Secure communication design for multi-user peer-to-peer wireless relay networks
In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisatio...
Saved in:
| Published in | IET communications Vol. 10; no. 7; pp. 770 - 777 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
The Institution of Engineering and Technology
05.05.2016
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1751-8628 1751-8636 |
| DOI | 10.1049/iet-com.2015.0609 |
Cover
| Abstract | In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisation. First, considering user fairness, the authors study the max–min achievable secrecy rate problem subject to a total transmit power constraint. Mathematically, the optimisation problem is non-linear and non-convex. They propose a polynomial time algorithm based on the bisection technique to solve it. Second, they study the total transmit power minimisation problem which aims at minimising the total transmit power at relays such that individual secrecy rate for each user is satisfied. The total power optimisation problem is also non-convex, so they use the relaxation technique to transform it into a convex problem which can be efficiently solved by the gradient-based algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results shows that the proposed designs can significantly improve the performance of secure wireless communications. |
|---|---|
| AbstractList | In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system designs are considered: the minimum achievable secrecy rate maximisation and the total transmit power minimisation. First, considering user fairness, the authors study the max-min achievable secrecy rate problem subject to a total transmit power constraint. Mathematically, the optimisation problem is non-linear and non-convex. They propose a polynomial time algorithm based on the bisection technique to solve it. Second, they study the total transmit power minimisation problem which aims at minimising the total transmit power at relays such that individual secrecy rate for each user is satisfied. The total power optimisation problem is also non-convex, so they use the relaxation technique to transform it into a convex problem which can be efficiently solved by the gradient-based algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results shows that the proposed designs can significantly improve the performance of secure wireless communications. |
| Author | Gong, Xiangwu Yin, Hao Long, Hang Dong, Feihong |
| Author_xml | – sequence: 1 givenname: Xiangwu surname: Gong fullname: Gong, Xiangwu email: xiangwugong@hotmail.com organization: 2No. 95899 Unit, PLAAF, Beijing 100000, People's Republic of China – sequence: 2 givenname: Hang surname: Long fullname: Long, Hang organization: 3Beijing University of Posts and Telecommunications, Beijing 100876, People's Republic of China – sequence: 3 givenname: Feihong surname: Dong fullname: Dong, Feihong organization: 1College of Communications Engineering, PLA University of Science and Technology, Nanjing, People's Republic of China – sequence: 4 givenname: Hao surname: Yin fullname: Yin, Hao organization: 4Institute of China Electronic System Engineering Corporation, Beijing 100141, People's Republic of China |
