# Cooperative beamforming for physical-layer security in power-constrained wireless sensor networks with partial relay selection.

1. IntroductionWireless sensor networks (WSNs) provide efficient data acquisition and processing solutions for various applications such as factory automation, environment monitoring, and battlefield reconnaissance. Cooperative communication is a popular technique in WSNs to improve system reliability and throughput as sensor nodes are usually equipped with single antenna and the destination node might be out of the coverage of the source node. However, the broadcast nature of wireless medium brings not only the feasibility of sensor cooperation, but also the vulnerability to wiretapping. Although cryptographic techniques are widely used in modern communication systems, information leakage is still likely to happen if brute-force attack occurs. Hence, it is necessary to further enhance the overall system confidentiality through physical-layer security (PLS) schemes.

Wyner pioneered the study of PLS by proving that it is possible to communicate safely without a secret key in a degraded broadcast channel [1]. His results were extended to nondegraded channels [2] and Gaussian wiretap channels [3] in 1978 and were further extended to general fading wiretap channels in 2008 [4]. PLS has exerted a tremendous interest on a growing number of researchers ever since. Recently, a lot of attention has been drawn to the improvement of secrecy capacity (which is defined in [3] as the difference between the capacity of the legitimate link and that of the wiretapping link) by incorporating relays [5-9] and performing beamforming [7-12].

Beamforming technique is widely used in relay systems [13-15] as an effective way to improve the received signal-to-noise ratio (SNR) at the destination. The core idea of applying beamforming in traditional relay systems without security concerns is to exploit the magnitudes and phases of the relay-to-destination channels and accordingly adjust the transmit powers and phases of the signals that are to be transmitted from several relays bearing a common message, so as to combine the signals at the destination constructively [14]. However, for relay systems with security concerns, the beamforming technique needs to exploit the channel information of both the destination and the eavesdropper. And the objective is no longer the received SNR at the destination but the secrecy capacity.

Among the aforementioned works in the area of beamforming for PLS purposes, [7] studied beamforming schemes for decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming where all available relays were adopted, either to retransmit the source signal or to send an artificial noise to confound the eavesdropper. Null-space beamforming was proposed in [8] to hide the information signal in the null-space of the relay-eavesdropper channel. These beamforming schemes were designed with perfect channel information of the wiretapping link while in [9, 11, 12, 16,17], the authors proposed their schemes based on imperfect channel information or even no channel information of the wiretapping link. Although the assumption of imperfect channel information or even no channel information of the wiretapping link is more practical, the models in these papers do not accord with WSNs since sensors are usually equipped with single antenna. Besides, relay-selection (RS) strategies have also been studied in [5, 6] where the single best relay that can provide the maximal secrecy capacity or minimal secrecy outage probability is selected. Although the bestrelay-selection strategy is easy to deploy, it sacrifices some security performance. It will be pointed out that although the models and assumptions of the relay/multiantenna systems are different, a common conclusion that system security improves with the increase of relay/antenna number and relay/antenna transmit power can be drawn.

The above existing studies that exploit relays to enhance system security are designed with only consideration of transmit power. No attention was paid to circuit power consumption (CPC) which is indispensable for relays to drive the circuit blocks. As a matter of fact, in a WSN, the dense distribution of sensors allows them to transmit with a low power that might be comparable to or even overwhelmed by the circuit power, which makes the negligence of CPC improper. Furthermore, the sensor nodes are usually powered by batteries which provide energy for both signal transmission and processing. Hence, the traditional power constraints need to be modified in a WSN. The consequence of incorporating CPC is that the increase of relay number means the decrease of relay transmit power; thus, it is unclear whether system security still can be improved if more relays are adopted. In fact, [18-20] have revealed that, in multiantenna/cooperative systems without eavesdroppers, using more antennas/relays might degrade the system performance if the total power is constrained. However, no existing work considering CPC takes system security as a metric of interest. This motivates us to reveal whether the same result exists in a security-oriented cooperative WSN and how to select the best relays if it does.

The main contribution of our work can be described as follows. We take CPC into account to perform cooperative beamforming, whereas existing literature on the cooperative beamforming aided PLS fails to consider the CPC. Our work shows that when CPC is considered, adopting more relays may degrade the secrecy capacity performance, which, to the best of our knowledge, has not been revealed by any previous work. It is thus important but challenging to determine which relays should be selected to form an optimal beamforming vector. Although the exhaustive-search approach is effective in finding the optimal relays, its computational complexity grows exponentially with the number of relays. To this end, we propose a relay-ordering based beamforming scheme which has only a linear computational complexity but achieves nearly the same security performance as the exhaustive-search aided beamforming scheme does.

The remainder of this paper is organized as follows. Section 2 establishes the system model along with the total power constraint which includes both transmit power and circuit power. Section 3 first updates the conventional all-relay based and best-relay based beamforming schemes by incorporating CPC and then proposes two partial-relay-selection based beamforming schemes. In Section 4, the four schemes described in Section 3 are evaluated in terms of their secrecy capacity performance. Conclusions are drawn in Section 5.

2. System Model

Consider a cooperative WSN consisting of a source-destination pair with K helpers H = {[H.sub.i] | i = 1, 2, ..., K} and an eavesdropper as shown in Figure 1. Each node is equipped with single antenna working in half-duplex mode. Only the helpers that can successfully decode the source signal are considered as candidate relays. We define the collection of candidate relays as decoding set D = {[R.sub.i] | i = 1, 2, ..., M} [subset or equal to] H. The source-relay, relay-destination, and relay-eavesdropper channels are denoted by [h.sub.SR] = [([h.sub.SR,1], [h.sub.SR,2], ..., [h.sub.SR,M]).sup.T], [h.sub.RD] = [([h.sub.RD,1], [h.sub.RD,2], ..., [h.sub.RD,M]).sup.T] and [h.sub.RE] = ([h.sub.RE,1], [h.sub.RE,2], ..., [h.sub.RE,M], respectively. All the channels are independent and the channel between node A and node B follows a C N(0, [[sigma].sup.2.sub.AB]) distribution, where [[sigma].sup.2.sub.AB] = [([lambda]/4[pi][d.sub.AB]).sup.3.5] [G.sub.A][G.sub.B] with [lambda], [d.sub.AB], [G.sub.A], and [G.sub.B] representing the wavelength, the distance between A and B, the transmit antenna gain at A, and the receive antenna gain at B, respectively. The additive white Gaussian noises (AWGNs) are assumed to follow a C N(0, [[sigma].sup.2.sub.n]) distribution.

Note that many of the previous beamforming designs assumed perfect instantaneous channel state information (CSI) of both the legitimate link and the eavesdropping link. In practical scenarios, however, the eavesdropper is probably passive, so it might be difficult to attain its instantaneous CSI due to the absence of feedback. Hence, following [6, 16, 17], in this paper, we assume that only statistical information of the eavesdropping link is priorly known since it is possible that the location of the eavesdropper is roughly known.

In the first hop, the source transmits [square root of ([P.sub.s])]s, where s is normalized as E[[[absolute value of (s)].sup.2]] = 1 and Ps is the transmit power of the source node. In the second hop, each selected relay decodes its received signal, reencodes it, and then forwards a scaled version of the reencoded signal; that is, [R.sub.i] transmits [t.sub.i] = [w.sup.*.sub.i]s, where [w.sup.*.sub.i] represents the conjugate of [w.sub.i] and is the beamforming weight of [R.sub.i], and [P.sub.t,i] = [[absolute value of ([w.sub.i])].sup.2] is the transmit power. Denote the set of selected relays as [R.sub.s] [subset or equal to] D. Apparently, if [R.sub.i] [not member of] [R.sub.s], [w.sub.i] = 0.

The respective received signals at the destination and the eavesdropper can be expressed as

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (1)

where [v.sub.D] and [v.sub.E] are the AWGNs at the legitimate destination and the eavesdropper.

To obtain the total power constraint on relays with CPC included in a generic way, we divide the CPC of each relay into two parts, one of which is independent of the transmit power and the other of which is dependent. For [R.sub.i] [not member of] [R.sub.s], both parts are 0; for [R.sub.i] [member of] [R.sub.s], its CPC can be written as [P.sub.c,i] = [P.sub.0] + [P.sub.PA,i], where [P.sub.0] includes consumption terms of filters, mixers, and so on and PPA t is the consumption of the power amplifier. The terms in [P.sub.0] vary with different systems and are irrelative with [P.sub.t,i] whereas the relationship between [P.sub.PA,i] and [P.sub.t,i] is [P.sub.PA,i] = ([xi]/[eta] - 1)[P.sub.t,i], where [xi] is the peak to average ratio and [eta] is the drain efficiency [18]. The total power constraint on relays is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (2)

where [absolute value of (*)] is the cardinality. It is worth noticing that [absolute value of ([R.sub.s])] is also the number of nonzero elements in w; that is, [absolute value of ([R.sub.s])] = [[parallel]w[parallel].sub.0], where [[parallel]*[parallel].sub.0] is the 0-norm. Meanwhile, as has been mentioned in the previous section, secrecy capacity of a DF relay system grows with the total transmit power of relays. Hence, the optimal beamforming vector w satisfies

[w.sup.H]w = [P.sub.a] - [[parallel]w[parallel].sub.0] [P.sub.b], (3)

where [P.sub.a] = [eta]P/[xi], and [P.sub.b] = [eta][P.sub.0]/[xi]. Moreover, [[parallel]w[parallel].sub.0] needs to satisfy [[parallel]w[parallel].sub.0] [less than or equal to] N = [[P.sub.a]/[P.sub.b] - 1], where [*] is the ceil function, to avoid the impossible case that the whole power is consumed by circuitry.

3. Relay-Selection Based Beamforming Schemes for PLS

A widely used metric of interest in security-oriented systems is secrecy capacity [C.sub.s] = [([C.sub.D] - [C.sub.E]).sup.+], where [C.sub.D] and [C.sub.E] represent the capacity of the legitimate link and that of the eavesdropping link, respectively, and [(a).sup.+] = max(a, 0). However, since only statistical information of the eavesdropping link is assumed to be known, following [9, 16], we take the ergodic secrecy capacity over the distribution of the eavesdropper's CSI, that is, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], as the objective instead. From (1), it can be easily derived that

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (4)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (5)

where [V.sub.RE] = diag([[sigma].sup.2.sub.RE, 1], [[sigma].sup.2.sub.RE,2], ..., [[sigma].sup.2.sub.RE,M]) and (5) is derived after applying Jensen's Inequality to (4). Define

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (6)

then [C.sup.lb.sub.s] serves as the lower bound of [C.sup.er.sub.s]. Hence, the optimization problem can be written as

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (7)

which can be further recast as

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (8)

where M = [[sigma].sup.2.sub.n]I/([P.sub.a] - [absolute value of ([R.sub.s])][P.sub.b]) + [h.sub.RD][h.sup.H.sub.RD] and E = [[sigma].sup.2.sub.n]I/([P.sub.a] - [absolute value of ([R.sub.s])][P.sub.b]) + [V.sub.RE].

In order to prove that the optimal RS strategy is to select partial relays as well as for subsequent comparison purpose, we first update the conventional schemes where either all relays or only one best relay is selected, namely, the all-relay based and the best-relay based beamforming schemes; then we present the partial relay based schemes.

3.1. Conventional Beamforming Schemes for PLS

3.1.1. All-Relay Based Beamforming Scheme. Consider that all the candidate relays are selected to assist the source; that is, [absolute value of ([R.sub.s])] = M. The optimal beamforming solution is

[w.sub.all] = [square root of ([P.sub.a] - [MP.sub.b])][u.sub.max] ([E.sup.-1] M), (9)

where [u.sub.max](X) represents the unit-norm eigenvector of matrix X that corresponds to its largest eigenvalue [[lambda].sub.max](X). Substituting [w.sub.all] into (4), we have

[C.sup.lb.sub.s,all] = 1/2 log [[lambda].sub.max] ([E.sup.-1]M). (10)

This scheme only works when the power budget for relays is high enough to drive the circuit blocks in all M relays; that is, P > [MP.sub.0] needs to be satisfied.

3.1.2. Best-Relay Based Beamforming Scheme. Opportunistic relaying is also a common relaying strategy where only one best relay is selected. The best relay, say [R.sub.k], is selected as the one that maximizes [C.sup.lb.sub.s]; that is,

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (11)

The beamforming weight is [w.sub.k] = ([square root of ([P.sub.a] - [P.sub.b])]/ [absolute value of ([h.sub.RD,k])])[h.sub.RD,k].

Apparently, if [P.sub.0] < P [less than or equal to] 2[P.sub.0], only the best-relay based scheme can be applied. While in the case of P [much greater than] [MP.sub.0], according to the majorization theory [21], the eigenvalues of a positive semidefinite Hermitian matrix majorize the diagonal elements, thus,

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (12)

Hence, the all-relay based scheme becomes the better choice in this case. As a result, the best choice over the whole power range should be a partial RS based beamforming scheme that adjusts the selected relays and their weight vector according to the channels and the power budget. The next subsection is going to discuss how to select partial relays and design their weight vector.

3.2. Proposed Beamforming Schemes for PLS. The objective in (8) is a Rayleigh quotient [22]; to maximize it the eigenvalue decomposition (EVD) method is usually used. However, the argument in this objective is self-constrained. It is infeasible to directly use the EVD method on this problem. To break the self-constraint, we need to preassume the relays to be selected. For simplicity, we assume [absolute value of ([R.sub.s])] = m and denote the set of selected relays as [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. By dropping the nonselected relays, the corresponding legitimate channel and the variance matrix of the eavesdropping channel can be written as [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], respectively. Hence the optimization problem becomes

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (13)

where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. The objective achieves its maximal value

[C.sup.lb.sub.s] ([R.sub.s]) = 1/2 log [[lambda].sub.max] ([E.sup.-1.sub.s] [M.sub.s]) (14)

by adopting [w.sub.s] = [square root of ([P.sub.a] - m[P.sub.b])] [u.sub.max] ([E.sup.-1.sub,s [M.sub.s]]).

The next step is to determine the optimal relays to be selected; that is,

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (15)

3.2.1. Exhaustive-Search Based Beamforming Scheme. It is obvious that the only way to obtain the optimal value of [R.sub.s] is to do exhaustive search. Given the maximal possible number of selected relays min(M, N), the sample space of [R.sub.s] is [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (0 is clearly impossible to be the optimal value of [R.sub.s] unless no relay can successfully decode the source signal, in which case, the system achieves zero secrecy capacity). The exhaustive-search based beamforming scheme can be described in Algorithm 1.

Algorithm 1 (exhaustive-search based beamforming scheme). The algorithm is described as follows:

(1) For each [R.sub.i] [member of] [[OMEGA].sub.1], calculate [C.sup.lb.sub.s]([R.sub.i]) according to (14).

(2) The optimal set of relays is selected according to [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

(3) The optimal weight vector for [R.sub.sopt] is obtained as [w.sub.sopt] = [square root of ([P.sub.a] - [absolute value of ([R.sub.sopt])][P.sub.b]) [u.sub.max]([E.sup.- 1.sub.sopt] [M.sub.sopt]).

3.2.2. Relay-Ordering Based Beamforming Scheme. It will be noticed that the computational complexity of the exhaustive-search scheme is exponential in network size. To overcome this disadvantage, we introduce relay ordering into the RS strategy so that the computation will be significantly reduced.

