Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Secure Relay Beamforming over Cognitive Radio Channel

Introduction Channel Model Main Results

Mathematical Formulation

Junwei Zhang and Mustafa Cenk Gursoy

Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

University of Nebraksa-Lincoln

March 23 2011

Outline Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

1 Introduction

Channel Model Main Results 2 Mathematical Formulation

Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels 3 Multiple Primary Users and Eavesdroppers 4 Numerical Results

Channel Model Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

We consider a relay channel scenario in a cognitive radio channel with a secondary user source S, a primary user P, a secondary user destination D, an eavesdropper E , and M relays {Rm }M m=1

Related Studies Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

Physical layer security has been studied in Gaussian channels, fading channels, multi-anterna and multi-user channels. Collaborative-relay beamforming in perfect CSI and imperfect CSI [G.Zheng et al., 2009]. Secrecy relay beamfoming under total relay power constraint [L.Dong et al., 2008, 2009]. Relay beamforming under individual relay power constraint [J.Zhang et al., 2010]. Secure communication over MISO Cognitive Radio Channels[Y. Pei et al., 2010].

Main Results Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

We investigate the collaborative relay beamforming under secrecy constraints in the cognitive radio network. The secrecy rate of the secure amplify and forward cognitive radio channel is first characterized, which is a quasiconvex optimization problem which can be solved through convex semidefinite program(SDP). We also propose two sub-optimal null space beamforming schemes.

Transmit and Receive Relationship Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

The received signal at Rm yr ,m = gm xs + ηm The relay output can be written as 1 , xr ,m = wm lm (gm xs + ηm ). ∼ lm = p 2 |gm | Ps + Nm The received signals at the destination D ,eavesdropper E and the primary user P is,

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

yd =

M X

hm wm lm (gm xs + ηm ) + n0 ,

m=1

ye =

M X

zm wm lm (gm xs + ηm ) + n1 .

m=1

yp =

M X m=1

km wm lm (gm xs + ηm ) + n2 .

Secrecy Rate Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation

The secrecy rate is now given by Rs = I(xs ; yd ) − I(xs ; ye ) PM 2 2 2 m=1 |zm | lm |wm | Nm + N0 = log PM × 2 2 2 m=1 |hm | lm |wm | Nm + N0 ! PM PM | m=1 hm gm lm wm |2 Ps + m=1 |hm |2 lm2 |wm |2 Nm + N0 . PM PM | m=1 zm gm lm wm |2 Ps + m=1 |zm |2 lm2 |wm |2 Nm + N0 The interference at the primary user is

Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

Λ=|

M X m=1

km gm lm wm |2 Ps +

M X

|km |2 lm2 |wm |2 Nm .

m=1

we address the joint optimization of {wm } that maximizes the secrecy rate in and maintain the interference on the primary user under the certain threshold Λ ≤ γ. γ is the interference temperature limit.

Beamforming Design Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

Let us define ∗ ∗ hg = [h1∗ g1∗ l1 , ..., hM gM lM ]T , ∗ ∗ hz = [z1∗ g1∗ l1 , ..., zM gM lM ]T , ∗ ∗ hk = [k1∗ g1∗ l1 , ..., kM gM lM ]T , 2 Dh = Diag(|h1 |2 l12 N1 , ..., |hM |2 lM NM ), 2 Dz = Diag(|z1 |2 l12 N1 , ..., |zM |2 lM NM ), and 2 Dk = Diag(|k1 |2 l12 N1 , ..., |kM |2 lM NM ).

Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

Denote t1 =

N0 +tr ((Dh +Ps hg hg † )ww† ) , t2 N0 +tr ((Dz +Ps hz hz † )ww† )

=

N0 +tr (Dz ww† ) , N0 +tr (Dh ww† )

and define

X , ww† Using SDR(drop the rank one constraint ), we can express the optimization problem as max

X,t1 ,t2

t1 t2

s.t tr (X (Dz − t2 Dh )) ≥ N0 (t2 − 1)     tr X Dh + Ps hg hg † − t1 Dz + Ps hz hz † ≥ N0 (t1 − 1)    tr X Dk + Ps hk hk † ≤γ and diag(X) ≤ p, (and/or tr (X) ≤ PT ) and

X  0.