| BookMark | eNqFkE9PwyAYh4mZiZv6Abz1qAcmtIUWb7psarJlB_VMGH1rmG2Z0GbZt5c6Y4zxz-nHS34PL3lGaNDYBhA6o2RMSSouDbRY23ocE8rGhBNxgIY0YxTnPOGDz3OcH6GR92tCGONpOkTLB9CdgyiwddcYrVpjm6gAb56bqLQuqruqNbjz4KINgMOtxX1GW-OgAu-jEGoXNdBurXvxJ-iwVJWH0488Rk-z6ePkDs-Xt_eT6znWKaExVgmhKiMZE0W4KJjixarQKgxaKV2KEnjOdKFiTrNcZWUi8pUGVq5Elqc6F8kxOt-_u3H2tQPfytp4DVWlGrCdlzRPGCeMCx6qdF_VznrvoJQbZ2rldpIS2cuTQZ4MAmQvT_byApN9Y7Rp3920TpnqT_JqT25NBbv_V8nJ4im-mYVRxAG-2MN9bW071wSH8n76KCfLxRdmU5Shi3_o_v6xN_SpqQI |
| CitedBy_id | crossref_primary_10_1049_iet_com_2016_1030 crossref_primary_10_1007_s11277_023_10243_4 crossref_primary_10_1049_iet_com_2019_0027 crossref_primary_10_1177_15501329221107582 |
| Cites_doi | 10.1109/TSP.2011.2161295 10.1109/TSP.2011.2167618 10.1109/TSP.2011.2172433 10.1109/TSP.2009.2020002 10.1049/iet‐com.2014.1112 10.1109/TIFS.2011.2148716 10.1002/j.1538‐7305.1975.tb02040.x 10.1109/TWC.2009.090323 10.1007/s11036‐010‐0275‐1 10.1109/TSP.2010.2092772 10.1109/TIT.2008.921908 10.1109/TSP.2013.2253774 10.1109/TSP.2011.2174790 10.1109/TSP.2014.2303942 10.1109/TWC.2012.070912.110789 10.1109/TWC.2015.2403367 10.1109/MSP.2010.936019 10.1109/TSP.2010.2092774 10.1109/LCOMM.2013.040213.130082 10.1109/LCOMM.2013.112513.131926 10.1109/TSP.2012.2189388 10.1109/JSAC.2007.070213 10.1109/LSP.2012.2227725 10.1109/ICC.2013.6655584 10.1109/TSP.2010.2078810 10.1109/TSP.2009.2038412 10.1109/TCOMM.2012.072612.110686 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2021 The Institution of Engineering and Technology |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Institution of Engineering and Technology |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1049/iet-com.2015.0609 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-8636 |
| EndPage | 777 |
| ExternalDocumentID | 10_1049_iet_com_2015_0609 CMU2BF01592 |
| Genre | article |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61201241 – fundername: Research Fund for the Doctoral Program of Higher Education grantid: 20130005120003 – fundername: National Key Technology R&D Program of China grantid: 2015ZX03002009-004 – fundername: Research Fund for the Doctoral Program of Higher Education funderid: 20130005120003 – fundername: National Natural Science Foundation of China funderid: 61201241 – fundername: National Key Technology R&D Program of China funderid: 2015ZX03002009‐004 |
| GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8VB AAJGR ABPTK ACGFS ACIWK AENEX ALMA_UNASSIGNED_HOLDINGS BFFAM CS3 DU5 ESX HZ IFIPE IPLJI JAVBF LAI LOTEE LXI M43 MS NADUK NXXTH O9- OCL QWB RIE RNS RUI U5U UNMZH ZL0 ZZ .DC 0R~ 0ZK 1OC 2QL 4.4 6OB 8FE 8FG 96U AAHHS AAHJG ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU EBS EJD F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO ITC K1G L6V M7S MCNEO MS~ OK1 P62 PTHSS ROL S0W ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c4012-a301a70759dc40d5a6dbdcadc4caacf9fe685cda26178a7f398bce5fb9784c893 |
| IEDL.DBID | 24P |
| ISSN | 1751-8628 |
| IngestDate | Fri Sep 05 06:03:10 EDT 2025 Wed Oct 29 21:47:57 EDT 2025 Thu Apr 24 22:52:29 EDT 2025 Wed Jan 22 16:30:52 EST 2025 Tue Jan 05 21:46:06 EST 2021 Thu May 09 18:05:37 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | radio networks nonlinear programming secrecy rate maximisation amplify-and-forward protocol minimax techniques amplify and forward communication power minimisation problem nonconvex optimisation problem relaxation technique physical layer security technique total power optimisation problem gradient-based algorithm relaxation theory protocols gradient methods