If the received SNRs are high, the optimization problem in (13) is approximate to

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (16)

which yields

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (17)

where tr(*) represents the trace. Consequently, [[absolute value of ([h.sub.RD,i])].sup.2]/[[sigma].sup.2.sub.RE,i] is a feasible relay-ordering criterion. This criterion can be understood by looking into the definition of secrecy capacity. Enlarging secrecy capacity is equivalent to improving the capacity of the legitimate link whilst keeping the capacity of the eavesdropping link as low as possible. A large [[absolute value of ([h.sub.RD,i])].sup.2]/[[sigma].sup.2.sub.RE,i] indicates that the [R.sub.i]-destination channel is in relatively good condition, while the [R.sub.i]-eavesdropper distance is relatively large. Thus, adopting such a relay [R.sub.i] to forward the source signal is probably beneficial. In other words, the relay-ordering based beamforming scheme can be described in Algorithm 2.

Algorithm 2 (relay-ordering based beamforming scheme). The algorithm is described as follows:

(1) Order the candidate relays as [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

(2) Set [[OMEGA].sub.2] = {[R.sub.1], [R.sub.2], ..., [R.sub.min (M,N)]}, where [R.sub.m] = {[R.sub.1], [R.sub.2], ..., [R.sub.m]}; for each [R.sub.m], calculate [C.sup.lb.sub.s]([R.sub.m]) according to (14).

(3) The optimal set of relays is selected according to [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

(4) The optimal weight vector for [R.sub.sopt] is obtained as [w.sub.sopt] = [square root of ([P.sub.a] - [absolute value of ([R.sub.sopt])] [P.sub.b])] [u.sub.max]([E.sup.- 1.sub.sopt][M.sub.sopt]).

Remarks. (i) Firstly, although the relay-ordering criterion is obtained by assuming high received SNRs, if the interrelay distances are much smaller than the relay-eavesdropper distances (which is widely assumed in relay systems), the relay-ordering based scheme is indeed the optimal scheme. In this case, [h.sub.RE,i] ~ C N(0, [[sigma].sup.2.sub.RE]), the relay-ordering criterion becomes [[absolute value of ([h.sub.RD,i])].sup.2] and the maximal [C.sup.lb.sub.s] achieved by the relay-ordering based scheme is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (18)

Meanwhile, [C.sup.lb.sub.s] achieved by any set of relays [R.sub.s] with any beamforming weight [w.sub.s] is

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (19)

Apparently,

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (20)

(ii) Secondly, there are only min(M, N) possible combinations of relays in the relay-ordering based beamforming scheme, so the computational complexity is o(M) whereas the computational complexity of the exhaustive-search based beamforming scheme is o([2.sup.M]).

4. Simulation Results

This section examines the performance of the proposed schemes. For simplicity, some of the circuit blocks are omitted such as the encoder, decoder, and pulse shaping block. Analog-to-digital converter and digital-to-analog converter are also omitted since their power consumption is relative to the hardware type. The resulting [P.sub.o] can be written as [P.sub.o] = [P.sub.ot] + [P.sub.or], where [P.sub.ot] = [P.sub.filt] + [P.sub.mix] + [P.sub.syn] is the consumption of the blocks in the transmitting side and [P.sub.or] = [P.sub.LNA] + [T.sub.flir] + [P.sub.IFA] + [P.sub.mix] + [P.sub.syn] is the consumption of the blocks in the receiving side. The subscripts filt, mix, syn, LNA, filr, and IFA stand for filters at the transmitting side, mixer, frequency synthesizer, low noise amplifier, filters at the receiving side, and intermediate frequency amplifier. Using the parameters in [18], we have [P.sub.o] = 188.6 mW. Note that the value of [P.sub.o] can be changed to extend the above schemes to include some other circuit blocks.

