aAiAUxG9B3___MWWCTFDNaTnUzw4LThq8RUWPsHnW25F3TiIX-_SZHBy0TtNFtcmJA7KUppY8KztAgpojwIvrfKldxYZZ62rdBVUIZ23HIu9sN0q00XpgqxKKJS5A355Qdv1tA4vSUgMWweQwQbtclV5K303FIVOoVWXWWXbdLzsLuMWMcX5aosrE_e2c23QhQZ_bbiHDfdwmw5XVWZNQI37iD9w2YKtru8j3N8gHJ5cmN630R2Bwdxp0_vlWBowEe-M2DpMb9AucCj0OqVVm7I4yP_-NtMbTdLPA2R1uvdftd7Rw_P-wJwNx19f0Q5IVPSklK9pe_7jJrwB2pmXb-Nk_gMRgfue
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+communication+design+for+multi-user+peer-to-peer+wireless+relay+networks&rft.jtitle=IET+communications&rft.au=Xiangwu%2C+Gong&rft.au=Hang%2C+Long&rft.au=Feihong%2C+Dong&rft.au=Hao%2C+Yin&rft.date=2016-05-05&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=7&rft.spage=770&rft.epage=777&rft_id=info:doi/10.1049%2Fiet-com.2015.0609&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon