“…Finally, Fig. 8 compares the result of GRBF method with two related works proposed in [15, 18] which, respectively, study the secrecy rate of multiple single‐input–single‐output relays and single MIMO relay networks with total power constraint at the relay(s). As is illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…8, the proposed approach yields better performance w.r.t. to the works done in [15, 18] in terms of the secrecy rate as the related search space of the proposed work is carried out over larger dimension.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Second, assuming there is an uncertainty region for the eavesdropper's channel and the worst‐case secrecy rate is maximised. In [18], a cooperative communication network with one MIMO AF relay and multiple eavesdroppers is studied, where it is assumed that the perfect channel state information of all links are available at the relay node. In this paper, the beamforming matrix at the relay is found to maximise the achievable secrecy rate.…”
“…Finally, Fig. 8 compares the result of GRBF method with two related works proposed in [15, 18] which, respectively, study the secrecy rate of multiple single‐input–single‐output relays and single MIMO relay networks with total power constraint at the relay(s). As is illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…8, the proposed approach yields better performance w.r.t. to the works done in [15, 18] in terms of the secrecy rate as the related search space of the proposed work is carried out over larger dimension.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Second, assuming there is an uncertainty region for the eavesdropper's channel and the worst‐case secrecy rate is maximised. In [18], a cooperative communication network with one MIMO AF relay and multiple eavesdroppers is studied, where it is assumed that the perfect channel state information of all links are available at the relay node. In this paper, the beamforming matrix at the relay is found to maximise the achievable secrecy rate.…”
“…4The CSI associated with all links are fully known at a central node. This is a common assumption in some related works including [10][11][12][13][17][18][19]. This is a realistic assumption when all nodes are registered nodes of the network.…”
Section: System Modelmentioning
confidence: 98%
“…Recently, many researches have been done on the physical layer security in one-way relay-assisted cooperative networks employing the AF strategy [10][11][12][13]. Also, there have been a tremendous demand to employ two-way bandwidth efficient communication protocols to enhance the spectral efficiency [14].…”
The physical layer security of a two‐way relay network (TWRN) in the presence of an eavesdropper is considered, where two multi‐antenna nodes try to exchange messages via a multi‐antenna two‐way relay node. It is assumed that the transmission occurs in two hops. Throughout the first hop, the messages are concurrently transmitted at the same time from two transmitting nodes to the relay, while an eavesdropper tries to overhear the signals. Throughout the second hop, to prevent eavesdropping, the relay broadcasts a combination of the received signals in the null‐space of the eavesdropper's channel gain vector. The objective is to explore the proper power allocation policy at transmitting ends as well as an effective beamforming strategy at the relay to address the secrecy rate balancing (SRB) problem. The radio frequency multiple‐input multiple‐output (RF‐MIMO) architecture design is proposed in which the relay can merely process one data stream; hence, the relay beamforming matrix is of rank‐one. The underlying problem is non‐convex. To tackle this issue, the original problem is divided into two sub‐problems, where using semi‐definite relaxation (SDR) and sequential parametric cone approximation (SPCA) techniques, are converted into convex forms, where suboptimal solutions are derived. Numerical results demonstrate effectiveness of the proposed method compared to the existing works addressed in the literature and also show that our proposed solution has better performance even for the secrecy energy efficiency (SEE) metric.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.