The number of helpers is set to 4, so the sample space of D is [OMEGA] = {0, [D.sub.1], [D.sub.2], ..., [D.sub.15]}. The probability of D = [D.sub.m] is [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is the probability of occurrence of outage over the source-[H.sub.i] channel [5] and is set to [10.sup.-3] in our simulations. The helper-destination distances are set to 50 m and the helper-eavesdropper distances are set to d, 0.8d, 1.2d, and 1.5d, where d is the reference helper-eavesdropper distance to show the relationship between the number of selected relays and the eavesdropper's location by varying d. The modulation method is 4 QAM ([xi] = 1). The carrier frequency is 2.5 GHz and the antenna gains are 0 dB. The noise variance is modeled as [[sigma].sup.2.sub.n] = [N.sub.0]B, where [N.sub.0] = -174 dBm/Hz is the single-sided spectral density and B = 2 MHz is the channel bandwidth. Every data point is averaged over 10,000 independent channel realizations.

Figure 2 shows the relationship between the average number of selected relays and the power budget for relays with the eavesdropper in two different locations. Since the curves of the two proposed schemes are close to each other, we provide Table 1 as well, to show the percentage error of the average number of adopted relays in the relay-ordering based scheme as compared with the optimal number obtained in the exhaustive-search based scheme.

Notice that a total power budget of 29 dBm is enough to drive all the circuit blocks in all helpers. However, the average optimal number of relays obtained by exhaustive search is only 2.09 when d = 50 m and 1.66 when d = 200 m. It can also be seen from both Figure 2 and Table 1 that, in the case of small d, the two schemes show perfect match, while, in the case of large d, the two schemes have a slight difference, but only in medium power range. This difference is attributed to the growing deviation between (13) and (16) when d grows. However, in practice, the value of d is usually small since sensor nodes are densely distributed.

It is worth mentioning that, according to Figure 2, for a fixed power budget, the farther the eavesdropper is, the fewer relays we should adopt. This indicates that as the helper-eavesdropper distance increases, the benefit brought by the increase of transmit power surpasses that by the increase of relay number.

Figure 3 compares different schemes in terms of the secrecy capacity they achieve with d = 50 m. The results of the conventional schemes are illustrated for the purpose of benchmarking. The proposed schemes obviously outperform the conventional ones in the whole power range. To be specific, in low power range and high power range, the proposed schemes have the advantage of the best-relay based scheme and that of the all-relay based scheme, respectively, while in medium power range, they outperform the conventional schemes both. This figure also clearly states that if CPC is considered in the total power constraint, adopting more relays may degrade the system security.

5. Conclusion

We investigated beamforming schemes in a cooperative WSN for PLS with consideration of both transmit power and circuit power. We first revealed that the optimal beamforming scheme should be performed along with a partial RS strategy and then provided two partial RS based beamforming schemes, namely, the exhaustive-search based scheme and the relay-ordering based scheme, both of which adjust the selected relays dynamically according to the channels and the power budget. Simulation results show that our schemes combine the advantage of the all-relay based scheme in high power range and that of the best-relay based scheme in low power range. Moreover, the relay-ordering based scheme achieves almost the same secrecy capacity as the exhaustive-search based scheme does, but with a dramatically reduced computational complexity.

http://dx.doi.org/10.1155/2016/9740750

Competing Interests

The authors declare that they have no competing interests.

Acknowledgments

This work was supported by the Natural Science Foundation of China under Grants 61302101 and 61401223 and by the Graduate Innovation Plan of Jiangsu Province under Grant CXZZ12_0463.

References

[1] A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.

[2] I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, 1978.

[3] S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.

[4] P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, 2008.

[5] Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099-2111, 2013.

[6] W. Yang, S. Wang, and X. Xu, "Cooperative transmission for security enhancement in clustered wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2015, Article ID 751456, 7 pages, 2015.

[7] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2009.

[8] H.-M. Wang, Q. Yin, W. Wang, and X.-G. Xia, "Joint null-space beamforming and jamming to secure af relay systems with individual power constraint," in Proceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '13), pp. 2911-2914, Vancouver, Canada, May 2013.