Beamforming in the Null Space of Eavesdropper’s channel Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

We choose w to lie in the null spaces of hz , With this assumption, we eliminate E ’s capability of eavesdropping on D. this is equivalent to PMathematically, M | m=1 zm gm lm wm |2 = |hz † w|2 = 0, which means w is in the null space of hz † . ⊥ We can write w = H⊥ z v, where Hz denotes the projection † matrix onto the null space of hz . Specifically, the columns of H⊥ z are orthonormal vectors which form the basis of the null space of hz † . In our case, H⊥ z is an M × (M − 1) matrix.

The total power constraint become † ⊥ † w† w = v† H⊥ z Hz v = v v ≤ PT . The individual power ⊥ 2 constraint becomes |Hz v| ≤ p

Beamforming in the Null Space of Eavesdropper’s channel Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

With these notations,under null spaces beamforming assumption Γe is zero, we only need to maximize the Γd †

Γd =

† ⊥ Ps v† H⊥ z hg hg Hz v †

⊥ v† H⊥ z Dh Hz v + N0

The interference on primary user is now computed as, †

Introduction



† ⊥ † ⊥ ⊥ Λ = Ps v† H⊥ z hk hk Hz v + v Hz Dk Hz v

Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

and now we define X , vv we can express the optimization problem as max

t    † † ⊥ ⊥† ⊥ s.t tr X Ps H⊥ ≥ N0 t z hg hg Hz − tHz Dh Hz   †  † ⊥ ⊥ ⊥† ≤γ tr X H⊥ z Dk Hz + Ps Hz hk hk Hz X,t



⊥ and diag(H⊥ z XHz ) ≤ p, (and/or tr (X) ≤ PT ) and

X  0.

Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

In this scheme we choose w to lie in the null spaces of hz and hP k , Mathematically, this is equivalent to M | m=1 zm gm lm wm |2 = |hz † w|2 = 0, PM | m=1 km gm lm wm |2 = |hk † w|2 = 0. ⊥ We can write w = H⊥ z,k v, where Hz,k denotes the projection † matrix onto the null space of hz and hk † . Specifically, the columns of H⊥ z are orthonormal vectors which form the basis of the null space. In our case, H⊥ z is an M × (M − 2) matrix. The total power constraint become † ⊥ † w† w = v† H⊥ z,k Hz,k v = v v ≤ PT . The individual power ⊥ constraint becomes |Hz,k v|2 ≤ p.

Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels Secure Relay Beamforming over Cognitive Radio Channel

Under this assumption, the interference on the primary user is reduced to the gaussian noise at relay passing to primary user.

Junwei Zhang and Mustafa Cenk Gursoy

Λ=

M X



⊥ |km |2 lm2 |wm |2 Nm = v† H⊥ z,k Dk Hz,k v.

m=1 Introduction Channel Model Main Results

Then the optimization problem becomes

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

max

t    † † ⊥ ⊥ ⊥ † ≥ N0 t s.t tr X Ps H⊥ z,k hg hg Hz,k − tHz,k Dh Hz,k    † ⊥ tr X H⊥ ≤γ z,k Dk Hz,k X,t



⊥ and diag(H⊥ z,k XHz,k ) ≤ p, (and/or tr (X) ≤ PT ) and

X  0.

Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

When γ is not very small, as we have only aggregate noise at primary user. Then the interference constraint Λ ≤ γ should be trivially satisfied. When we drop this constraint and assume that the relays operate under the total power constraint expressed as v† v ≤ PT , we can get the close form solution as follows, †

max

† ⊥ Ps v† H⊥ z hg hg Hz v †

⊥ v† H⊥ z Dh Hz v + N0   N0 † ⊥ ⊥† ⊥† ⊥ = Ps λmax Hz hg hg Hz , Hz Dh Hz + I PT

v† v≤Pt

Hence, the maximum secrecy rate is achieved by the optimal beamforming vector vopt = ςu where u is the eigenvector that corresponds to  † † ⊥ N0 ⊥† ⊥ λmax H⊥ h h H , H D H + I and ς is chosen to ensure g g h z z z z PT † vopt vopt = PT .

