“…4The CSI associated with all links are fully known at a central node. This is a common assumption in some related works including [10][11][12][13][17][18][19]. This is a realistic assumption when all nodes are registered nodes of the network.…”
Section: System Modelmentioning
confidence: 98%
“…The mutual information in (11) can be formulated as (see (12)) (see (13)) (see (14)) (see 15)where p 1 and p 2 are the powers of x 1 and x 2 , respectively. Also, due to the half-duplex relaying mode, the coefficient 1/2 is being used.…”
Section: System Modelmentioning
confidence: 99%
“…Recently, many researches have been done on the physical layer security in one-way relay-assisted cooperative networks employing the AF strategy [10][11][12][13]. Also, there have been a tremendous demand to employ two-way bandwidth efficient communication protocols to enhance the spectral efficiency [14].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, since multi-antenna multi-relay network yields an additional improvement through providing more degrees of freedom, some works are devoted to investigate cooperative relaying strategies [12,17,18]. This motivated us to pursue addressing the same issue in a two-way relay network as is depicted in Fig.…”
“…4The CSI associated with all links are fully known at a central node. This is a common assumption in some related works including [10][11][12][13][17][18][19]. This is a realistic assumption when all nodes are registered nodes of the network.…”
Section: System Modelmentioning
confidence: 98%
“…The mutual information in (11) can be formulated as (see (12)) (see (13)) (see (14)) (see 15)where p 1 and p 2 are the powers of x 1 and x 2 , respectively. Also, due to the half-duplex relaying mode, the coefficient 1/2 is being used.…”
Section: System Modelmentioning
confidence: 99%
“…Recently, many researches have been done on the physical layer security in one-way relay-assisted cooperative networks employing the AF strategy [10][11][12][13]. Also, there have been a tremendous demand to employ two-way bandwidth efficient communication protocols to enhance the spectral efficiency [14].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, since multi-antenna multi-relay network yields an additional improvement through providing more degrees of freedom, some works are devoted to investigate cooperative relaying strategies [12,17,18]. This motivated us to pursue addressing the same issue in a two-way relay network as is depicted in Fig.…”
“…Accordingly, a tremendous amount of research is devoted to exploring effective transmission strategies in such networks to enhance the secrecy rate problem. [11][12][13][14] The works in Mirzaee et al, 15,16 extended the problem to a more general case of incorporating multiple multi-antenna relays and some single-antenna eavesdroppers. In work of Jenog et al, 17 studied the problem of joint transmit and relay beamforming vectors in terms of maximizing the achievable secrecy rate in multi-antenna Amplify and Forward (AF) relay-assisted one-way network with a direct transmitter-to-receiver link.…”
The physical layer security of a two‐way relay network (TWRN) in the presence of an eavesdropper is considered, where two multi‐antenna nodes try to exchange messages via a multi‐antenna two‐way relay node. It is assumed that the transmission occurs in two hops. Throughout the first hop, the messages are concurrently transmitted at the same time from two transmitting nodes to the relay, while an eavesdropper tries to overhear the signals. Throughout the second hop, to prevent eavesdropping, the relay broadcasts a combination of the received signals in the null‐space of the eavesdropper's channel gain vector. The objective is to explore the proper power allocation policy at transmitting ends as well as an effective beamforming strategy at the relay to address the secrecy rate balancing (SRB) problem. The radio frequency multiple‐input multiple‐output (RF‐MIMO) architecture design is proposed in which the relay can merely process one data stream; hence, the relay beamforming matrix is of rank‐one. The underlying problem is non‐convex. To tackle this issue, the original problem is divided into two sub‐problems, where using semi‐definite relaxation (SDR) and sequential parametric cone approximation (SPCA) techniques, are converted into convex forms, where suboptimal solutions are derived. Numerical results demonstrate effectiveness of the proposed method compared to the existing works addressed in the literature and also show that our proposed solution has better performance even for the secrecy energy efficiency (SEE) metric.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.