concave programming relay networks (telecommunication) multiuser peer-to-peer wireless relay network peer-to-peer computing polynomials max-min achievable secrecy rate problem convex programming mathematical analysis secure wireless communication design polynomial time algorithm computer network security nonlinear optimisation problem convex problem numerical evaluation minimisation |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4012-a301a70759dc40d5a6dbdcadc4caacf9fe685cda26178a7f398bce5fb9784c893 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1835605696 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | wiley_primary_10_1049_iet_com_2015_0609_CMU2BF01592 iet_journals_10_1049_iet_com_2015_0609 crossref_primary_10_1049_iet_com_2015_0609 proquest_miscellaneous_1835605696 crossref_citationtrail_10_1049_iet_com_2015_0609 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | 2016-05-05 |
| PublicationDateYYYYMMDD | 2016-05-05 |
| PublicationDate_xml | – month: 05 year: 2016 text: 2016-05-05 day: 05 |
| PublicationDecade | 2010 |
| PublicationTitle | IET communications |
| PublicationYear | 2016 |
| Publisher | The Institution of Engineering and Technology |
| Publisher_xml | – name: The Institution of Engineering and Technology |
| References | Bloch, M.; Barros, J.; Rodrigues, M.R.D. (C1) 2008; 54 Huang, J.; Swindlehurst, A.L. (C2) 2011; 59 Krikidis, I.; Thompson, J.; Mclaughlin, S. (C11) 2009; 8 Bornhorst, N.; Pesavento, M.; Gershman, A.B. (C18) 2012; 60 Lei, J.; Han, Z.; Vasquez-Castro, M.A. (C24) 2011; 6 Gong, X.; Long, H.; Yin, H. (C13) 2015; 9 Wang, H.M.; Luo, M.; Xia, X.G. (C29) 2013; 20 Du, H.; Ratnarajah, T.; Pesavento, M. (C8) 2012; 60 Rankov, B.; Wittneben, A. (C15) 2007; 25 Wyner, A.D. (C6) 1975; 54 Wang, C.; Wang, H.M. (C19) 2015; 14 Walid, S.; Zhu, H.; Tamer, B. (C21) 2011; 16 Dong, L.; Han, Z.; Petropulu, A.P. (C10) 2010; 50 Fazeli-Dehkordy, S.; Shahbazpanahi, S.; Gazor, S. (C17) 2009; 57 Luo, Z.Q.; Ma, W.K.; So, A.C. (C28) 2010; 27 Zheng, G.; Choo, L.C.; Wong, K.K. (C12) 2011; 59 Mukherjee, A.; Swindlehurst, A.L. (C22) 2011; 59 Geraci, G.; Egan, M.; Yuan, J. (C3) 2012; 60 Vishwakarma, S.; Chockalingam, A. (C14) 2013; 17 Fakoorian, S.A.A.; Swindlehurst, A.L. (C4) 2013; 61 Jeong, C.; Kim, I.; Kim, D.I. (C7) 2012; 60 Pei, M.; Swindlehurst, A.L.; Ma, D. (C23) 2014; 18 Liu, Y.F.; Dai, Y.H.; Luo, Z.Q. (C25) 2011; 59 Pei, M.Y.; Wei, J.B.; Wong, K. (C9) 2012; 11 Cheng, Y.; Pesavento, M. (C16) 2012; 60 Yang, Y.; Sun, C.; Zhao, H. (C5) 2014; 62 2012; 60 2009; 57 2015; 14 2010; 27 2013; 17 2013; 61 2013; 20 1996 2009; 8 2006 2008; 54 2011; 59 2014; 18 1975; 54 2013 2014; 62 2015; 9 2011; 16 2011; 6 2012; 11 2007; 25 2010; 50 e_1_2_8_29_1 e_1_2_8_24_1 e_1_2_8_25_1 e_1_2_8_26_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_4_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_20_1 e_1_2_8_21_1 e_1_2_8_22_1 e_1_2_8_23_1 Luenberger D.G. (e_1_2_8_28_1) 2006 Golub G. (e_1_2_8_27_1) 1996 e_1_2_8_17_1 e_1_2_8_18_1 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_14_1 e_1_2_8_15_1 e_1_2_8_16_1 e_1_2_8_10_1 e_1_2_8_11_1 e_1_2_8_12_1 e_1_2_8_30_1 |