Optimal Beamforming Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction

The discussion of optimal beamforming can be easily extent to the case of more than one primary user in the network. Since each primary user corresponds to the predefined interference constraint Γi ≤ γi which can be straightforwardly added.

Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

It cannot be easily extended to the multiple-eavesdropper case. In this case, the secrecy rate for AF relaying is Rs = I(xs ; yd ) − max I(xs ; ye,i ) i

In this scenario, the objective function cannot be expressed in the form given before.

Null Space Beamforming Secure Relay Beamforming over Cognitive Radio Channel Junwei Zhang and Mustafa Cenk Gursoy

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

On the other hand, the null space beamforming schemes can be extended to multiple primary users and eavesdroppers given that the number of relay nodes is greater than the number of eavesdroppers or the total number of eavesdroppers and primary users depending on which null space beamforming is used. The reason of this is to make sure the projection matrix H⊥ is exists. If we want H⊥ in the null space of i channels, the dimension of H⊥ will be M ∗ (M − i).

Numerical Result Secure Relay Beamforming over Cognitive Radio Channel

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

10 9 secrecy rate (bits/symbol)

Junwei Zhang and Mustafa Cenk Gursoy

11

8 7 6

Total Power Constraint, Optimal Individual Power Constraint, Optimal Total Power Constraint, BNE Individual Power Constraint, BNE Total Power Constraint, BNEP Individual Power Constraint, BNEP

5 4 3

0

5

10 PT/Ps

15

Figure: AF secrecy rate vs. PT /Ps . σg = 10, σh =, σz = 1, σk = 1, M = 10, γ = 0dB.

20

Numerial Result Secure Relay Beamforming over Cognitive Radio Channel

Introduction Channel Model Main Results

Mathematical Formulation

Total Power Constraint, Optimal Individual Power Constraint, Optimal Total Power Constraint, BNE Individual Power Constraint, BNE Total Power Constraint, BNEP Individual Power Constraint, BNEP

10 9 secrecy rate (bits/symbol)

Junwei Zhang and Mustafa Cenk Gursoy

11

8 7 6 5

Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

4 3

0

5

10 PT/Ps

15

Figure: AF secrecy rate vs. PT /Ps . σg = 10, σh = 1, σz = 2, σk = 4, M = 10, γ = 10dB.

20

Numerial Result Secure Relay Beamforming over Cognitive Radio Channel

Introduction Channel Model Main Results

Mathematical Formulation Optimal Beamforming Beamforming in the Null Space of Eavedropper’s Channel Beamforming in the Null Space of Eavesdropper’s and Primary User’s channels

Multiple Primary Users and Eavesdrop-

5.5 secrecy rate (bits/symbol)

Junwei Zhang and Mustafa Cenk Gursoy

6

5

4.5

4

Total Power Constraint, Optimal Individual Power Constraint, Optimal Total Power Constraint, BNE Individual Power Constraint, BNE Total Power Constraint, BNEP Individual Power Constraint, BNEP

3.5

3 −20

−15

−10

−5

0 γ

5

10

15

Figure: AF secrecy rate vs. interference temperature γ. σg = 10, σh = 2, σz = 2, σk = 4, M = 10, Ps = PT = 0dB.

20

Secure Relay Beamforming over Cognitive Radio ...

Mar 23, 2011 - ww† Using SDR(drop the rank one constraint ), we can express the optimization problem as max. X,t1,t2 t1t2. s.t tr (X (Dz − t2Dh)) ≥ N0(t2 − 1).

496KB Sizes 2 Downloads 225 Views

Recommend Documents

Robust Beamforming in Cognitive Radio
commission (FCC) [1], spectrum utilization depends very much upon place and time and yet most ... exploited by CR [5], but higher spectrum utilization is antici- pated if coexistence between the primary (PU) and ... achieve various objectives, such a

Cognitive Amplify-and-Forward Relay Networks Over ...
Engineering, Trivandrum, for help with part of computer simulations. The author would ... DS/CDMA systems: Cramer Rao bounds and least squares algorithms,”.

