Relay beamforming strategies for physical-layer security

Junwei Zhang, Mustafa Cenk Gursoy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

74 Scopus citations

Abstract

In this paper, collaborative use of relays to form a beamforming system and provide physical-layer security is investigated. In particular, amplify-and-forward (AF) relay beamforming designs under total and individual relay power constraints are studied with the goal of maximizing the secrecy rates when perfect channel state information (CSI) is available. In the AF scheme, not having analytical solutions for the optimal beamforming design under both total and individual power constraints, an iterative algorithm is proposed to numerically obtain the optimal beamforming structure and maximize the secrecy rates. Robust beamforming designs in the presence of imperfect CSI are investigated for decode-and-forward (DF) based relay beamforming, and optimization frameworks are provided.

Original languageEnglish (US)
Title of host publication2010 44th Annual Conference on Information Sciences and Systems, CISS 2010
DOIs
StatePublished - Jun 24 2010
Externally publishedYes
Event44th Annual Conference on Information Sciences and Systems, CISS 2010 - Princeton, NJ, United States
Duration: Mar 17 2010Mar 19 2010

Publication series

Name2010 44th Annual Conference on Information Sciences and Systems, CISS 2010

Other

Other44th Annual Conference on Information Sciences and Systems, CISS 2010
CountryUnited States
CityPrinceton, NJ
Period3/17/103/19/10

Keywords

  • Amplify-and-forward relaying
  • Decode-and-forward relaying
  • Physical-layer security
  • Relay beamforming
  • Robust beamforming

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Relay beamforming strategies for physical-layer security'. Together they form a unique fingerprint.

  • Cite this

    Zhang, J., & Gursoy, M. C. (2010). Relay beamforming strategies for physical-layer security. In 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010 [5464970] (2010 44th Annual Conference on Information Sciences and Systems, CISS 2010). https://doi.org/10.1109/CISS.2010.5464970