| References_xml | – volume: 8 start-page: 5003 issue: 10 year: 2009 end-page: 5011 ident: C11 article-title: Relay selection for secure cooperative networks with jamming publication-title: IEEE Trans. Wirel. Commun. – volume: 60 start-page: 3025 issue: 11 year: 2012 end-page: 3029 ident: C3 article-title: Secrecy sum-rates for multiuser MIMO regularized channel inversion precoding publication-title: IEEE Trans. Commun. – volume: 59 start-page: 351 issue: 1 year: 2011 end-page: 361 ident: C22 article-title: Robust beamforming for security in MIMO wiretap channels with imperfect CSI publication-title: IEEE Trans. Signal Process. – volume: 59 start-page: 4871 issue: 10 year: 2011 end-page: 4884 ident: C2 article-title: Cooperative jamming for secure communications in MIMO relay networks publication-title: IEEE Trans. Signal Process. – volume: 17 start-page: 912 issue: 5 year: 2013 end-page: 915 ident: C14 article-title: Decode-and-forward relay beamforming for secrecy with finite-alphabet input publication-title: IEEE Commun. Lett. – volume: 59 start-page: 1317 issue: 3 year: 2011 end-page: 1322 ident: C12 article-title: Optimal cooperative jamming to enhance physical layer security using relays publication-title: IEEE Trans. Signal Process. – volume: 11 start-page: 3025 issue: 9 year: 2012 end-page: 3029 ident: C9 article-title: Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI publication-title: IEEE Trans. Wirel. Commun. – volume: 60 start-page: 2962 issue: 6 year: 2012 end-page: 2973 ident: C16 article-title: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks publication-title: IEEE Trans. Signal Process. – volume: 27 start-page: 20 issue: 3 year: 2010 end-page: 34 ident: C28 article-title: Semidefinite relaxation of quadraticoptimization problems: from its practical deployments and scope of applicability to key theoretical results publication-title: IEEE Signal Process. Mag. – volume: 59 start-page: 1142 issue: 3 year: 2011 end-page: 1157 ident: C25 article-title: Coordinated beamforming for MISO interference channel: complexity analysis and efficient algorithms publication-title: IEEE Trans. Signal Process. – volume: 18 start-page: 50 issue: 1 year: 2014 end-page: 53 ident: C23 article-title: On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling publication-title: IEEE Commun. Lett. – volume: 9 start-page: 1751 issue: 8 year: 2015 end-page: 8628 ident: C13 article-title: Robust AF relay beamforming for security with MSE constraint publication-title: IET Commun. – volume: 61 start-page: 2620 issue: 10 year: 2013 end-page: 2631 ident: C4 article-title: Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint publication-title: IEEE Trans. Signal Process. – volume: 60 start-page: 221 issue: 1 year: 2012 end-page: 232 ident: C18 article-title: Distributed beamforming for multi-group multicasting relay networks publication-title: IEEE Trans. Signal Process. – volume: 20 start-page: 39 issue: 1 year: 2013 end-page: 42 ident: C29 article-title: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI publication-title: IEEE Signal Process. Lett. – volume: 57 start-page: 3053 issue: 8 year: 2009 end-page: 3062 ident: C17 article-title: Multiple peer-to-peer communications using a network of relays publication-title: IEEE Trans. Signal Process. – volume: 54 start-page: 1355 issue: 8 year: 1975 end-page: 1387 ident: C6 article-title: The wire-tap channel publication-title: Bell. Syst. Tech. J. – volume: 14 start-page: 3280 issue: 6 year: 2015 end-page: 3293 ident: C19 article-title: Joint beamforming and power allocation for secrecy in peer-to-peer relay networks publication-title: IEEE Trans. Wirel. Commun. – volume: 