Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications

Zheng Chu, Kanapathippillai Cumanan, Mai Xu, Zhiguo Ding

Research output: Journal PublicationArticlepeer-review

45 Citations (Scopus)

Abstract

In the present study, the authors investigate robust secrecy rate optimisation problems for a multiple-inputsingle-output secrecy channel with multiple device-to-device (D2D) communications. The D2D communication nodes access this secrecy channel by sharing the same spectrum, and help to improve the secrecy communications by confusing the eavesdroppers. In return, the legitimate transmitter ensures that the D2D communication nodes achieve their required rates. In addition, it is assumed that the legitimate transmitter has imperfect channel state information of different nodes. For this secrecy network, the authors solve two robust secrecy rate optimisation problems: (a) robust power minimisation problem, subject to the probability based secrecy rate and the D2D transmission rate constraints; (b) robust secrecy rate maximisation problem with the transmit power, the probabilistic based secrecy rate and the D2D transmission rate constraints. Owing to the non-convexity of robust beamforming design based on two statistical channel uncertainty models, the authors present two conservative approximation approaches based on 'Bernsteintype' inequality and 'S-Procedure' to solve these robust optimisation problems. Simulation results are provided to validate the performance of these two conservative approximation methods, where it is shown that 'Bernstein-type' inequality based approach outperforms the 'S-Procedure' approach in terms of achievable secrecy rates.

Original languageEnglish
Pages (from-to)396-403
Number of pages8
JournalIET Communications
Volume9
Issue number3
DOIs
Publication statusPublished - 12 Feb 2015
Externally publishedYes

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications'. Together they form a unique fingerprint.

Cite this