Collaborative Relay Beamforming for Secrecy
Conclusion. SDR Approach. Using the definition X ww†, we can rewrite the optimization problem in as max. X. N0 + tr(hh†X). N0 + tr(zz†X). s.t diag(X) ≤ p.

Collaborative-Relay Beamforming With Perfect CSI - IEEE Xplore
particular, we optimize the relay weights jointly to maximize the received signal-to-noise ratio (SNR) at the destination terminal with both individual and total ...

Two-hop secure communication using an untrusted relay - WCAN@PSU
wireless communication systems from the physical layer up. Prominent such examples include using multiple antennas to steer the transmitted ...... noise,” in Proceedings of the 62nd IEEE Vehicular Technology. Conference (VTC '05), vol.

Robust Cognitive Beamforming With Bounded Channel ...
IEEE 802.22 Wireless Regional Area Networks (WRANs) for license-exempt ... of Technology (KTH), SE-100 44 Stockholm, Sweden. He is also with secu-.

Cognitive Radio Infrastructure using Spectrum ...
Abstract: Cognitive radio is an amazing technology that allows low cost voice and data services by identifying opportunities in spectrum, space, code and time.

Two-hop secure communication using an untrusted relay
wireless communication systems from the physical layer up. Prominent such ... eavesdropper [8, 10, 17], and taking advantage of variations in channel state to ...

Cognitive Fixed-Gain Amplify-and-Forward Relay ...
Jan 1, 2013 - between the two SNR terms, which is cumbersome for the analysis. By taking into ..... the exponential decay model, i.e. ΩA,B = dA,B. −η . Here ...

Real-time Transmission of Layered MDC Video over Relay ... - IJRIT
To enable seamless and uninterrupted real time multimedia transmission to ..... End-to-end delay refers to the time taken for a packet to be transmitted across a ...

Real-time Transmission of Layered MDC Video over Relay ... - IJRIT
MDC generates multiple descriptions of the same source data that can be ... In this paper, we propose a system for real-time video streaming to mobile users, via ...

Secure Cooperative Visualization and Verification over Internet for ...
Secure Cooperative Visualization and Verification over Internet for Decision ..... modem at different hours and different internet providers. Tests have been ...

Demonstration of Real-time Spectrum Sensing for Cognitive Radio
form factor (SFF) software defined radio (SDR) development platform (DP) [7] is ..... [5] Y. Tachwali, M. Chmeiseh, F. Basma, and H. Refai, “A frequency agile.

On Outage and Interference in 802.22 Cognitive Radio ...
interference free transmission. This is .... Or an alternative definition can be given as,. PP N ... tually generated by MATLAB simulation of expression derived in.

Joint Scheduling and Flow Control for Multi-hop Cognitive Radio ...
Cognitive Radio Network with Spectrum Underlay ... multi-hop CRN overlay with a primary network in [2]. .... network can support in sense that there exists a.

Building A Cognitive Radio Network Testbed
There have been some wireless network testbeds, such as the open access research testbed for next-generation wireless networks (ORBIT) [13] and the ...

reconfigurable antennas for sdr and cognitive radio
and WiMAX (again, several bands are proposed). Many of these systems will be required to operate simultaneously. Multi-mode, multi-band operation presents a formidable challenge to mobile phone designers, particularly for the RF parts. Of these, the

Building A Cognitive Radio Network Testbed
We are building a CRN testbed at Tennessee Technological. University. ... with 48 nodes [15], which is an exciting advance in this area. ..... Education, 2007, pp.

pdf-175\cognitive-radio-and-networking-for-heterogeneous-wireless ...
... apps below to open or edit this item. pdf-175\cognitive-radio-and-networking-for-heterogeneo ... visions-for-the-future-signals-and-communication-t.pdf.

Prediction of Channel State for Cognitive Radio ... - Semantic Scholar
Department of Electrical and Computer Engineering ... in [10]. HMM has been used to predict the usage behavior of a frequency band based on channel usage patterns in [11] for ..... range of 800MHz to 2500MHz is placed near the laptop and.

A Two-Tiered Cognitive Radio System for Interference ...
scheme; the number of device types to be detected; and ... The wireless communication industry has grown rapidly .... Bluetooth devices, cordless phones, and.