60 start-page: 310 issue: 1 year: 2012 end-page: 325 ident: C7 article-title: Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system publication-title: IEEE Trans. Signal Process. – volume: 25 start-page: 379 issue: 2 year: 2007 end-page: 389 ident: C15 article-title: Spectral efficient protocols for halfduplex fading relay channels publication-title: IEEE J. Sel. Areas Commun. – volume: 6 start-page: 661 issue: 3 year: 2011 end-page: 671 ident: C24 article-title: Secure satellite communication systems design with individual secrecy rate constraints publication-title: IEEE Trans. Inf. Forens. Secur. – volume: 54 start-page: 2515 issue: 6 year: 2008 end-page: 2534 ident: C1 article-title: Wireless information-theoretic security publication-title: IEEE Trans. Inf. Theory – volume: 60 start-page: 781 issue: 2 year: 2012 end-page: 792 ident: C8 article-title: Joint transceiver beamforming in MIMO cognitive radio network via second-order cone programming publication-title: IEEE Trans. Signal Process. – volume: 16 start-page: 231 year: 2011 end-page: 245 ident: C21 article-title: Distributed coalition formation games for secure wireless transmission publication-title: Mob. Netw. Appl. – volume: 62 start-page: 2111 issue: 8 year: 2014 end-page: 2126 ident: C5 article-title: Algorithms for secrecy guarantee with null space beamforming in two-way relay networks publication-title: IEEE Trans. Signal Process. – volume: 50 start-page: 1875 issue: 3 year: 2010 end-page: 1888 ident: C10 article-title: Improving wireless physical layer security via cooperating relays publication-title: IEEE Trans. Signal Process. – volume: 60 start-page: 3025 issue: 11 year: 2012 end-page: 3029 article-title: Secrecy sum‐rates for multiuser MIMO regularized channel inversion precoding publication-title: IEEE Trans. Commun. – volume: 60 start-page: 221 issue: 1 year: 2012 end-page: 232 article-title: Distributed beamforming for multi‐group multicasting relay networks publication-title: IEEE Trans. Signal Process. – start-page: 6128 year: 2013 end-page: 6132 – volume: 50 start-page: 1875 issue: 3 year: 2010 end-page: 1888 article-title: Improving wireless physical layer security via cooperating relays publication-title: IEEE Trans. Signal Process. – volume: 60 start-page: 781 issue: 2 year: 2012 end-page: 792 article-title: Joint transceiver beamforming in MIMO cognitive radio network via second‐order cone programming publication-title: IEEE Trans. Signal Process. – volume: 9 start-page: 1751 issue: 8 year: 2015 end-page: 8628 article-title: Robust AF relay beamforming for security with MSE constraint publication-title: IET Commun. – year: 1996 – volume: 20 start-page: 39 issue: 1 year: 2013 end-page: 42 article-title: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper'r CSI publication-title: IEEE Signal Process. Lett. – volume: 25 start-page: 379 issue: 2 year: 2007 end-page: 389 article-title: Spectral efficient protocols for halfduplex fading relay channels publication-title: IEEE J. Sel. Areas Commun. – volume: 57 start-page: 3053 issue: 8 year: 2009 end-page: 3062 article-title: Multiple peer‐to‐peer communications using a network of relays publication-title: IEEE Trans. Signal Process. – volume: 16 start-page: 231 year: 2011 end-page: 245 article-title: Distributed coalition formation games for secure wireless transmission publication-title: Mob. Netw. Appl. – volume: 59 start-page: 351 issue: 1 year: 2011 end-page: 361 article-title: Robust beamforming for security in MIMO wiretap channels with imperfect CSI publication-title: IEEE Trans. Signal Process. – volume: 54 start-page: 2515 issue: 6 year: 2008 end-page: 2534 article-title: Wireless information‐theoretic security publication-title: IEEE Trans. Inf. Theory – volume: 6 start-page: 661 issue: 3 year: 2011 end-page: 671 article-title: Secure satellite communication systems design with individual secrecy rate constraints publication-title: IEEE Trans. Inf. Forens. Secur. – volume: 59 start-page: 1317 issue: 3 year: 2011 end-page: 1322 article-title: Optimal cooperative jamming to enhance physical layer security using relays publication-title: IEEE Trans. Signal Process. – volume: 27 start-page: 20 issue: 3 year: 2010 end-page: 34 article-title: Semidefinite relaxation of quadraticoptimization problems: from its practical deployments and scope of applicability to key theoretical results publication-title: IEEE Signal Process. Mag. – volume: 61 start-page: 2620 issue: 10 year: 2013 end-page: 2631 article-title: Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint publication-title: IEEE Trans. Signal Process. – volume: 54 start-page: 1355 issue: 8 year: 1975 end-page: 1387 article-title: The wire‐tap channel publication-title: Bell. Syst. Tech. J. – volume: 18 start-page: 50 issue: 1 year: 2014 end-page: 53 article-title: On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling publication-title: IEEE Commun. Lett. – volume: 62 start-page: 2111 issue: 8 year: 2014 end-page: 2126 article-title: Algorithms for secrecy guarantee with null space beamforming in two‐way relay networks publication-title: IEEE Trans. Signal Process. – year: 2006 – volume: 60 start-page: 310 issue: 1 year: 2012 end-page: 325 article-title: Joint secure beamforming design at the source and the relay for an amplify‐and‐forward MIMO untrusted relay system publication-title: IEEE Trans. Signal Process. – volume: 11 start-page: 3025 issue: 9 year: 2012 end-page: 3029 article-title: Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI publication-title: IEEE Trans. Wirel. Commun. – volume: 14 start-page: 3280 issue: 6 year: 2015 end-page: 3293 article-title: Joint beamforming and power allocation for secrecy in peer‐to‐peer relay networks publication-title: IEEE Trans. Wirel. Commun. – volume: 60 start-page: 2962 issue: 6 year: 2012 end-page: 2973 article-title: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer‐to‐peer relay networks publication-title: IEEE Trans. Signal Process. – volume: 59 start-page: 4871 issue: 10 year: 2011 end-page: 4884 article-title: Cooperative jamming for secure communications in MIMO relay networks publication-title: IEEE Trans. Signal Process. – volume: 17 start-page: 912 issue: 5 year: 2013 end-page: 915 article-title: Decode‐and‐forward relay beamforming for secrecy with finite‐alphabet input publication-title: IEEE Commun. Lett. – volume: 59 start-page: 1142 issue: 3 year: 2011 end-page: 1157 article-title: Coordinated beamforming for MISO interference channel: complexity analysis and efficient algorithms publication-title: IEEE Trans. Signal Process. – volume: 8 start-page: 5003 issue: 10 year: 2009 end-page: 5011 article-title: Relay selection for secure cooperative networks with jamming publication-title: IEEE