Transmit power minimization under secrecy capacity constraint in cooperative wireless communications

Jiangyuan Li, A. Petropulu, S. Weber

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

We consider a cooperative wireless network, and exploit node cooperation for achieving physical layer based security. The case of one source, multiple cooperating nodes and one eavesdropper is considered. Two different cooperation schemes are considered. In the first scheme, cooperating nodes transmit a weighted version of the source signal in a decode and forward fashion (DF). In the second scheme, while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper (cooperative jamming (CJ)). The objective is to select the node weights and the source transmit power so that the total transmit power (source transmission power plus cooperating nodes power) under a secrecy capacity constraint is minimized. Previous works related to this problem introduced additional constraints in order to reduce the degree of difficulty, thus resulting in suboptimal solutions. In this paper, the optimal solution is considered. In particular, the closed form solution is obtained for the DF scheme, while for the CJ scheme, the problem is reduced to a univariate optimization one. For the latter problem a convergent algorithm for obtaining the solution is provided.

Original languageEnglish (US)
Title of host publication2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09
Pages217-220
Number of pages4
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09 - Cardiff, United Kingdom
Duration: Aug 31 2009Sep 3 2009

Publication series

NameIEEE Workshop on Statistical Signal Processing Proceedings

Other

Other2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09
Country/TerritoryUnited Kingdom
CityCardiff
Period8/31/099/3/09

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Applied Mathematics
  • Signal Processing
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Transmit power minimization under secrecy capacity constraint in cooperative wireless communications'. Together they form a unique fingerprint.

Cite this