[9] X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2140-2155, 2013.

[10] H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Transactions on Signal Processing, vol. 60, no. 7, pp. 3532-3545, 2012.

[11] X. Chen and H.-H. Chen, "Physical layer security in multi-cell MISO downlinks with incomplete CSI--a unified secrecy performance analysis," IEEE Transactions on Signal Processing, vol. 62, no. 23, pp. 6286-6297, 2014.

[12] H.-M. Wang, T. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading," IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 94-106, 2015.

[13] V. Havary-Nassab, S. Shahbazpanahi, A. Grami, and Z.-Q. Luo, "Distributed beamforming for relay networks based on second-order statistics of the channel state information," IEEE Transactions on Signal Processing, vol. 56, no. 9, pp. 4306-4316, 2008.

[14] R. Mudumbai, D. R. Brown III, U. Madhow, and H. V. Poor, "Distributed transmit beamforming: challenges and recent progress," IEEE Communications Magazine, vol. 47, no. 2, pp. 102-110, 2009.

[15] Y. Jing and H. Jafarkhani, "Network beamforming using relays with perfect channel information," IEEE Transactions on Information Theory, vol. 55, no. 6, pp. 2499-2517, 2009.

[16] P-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728-1740, 2013.

[17] M. Baldi, F. Chiaraluce, N. Laurenti, S. Tomasin, and F. Renna, "Secrecy transmission on parallel channels: theoretical limits and performance of practical codes," IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1765-1779, 2014.

[18] S. Cui, A. J. Goldsmith, and A. Bahai, "Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1089-1098, 2004.

[19] S. K. Jayaweera, "Virtual MIMO-based cooperative communication for energy-constrained wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 5, no. 5, pp. 984-989, 2006.

[20] Z. Zhou, S. Zhou, S. Cui, and J.-H. Cui, "Energy-efficient cooperative communication in a clustered wireless sensor network," IEEE Transactions on Vehicular Technology, vol. 57, no. 6, pp. 3618-3628, 2008.

[21] A. Marshall, I. Olkin, and B. Arnold, Inequalities: Theory of Majorization and Its Applications, Academic Press, New York, NY, USA, 2nd edition, 1979.

[22] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, Edity by A. Jeffrey and D. Zwillinger, Elsevier, San Diego, Calif, USA, 7th edition, 2007.

Mujun Qian, Chen Liu, and Yulong Zou

Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210003, China

Correspondence should be addressed to Chen Liu; liuch@njupt.edu.cn

Received 20 November 2015; Revised 25 February 2016; Accepted 6 March 2016

Academic Editor: Mario Collotta

Caption: FIGURE 1: A cooperative WSN in the presence of an eavesdropper. The relays in the decoding set are shaded. Solid line: legitimate link; dashed line: eavesdropping link.

Caption: FIGURE 2: Average number of selected relays versus total power budget.

Caption: FIGURE 3: Performance comparison of different beamforming schemes.

TABLE 1: Percentage error of the average number of adopted relays. P (in dBm) d (in m) 23 25 27 29 31 33 35 37 50 0% 0% 0% 0% 0% 0% 0% 0% 200 0% 0% 23.1% 4.1% 8.9% 6.0% 1.9% 1.6% P (in dBm) d (in m) 39 41 43 45 47 49 50 0% 0% 0% 0% 0% 0% 200 0.12% 0.14% 0% 0.07% 0.12% 0.01%

Printer friendly Cite/link Email Feedback | |

Title Annotation: | Research Article |
---|---|

Author: | Qian, Mujun; Liu, Chen; Zou, Yulong |

Publication: | International Journal of Distributed Sensor Networks |

Article Type: | Report |

Date: | Jan 1, 2016 |

Words: | 5155 |

Previous Article: | Semidefinite relaxation method for target localization by mimo radar using bistatic ranges. |

Topics: |