Trans. Wirel. Commun. – ident: e_1_2_8_3_1 doi: 10.1109/TSP.2011.2161295 – ident: e_1_2_8_19_1 doi: 10.1109/TSP.2011.2167618 – ident: e_1_2_8_8_1 doi: 10.1109/TSP.2011.2172433 – volume-title: Linear and nonlinear programming year: 2006 ident: e_1_2_8_28_1 – ident: e_1_2_8_18_1 doi: 10.1109/TSP.2009.2020002 – ident: e_1_2_8_14_1 doi: 10.1049/iet‐com.2014.1112 – ident: e_1_2_8_25_1 doi: 10.1109/TIFS.2011.2148716 – ident: e_1_2_8_7_1 doi: 10.1002/j.1538‐7305.1975.tb02040.x – ident: e_1_2_8_12_1 doi: 10.1109/TWC.2009.090323 – ident: e_1_2_8_22_1 doi: 10.1007/s11036‐010‐0275‐1 – ident: e_1_2_8_26_1 doi: 10.1109/TSP.2010.2092772 – volume-title: Matrix computations year: 1996 ident: e_1_2_8_27_1 – ident: e_1_2_8_2_1 doi: 10.1109/TIT.2008.921908 – ident: e_1_2_8_5_1 doi: 10.1109/TSP.2013.2253774 – ident: e_1_2_8_9_1 doi: 10.1109/TSP.2011.2174790 – ident: e_1_2_8_6_1 doi: 10.1109/TSP.2014.2303942 – ident: e_1_2_8_10_1 doi: 10.1109/TWC.2012.070912.110789 – ident: e_1_2_8_20_1 doi: 10.1109/TWC.2015.2403367 – ident: e_1_2_8_29_1 doi: 10.1109/MSP.2010.936019 – ident: e_1_2_8_13_1 doi: 10.1109/TSP.2010.2092774 – ident: e_1_2_8_15_1 doi: 10.1109/LCOMM.2013.040213.130082 – ident: e_1_2_8_24_1 doi: 10.1109/LCOMM.2013.112513.131926 – ident: e_1_2_8_17_1 doi: 10.1109/TSP.2012.2189388 – ident: e_1_2_8_16_1 doi: 10.1109/JSAC.2007.070213 – ident: e_1_2_8_30_1 doi: 10.1109/LSP.2012.2227725 – ident: e_1_2_8_21_1 doi: 10.1109/ICC.2013.6655584 – ident: e_1_2_8_23_1 doi: 10.1109/TSP.2010.2078810 – ident: e_1_2_8_11_1 doi: 10.1109/TSP.2009.2038412 – ident: e_1_2_8_4_1 doi: 10.1109/TCOMM.2012.072612.110686 |
| SSID | ssj0055644 |
| Score | 2.096807 |
| Snippet | In this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of... In this study, physical layer security techniques are studied for multi‐user peer‐to‐peer relay networks using amplify‐and‐forward protocol in the presence of... |
| SourceID | proquest crossref wiley iet |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 770 |
| SubjectTerms | Algorithms amplify and forward communication amplify‐and‐forward protocol computer network security concave programming convex problem convex programming Design engineering gradient methods gradient‐based algorithm mathematical analysis max‐min achievable secrecy rate problem minimax techniques minimisation multiuser peer‐to‐peer wireless relay network nonconvex optimisation problem nonlinear optimisation problem nonlinear programming numerical evaluation Optimization peer‐to‐peer computing physical layer security technique polynomial time algorithm Polynomials power minimisation problem protocols radio networks relaxation technique relaxation theory Relay networks relay networks (telecommunication) secrecy rate maximisation secure wireless communication design Social networks Systems design total power optimisation problem Wireless communication |
| SummonAdditionalLinks | – databaseName: IET Digital Library Open Access dbid: IDLOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagLDAgnqK8ZBBiQDLQJHbjEQoVIAoLldgsx3YQEkorKAP_nu-SFFoJAVNeFyu5S3zfne_B2IF3rVjpOBchwDZJYBGILHJBqChAXdvMakf-jt6duuonN4_y8Ts92j8_Ua8MMfa4kbc8VJkHFLqNefik5nHVkAT49gQEgiI_oMrk8amibL65CNZ51GBz1xe3ZGJVM7OUqmzuCo3ZEkDy6dcq5w-DTOmpWVyegqCTQLbURN0ltlhDSH5WyXyZzYRihS1MFBZcZfelGz1wN5n-wX0ZrcEBU3kZRyjIQ8GHuEmMBoK2nCoXv2Dy45Tj8sGLKkj8bY31u5cPnStRt04QDgZTJCz-W9sGHNAeJ7y0ymfeWRw4a12u86BS6byleuypbeexTjMXZJ7BqEwcMMw6axSDImwwLiG6FmCDDdolKvdW-nZIUx3Bss7i3DbZ6ZhRxtV1xam9xYsp17cTbcA8g_c1xFtDvG2yo69bhlVRjd-ID-ncWOy_Ee5PEV5fPpjOfe-bwAx93mR7Yyka_Ei0OmKLMHjHuMCisO2UVk0Wl-L9-9lMp9ePzrs41NHmf59zi81jX5VRk3KbNUav72EHyGaU7dYf7Cc5uvUz priority: 102 providerName: Institution of Engineering and Technology |
| Title | Secure communication design for multi-user peer-to-peer wireless relay networks |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0609 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0609 https://www.proquest.com/docview/1835605696 |
| Volume | 10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVBHI databaseName: IET Digital Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: IDLOA dateStart: 20130104 isFulltext: true titleUrlDefault: https://digital-library.theiet.org/content/collections providerName: Institution of Engineering and Technology – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NTuMwEB6x5bJ7QPyK8ieDVntACtAkduNjKVSAtrAHKnGzHNuRkKq0gnLgxiPwjDwJn522tFoJJC6R7dhW4vF4vhmPx0S_rWkkQiZF5Bx0kxQaQZTHxkUidhDXOtfSeHtH91pc9NKrO363QO3JWZgqPsTU4OY5I6zXnsF1Xt1CAlALIt67UeQdPiDB-NGJ8If4FhvAM36ax-m_yXLMuQg3ukJMNiLA92y6tSmP_-tiTjj9wOs53DmLXoP46SzT0hg3slZF6BVacOUq_ZqJJrhGvWA7d8zMnvlgNrhoMGBTFpwH315evWGCDdEM6dEAD59mPmhxH-se88dbnllZ-Yc_rlOvc37bvojGtyZEBrpSHGmwrG4CCUiLAsu1sLk1GhmjtSlk4UTGjdU-FHumm0Uis9w4XuTQJ1MD-LJBtXJQuk1iHFRrADFoJ00qCqu5bboskzGU6jwpdJ1OJsOlzDikuL_Zoq_C1nYqFYZQ4a-VH2HlR7hOh9MmwyqexmeV__iyMVc9flbxYK7i5fmtat90PyqooS3qtD-hpQIP-Y0RXbrBE_oFDIVaJ6SoUxKI_PW3qXa3F592kJXx1rdabdNPlIvgPcl3qDZ6eHK7QDijfC_M4D1avDz7e9N6B7Nk-i8 |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NTsMwDLZgHIAD4leM34AQB6QCa5usOcJg2oABh03iFqVJKiGhboJx4MYj8Iw8CXa6jU1IIHGp0tSJWqeOPzuOA3BgTSUSMsoC59A2idEiCNLQuECEDtW1TrU05O9o3YpGJ7564A9TcDHcC1Pkhxg53Egy_HxNAk4O6cLgjClJ5qPrBxTxgSqMH58K2sU3E4uKIBMsjO-H8zHnwh_pinqyEiB-T0Zrm_LkRxcT2mkaH08Az3H46vVPfREWBsCRnRUjvQRTLl-G-bF0givQ8c5zx8z4pg9mfYwGQ3DKfPTg5_sHeSZYD5thud_FC5UZZS1-womP0f6WN5YXAeIvq9CpX7ZrjWBwbEJg0FgKA40yq6sIBaTFCsu1sKk1Gm-M1iaTmRMJN1ZTLvZEV7NIJqlxPEvRoIwN4pc1KOXd3K0D4zhsFYQM2kkTi8xqbqsuSWSIVnUaZboMp0N2KTPIKU5HWzwpv7YdS4UsVPjVijisiMNlOBo16RUJNX4jPqS6gVi9_Ea4P0HYvGyr2l3rm0D1bFaGveFYKhQiWhnRueu-Yr-IQ9GuE1KUIfKD_Pe7qVqrE57X8VaGG_9qtQuzjXbrRt00b683YQ5phA-l5FtQ6j-_um2EO_10x__NX1F__A8 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NahsxEB6cFEp6KP1JqdM_NYQeAtvEuyt5dWztmLiN3RxiyE1oJS0Uwto0ziG3PkKfsU_Sb7S2Y1NIoZdF0o7ErqTRfDMajYgOvOtkSmdVEgJ0kxwaQVKmLiQqDRDXtrTasb1jNFank_zLpbxsUX95FqaJD7EyuDFnxPWaGTzMfNUonDkHyfwe5gl7fECEyY_Hik_xPcglJCLHd87Pl-uxlCpe6Qo52UmA34vV3qY--quJDem0hdcbwHMdvkb5M3hCjxfAUXxqRvoptUL9jB6thRN8TpNoPA_CrR_6ED76aAiAUxG9B3___MWWCTFDNaTnUzw4LThq8RUWPsHnW25F3TiIX-_SZHBy0TtNFtcmJA7KUppY8KztAgpojwIvrfKldxYZZ62rdBVUIZ23HIu9sN0q00XpgqxKKJS5A355Qdv1tA4vSUgMWweQwQbtclV5K303FIVOoVWXWWXbdLzsLuMWMcX5aosrE_e2c23QhQZ_bbiHDfdwmw5XVWZNQI37iD9w2YKtru8j3N8gHJ5cmN630R2Bwdxp0_vlWBowEe-M2DpMb9AucCj0OqVVm7I4yP_-NtMbTdLPA2R1uvdftd7Rw_P-wJwNx19f0Q5IVPSklK9pe_7jJrwB2pmXb-Nk_gMRgfue |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+communication+design+for+multi-user+peer-to-peer+wireless+relay+networks&rft.jtitle=IET+communications&rft.au=Xiangwu%2C+Gong&rft.au=Hang%2C+Long&rft.au=Feihong%2C+Dong&rft.au=Hao%2C+Yin&rft.date=2016-05-05&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=7&rft.spage=770&rft.epage=777&rft_id=info:doi/10.1049%2Fiet-com.2015.0609&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |