Next Article in Journal
Infrared Spectroscopy for Studying Structure and Aging Effects in Rhamnolipid Biosurfactants
Previous Article in Journal
Surround by Sound: A Review of Spatial Audio Recording and Reproduction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay

1
College of Electrical Engineering and Automation, Shandong University of Science and Technology, Qingdao 266590, China
2
Department of Mathematics and Information Engineering, Dongchang College of Liaocheng University, Liaocheng 252000, China
*
Author to whom correspondence should be addressed.
Submission received: 21 March 2017 / Revised: 28 April 2017 / Accepted: 12 May 2017 / Published: 21 May 2017

Abstract

:
Due to the broadcast nature of wireless media, all nodes in the coverage of a transmitter are capable of capturing its signals, thus wireless transmission is sensitive to wiretapping. Several existing schemes place an emphasis on secrecy rate improvement, under the protocols of amplify-and-forward or decode-and-forward, when there are only relay users in the network. We set up a novel communication model in which normal and two-way relay users coexist in the same cell, taking the base station as a relay. Our objective is to maximize the total secrecy rate, taking subcarrier pairing, subcarrier assignment and power allocation into account, when there is one eavesdropper in one cell of the cellular network. Although this problem is very intricate, we reformulate it as a convex optimization problem by means of Lagrange duality. In order to reduce the computational complexity, equal power allocation is proposed. Lastly, the experimental results show the proposed resource allocation scheme can obtain a higher secrecy rate than traditional schemes.

1. Introduction

Security refers to the system resistance ability facing man-made threats such as wiretaps, attacks or tampering in the process of data transmission. With the continuous development of communication technology, security has become a main factor to measure the reliability of a communication system [1]. Due to the broadcasting characteristics of a wireless channel, the mobility of the wireless terminal and the instability of transportation, wireless communication systems are facing more security threats than traditional cable communication systems. Thus, communication privacy and information security in a wireless network has become an important factor demanding more attention, especially in fields such as military and national security. The purpose of secure communication is to ensure that legitimate users can receive source point information, while it prevents eavesdroppers in wireless networks from obtaining information [2]. The physical safety design is from the viewpoint of information theory, and makes good use of the physical characteristics of a wireless channel to achieve the purpose of transmitting information safely; such design ideas have attracted more and more attention from researchers.
Collaborative communication, for example, with the enrichment of physical layer transmission technology and physical security features, has been paid more and more attention [3]. In collaborative communication, the source point not only can broadcast information directly to the destination node, but can also complete information transmission to the destination node through the assistance of relay nodes, which use diversity gain to effectively overcome multipath fading and improve system performance. However, due to the broadcast feature of a wireless transmission environment, the eavesdropper not only can steal information through the link between itself and source point, but also can acquire information through the link between the relay node and eavesdropper, thus increasing the likelihood of information leakage and threatening the security of the system. How to design node collaboration solutions and resource allocation strategies to ensure secure communication to prevent eavesdropping on legal information in the physical layer has become the research focus in collaborative communication in recent years [4]. Joint relay and jammer selection for secure two-way relay networks was put forward by Chen [5]. Cooperating relays were used to improve the wireless physical layer security by Dong [6]. Secure resource allocation and scheduling was put forward by D. Ng [7] in Orthogonal Frequency Division Multiple Access (OFDMA) decode-and-forward relay networks. Under the premise of ensuring secrecy rate for primary users in cognitive radio networks, power allocation, time allocation, and relay selection problem [8] were investigated. For cases when there are one or more eavesdroppers [9], a different relay cooperation scheme was put forward to ensure safe communication between the source and the destination node. In particular, a cooperative jamming scheme was presented for a two-hop relay network [10]. Considering the limited power of the relay, a kind of cooperative jamming strategy coordination strategy was put forward in which each relay sends a weighted disturbance signal in order to reduce the eavesdropper channel quality [11]. Secure communications with untrusted secondary nodes in cognitive radio networks were put forward by H. Jeon [12]. In cognitive radio networks, a kind of relay selection scheme was put forward for physical layer [13]. Diversity techniques were used to improve physical layer security in wireless communications [14]. For the Multiple-Input Multiple-Output (MIMO) channel with a multiple antenna eavesdropper, the secrecy rate optimization problem was investigated by K. Cumanan [15]. In order to improve the secrecy rate, robust beamforming technology [16] was used in systems with wireless information and power transfer. When there was an untrusted intermediate relay, the system sum secrecy rate, in which cell-edge mobile stations transmit confidential messages to the base station, was maximized by means of power allocation [17]. When a multi-antenna base station simultaneously communicated with multiple potentially malicious users in the presence of randomly located external eavesdroppers, the achievable secrecy rate was studied [18]. A cognitive relay selection algorithm was put forward for secure communication in cognitive decode-and-forward relay networks against eavesdropping [19]. When there was a sophisticated multiple antenna eavesdropper and a multiple antenna transmitter, transmit antenna selection was used in the physical layer security scheme [20]. Secure transmission in two-hop amplify-and-forward untrusted relay networks was investigated, taking power allocation into account [21]. Opportunistic multi-hop routing [22] which adopted the best of multiple receivers to forward each packet was suggested to improve throughput for a wireless network, the model of which had multiple nodes. Our model takes one base station as a relay, which is different from the scenario with multiple relays. The problem of selecting the optimal constrained candidate set was considered in the opportunistic routing paradigm [23], which also took into account of the network scenario with multiple candidate nodes. However, these two schemes place an emphasis on a routing algorithm, which is different from our objective that puts an emphasis on physical security.
Several existing schemes merely lay an emphasis on either Amplify and Forward (AF) or Decode and Forward (DF) relay to improve the secrecy rate. However, these schemes do not take normal users into account in one cell that transmits and receives information in traditional way. Our objective is to maximize the total secrecy rate by means of joint power allocation, subcarrier pairing and subcarrier assignment, when one cell has both relay users and normal users in the OFDMA network taking the base station as a two-way relay. In the next section, the system model is set up. In Section 3, the optimization problem is solved using the dual method. In Section 4, the experiments are conducted in order to test the performance of the proposed scheme. In the last section, some conclusions are given.

2. System Model

In the proposed model, there is one eavesdropper node, and there are normal users marked as ψ = { T 1 , T 2 , ... , T K } in one cell who exchange information with corresponding users in another cell.
At the same time, there are paired users marked as Γ = { ( A 1 , B 1 ) , ( A 2 , B 2 ) , ... , ( A M , B M ) } who exchange information with each other taking the base station as a relay. M and K represent the number of paired and normal users, respectively. The OFDMA channel has N number of subcarriers marked as N = { 1 , 2 , ... , N } . To avoid interference, each subcarrier pair can only be assigned to one normal user or one paired user in the uplink and downlink. Each normal user or paired user can occupy more than one pair of subcarriers. Here, we give an example to explain the adopted communication protocol as shown in Figure 1. In the first time slot, the paired users ( A 1 , B 1 ) send information to the base station over the i -th subcarrier simultaneously, i N ; the normal user in the cell transmits information to normal user in another adjacent cell through the base station over the i -th subcarrier, i N . In the second time slot, the base station amplifies the received signal from the paired user A 1 and B 1 and forwards it to B 1 and A 1 over the j -th subcarrier, j N ; the normal user in the cell receives information from the normal user in another adjacent cell through the base station over the j -th subcarrier, j N . Suppose subcarrier i and j are assigned to the m -th paired users in the first and second time slot, respectively. Since nodes A 1 and B 1 know their own transmitted symbols, they can subtract the back-propagating self-interference [24]. In the first time slot, the received signal over subcarrier i at the base station is:
y R i = P A m i h A m , R i x A m , i + P B m i h B m , R i x B m , i + n R , i .
where i Ν , x A m , i and x B m , i are the transmitted complex Gaussian signal with a mean of zero and a variance of 1 on subcarrier i from A m and B m respectively; P A m i and P B m i are the transmit power of A m and B m over subcarrier i ; h A m , R i and h B m , R i are the channel gain over subcarrier i from A m and B m to the base station, respectively; n R , i is Additive White Gaussian Noise (AWGN) at the base station over subcarrier i with a mean of zero and a variance of σ 2 , m { 1 , 2 , ... , M } . It is assumed that all the channel state information in the network is perfectly known at the central controller, which can be embedded within the base station or the user [25]. The purpose of perfect channel status information is to provide a performance reference for a real system. The received signal at the eavesdropper over subcarrier i is:
y E i = P A m i h A m , E i x A m , i + P B m i h B m , E i x B m , i + n E , i .
where h A m , E i and h B m , E i are the channel gain over subcarrier i from A m and B m to the eavesdropper, respectively; n E , i is Additive White Gaussian Noise at the eavesdropper over subcarrier i with a mean of zero and a variance of σ 2 . In the second time slot, the base station amplifies the received signal and broadcasts the signal on subcarrier j with amplification factor β m , i and transmit power P R , ( A m , B m ) j .
β m , i = P R , ( A m , B m ) j α = P R , ( A m , B m ) j P A m i | h A m , R i | 2 + P B m i | h B m , R i | 2 + σ 2 .
α = P A m i | h A m , R i | 2 + P B m i | h B m , R i | 2 + σ 2 , the received signal at A m and B m over subcarrier j in the second time slot are y A m i , j and y B m i , j respectively.
y A m i , j = P R , ( A m , B m ) j g A m j y R i / α + n A m , j y B m i , j = P R , ( A m , B m ) j g B m j y R i / α + n B m , j
Substituting y R i into the above two equations, we get:
y A m i , j = P R , ( A m , B m ) j g A m j ( P A m i h A m , R i x A m , i + P B m i h B m , R i x B m , i + n R , i ) / α + n A m , j = P R , ( A m , B m ) j g A m j P A m i h A m , R i x A m , i / α + P R , ( A m , B m ) j g A m j P B m i h B m , R i x B m , i / α + P R , ( A m , B m ) j g A m j n R , i / α + n A m , j
and
y B m i , j = P R , ( A m , B m ) j g B m j ( P A m i h A m , R i x A m , i + P B m i h B m , R i x B m , i + n R , i ) / α + n B m , j = P R , ( A m , B m ) j g B m j P A m i h A m , R i x A m , i / α + P R , ( A m , B m ) j g B m j P B m i h B m , R i x B m , i / α + P R , ( A m , B m ) j g B m j n R , i / α + n B m , j
g A m j and g B m j are the downlink channel gain over subcarrier j from the base station to A m and B m respectively; n A m , j and n B m , j are Additive White Gaussian Noise over subcarrier j at A m and B m with a mean of zero and a variance of σ 2 . The received signal on subcarrier j at the eavesdropper in the second time slot is y E i , j = P R , ( A m , B m ) j g R , E j y R i / α + n E , j . Substituting y R i into this equation, we get:
y E i , j = P R , ( A m , B m ) j g R , E j ( P A m i h A m , R i x A m , i + P B m i h B m , R i x B m , i + n R , i ) / α + n E , j = P R , ( A m , B m ) j g R , E j P A m i h A m , R i x A m , i / α + P R , ( A m , B m ) j g R , E j P B m i h B m , R i x B m , i / α + P R , ( A m , B m ) j g R , E j n R , i / α + n E , j
g R , E j is the channel gain between the base station and the eavesdropper over subcarrier j and n E , j is Additive White Gaussian Noise at the eavesdropper over subcarrier j with a mean of zero and a variance of σ 2 . According to the fact that the secrecy capacity of a Gaussian wiretap channel is the difference between the main channel and the wiretap channel [26], we can conclude that the achievable secure rate for A m and B m is:
R sec , m i , j = [ R A m i , j + R B m i , j R E i , j ] + .
R A m i , j = 1 2 log ( 1 + S N R A m i , j ) .
R B m i , j = 1 2 log ( 1 + S N R B m i , j ) .
R E i , j = 1 2 log det ( I + H E H E H Q E 1 ) .
R A m i , j + R B m i , j is the main channel capacity between the paired user and the base station, R E i , j is the wiretap channel capacity when the eavesdropper is wiretapping the communication process between the paired user and the base station, [ x ] + = max { 0 , x } , and I is a unit vector.
H E = [ P A m i h A m , E i P B m i h B m , E i P R , ( A m , B m ) j g R , E j P A m i h A m , R i / α P R , ( A m , B m ) j g R , E j P B m i h B m , R i / α ]
Q E = σ 2 [ 1 0 0 1 + P R , ( A m , B m ) j | g R , E j | 2 / α 2 ]
S N R A m i , j = P R , ( A m , B m ) j | g A m j | 2 P B m i | h B m , R i | 2 / α 2 ( P R , ( A m , B m ) j | g A m j | 2 / α 2 + 1 ) σ 2 , S N R B m i , j = P R , ( A m , B m ) j | g B m j | 2 P A m i | h A m , R i | 2 / α 2 ( P R , ( A m , B m ) j | g B m j | 2 / α 2 + 1 ) σ 2
det ( I + H E H E H Q E 1 ) = P A m i P B m i ( | h A m , E i | 2 | h B m , R i | 2 + | h B m , E i | 2 | h A m , R i | 2 ) + σ 2 ( P A m i | h A m , E i | 2 + P B m i | h B m , E i | 2 + P A m i | h A m , R i | 2 + P B m i | h B m , R i | 2 ) σ 4 P A m i P B m i 2 Re { h A m , E i ( h B m , E i ) ( h A m , R i ) h B m , R i } σ 4 + 1.
Substituting the above equations into (7), the achievable secure rate for the paired user is expressed as:
R sec , m i , j = 1 2 log { ( P R , ( A m , B m ) j | g A m j | 2 / α 2 + 1 ) σ 2 + P R , ( A m , B m ) j | g A m j | 2 P B m i | h B m , R i | 2 / α 2 ( P R , ( A m , B m ) j | g A m j | 2 / α 2 + 1 ) ( P R , ( A m , B m ) j | g B m j | 2 / α 2 + 1 ) σ 2 + P R , ( A m , B m ) j | g B m j | 2 P A m i | h A m , R i | 2 / α 2 ( P R , ( A m , B m ) j | g B m j | 2 / α 2 + 1 ) } 1 2 log { P A m i P B m i ( | h A m , E i | 2 | h B m , R i | 2 + | h B m , E i | 2 | h A m , R i | 2 ) + σ 2 ( P A m i | h A m , E i | 2 + P B m i | h B m , E i | 2 + P A m i | h A m , R i | 2 + P B m i | h B m , R i | 2 ) P A m i P B m i 2 Re { h A m , E i ( h B m , E i ) ( h A m , R i ) h B m , R i } + σ 4 }
The achievable secure rate for the normal user T k , k { 1 , 2 , ... , K } is:
R sec , T k i , j = [ R T k , R i , j R T k , E i , j ] + .
R T k , R i , j = 1 4 { log ( 1 + | h T k , R i | 2 P T k i σ 2 ) + log ( 1 + | g R , T k j | 2 P R , T k j σ 2 ) }
R T k , E i , j = 1 4 { log ( 1 + | h T k , E i | 2 P T k i σ 2 ) + log ( 1 + | g R , E j | 2 P R , T k j σ 2 ) }
R T k , R i , j is the main channel capacity between the normal user and the base station, R T k , E i , j is the wiretap channel capacity when the eavesdropper is wiretapping the communication process between the normal user and the base station, h T k , R i and g R , T k j are the uplink and downlink channel gains between the normal user T k and the base station over subcarrier i and j respectively; h T k , E i is the channel gain between the normal user T k and the eavesdropper over subcarrier i . P T k i is the uplink transmit power from the normal user T k to the base station and P R , T k i is the downlink transmit power from the base station to the normal user T k over subcarrier i . We define two indicator functions to represent subcarrier assignment and subcarrier pairing. π i , j = 1 or η i , j = 1 means that the uplink subcarrier i is paired with the downlink subcarrier j for the normal user or the paired users; otherwise, π i , j = 0 or η i , j = 0 . ρ k i , j = 1 or ρ m i , j = 1 means that the uplink subcarrier i and the downlink subcarrier j are assigned to the k -th normal user or the m -th paired users; otherwise, ρ k i , j = 0 or ρ m i , j = 0 . In the cellular network that has paired and normal users, we can realize secrecy communication without information leakage [26], if the information transmission rate is less than the maximum secrecy rate. Firstly, we need to investigate the problem of maximizing the total secrecy rate for paired and normal users in one cell by means of subcarrier assignment, subcarrier pairing and power allocation. This primary optimization problem can be expressed as:
maxmize π , ρ , η , P ( k = 1 K i = 1 N j = 1 N π i , j ρ k i , j R sec , T k i , j + m = 1 M i = 1 N j = 1 N η i , j ρ m i , j R sec , m i , j ) . s . t .   j = 1 N ( m = 1 M P R , ( A m , B m ) j + k = 1 K P R , T k j ) P t o t a l B . ρ { 0 , 1 } ,   η { 0 , 1 } . T k Ψ ρ k i , j + ( A m , B m ) Γ ρ m i , j = 1 , i 1 , 2 , ... , N ; k = 1 , 2 , ... , K ; m = 1 , 2 , ... , M . T k Ψ ρ k i , j + ( A m , B m ) Γ ρ m i , j = 1 , j 1 , 2 , ... , N ; k = 1 , 2 , ... , K ; m = 1 , 2 , ... , M .
π = { π i , j } and η = { η i , j } are the sets of all possible subcarrier pairings; ρ = { ρ k i , j , ρ m i , j } is the set of all possible subcarrier-user assignments; and P = { P R , T k j , P R , ( A m , B m ) j } is the set of all possible power allocations for the given subcarrier pairing and subcarrier assignment, which satisfies P R , T k j 0 , P R , ( A m , B m ) j 0 for π i , j ρ k i , j = 1 , η i , j ρ m i , j = 1 and P R , T k j = 0 , P R , ( A m , B m ) j = 0 for π i , j ρ k i , j = 0 , η i , j ρ m i , j = 0 . This is a mixed integer programming problem, the solving process of which is very complicated. However, we can relax ρ [ 0 , 1 ] and η [ 0 , 1 ] to get the near the optimal solution. In the next section, the dual method is used to solve this optimization problem.

3. Problem Solution

After relaxing ρ [ 0 , 1 ] and η [ 0 , 1 ] , we can see that all constraints of problem (19) are affine and the target function is concave, therefore the Slater’s condition is satisfied. This optimization problem can be solved by the Lagrange dual method with a zero duality gap [27]. Because the dual function is always concave and the constraints are convex [27], the primary problem is transformed into convex optimization. λ is the dual variable associated with the total power constraints at the base station. The Lagrange dual function for (19) is:
g ( λ ) = maxmize π , ρ , P L ( π , η , ρ , P , λ )
This is a maximization problem, and is solved in three phases step-by-step using convex optimization.
L ( π , η , ρ , P , λ ) = k = 1 K i = 1 N j = 1 N π i , j ρ k i , j R sec , T k i , j + m = 1 M i = 1 N j = 1 N η i , j ρ m i , j R sec , m i , j λ j = 1 N ( m = 1 M P R , ( A m , B m ) j + k = 1 K P R , T k j ) + λ P t o t a l B = j = 1 N k = 1 K i = 1 N ( π i , j ρ k i , j R sec , T k i , j λ P R , T k j ) + j = 1 N m = 1 M i = 1 N ( η i , j ρ m i , j R sec , m i , j λ P R , ( A m , B m ) j ) + λ P t o t a l B = j = 1 N L j , k ( π i , j , ρ k i , j , P R , T k j , λ ) + j = 1 N L j , m ( η i , j , ρ m i , j , P R , ( A m , B m ) j , λ ) + λ P t o t a l B
L j , k ( π i , j , ρ k i , j , P R , T k j , λ ) = i = 1 N k = 1 K ( π i , j ρ k i , j R sec , T k i , j λ P R , T k j )
L j , m ( η i , j , ρ m i , j , P R , ( A m , B m ) j , λ ) = i = 1 N m = 1 M ( η i , j ρ m i , j R sec , m i , j λ P R , ( A m , B m ) j ) .
The dual problem can be expressed as:
minmize λ g ( λ ) . s . t .   λ 0
This is a convex optimization problem, which can be solved by the sub-gradient method with guaranteed convergence [28]. The derived sub-gradient of g ( λ ) is:
Δ λ = P t o t a l B j = 1 N ( m = 1 M P ^ R , ( A m , B m ) j + k = 1 K P ^ R , T k j ) λ ( l + 1 ) = λ ( l ) + ε ( l ) Δ λ
ε is the step size in the l -th iteration; ρ ^ k i , j and ρ ^ m i , j are the optimal power allocations at the dual point, which can be found in the following step.
Step 1. For fixed π i , j = 1 and ρ k i , j = 1 , according to Karush-Kuhn-Tucker condition, the solution is the non-negative real root of the quadratic function.
[ 4 λ ( ln 2 ) | g R , T k j | 2 | g R , E j | 2 ] ( P R , T k j ) 2 + [ 4 λ σ 2 ( ln 2 ) [ | g R , T k j | 2 + | g R , E j | 2 ] ] P R , T k j + 4 λ ( ln 2 ) σ 4 σ 2 ( | g R , T k j | 2 | g R , E j | 2 ) = 0
The solution is:
P ^ R , T k j = [ | g R , T k j | 2 | g R , E j | 2 ] 2 16 λ 2 σ 4 ( ln 2 ) 2 16 λ ( ln 2 ) | g R , T k j | 2 | g R , E j | 2 σ 2 [ | g R , T k j | 2 | g R , E j | 2 ] 8 λ ( ln 2 ) | g R , T k j | 2 | g R , E j | 2 σ 2 2 | g R , T k j | 2 | g R , E j | 2
For fixed η i , j = 1 and ρ m i , j = 1 , by solving d R sec , m i , j d P R , ( A m , B m ) j = 0 , we can obtian the optimal solution P ^ R , ( A m , B m ) j expressed as a non-negative real root of the quartic function.
a ( P R , ( A m , B m ) j ) 4 + b ( P R , ( A m , B m ) j ) 3 + c ( P R , ( A m , B m ) j ) 2 + d P R , ( A m , B m ) j + e = 0. a = 2 λ ( ln 2 ) [ σ 8 | g A m j | 4 | g B m j | 4 + σ 6 P A m i | h A m , R i | 2 | g A m j | 4 | g B m j | 4 + P B m i σ 6 | h B m , R i | 2 | g A m j | 4 | g B m j | 4 + σ 4 P A m i P B m i | h A m , R i | 2 | h B m , R i | 2 | g A m j | 4 | g B m j | 4 ] b = 2 λ ( ln 2 ) { [ 2 σ 4 α 2 | g A m j | 2 + σ 2 α 2 P B m i | h B m , R i | 2 | g A m j | 2 ] [ σ 4 | g B m j | 4 + σ 2 P A m i | h A m , R i | 2 | g B m j | 4 ] + [ 2 σ 4 α 2 | g B m j | 2 + σ 2 α 2 P A m i | h A m , R i | 2 | g B m j | 2 ] [ σ 4 | g A m j | 4 + σ 2 P B m i | h B m , R i | 2 | g A m j | 4 } c = 2 λ ( ln 2 ) { [ σ 8 α 4 | g B m j | 4 + σ 6 α 4 P A m i | h A m , R i | 2 | g B m j | 4 + σ 8 α 4 | g A m j | 4 + σ 6 α 4 P B m i | h B m , R i | 2 | g A m j | 4 ] + [ 2 σ 4 α 2 | g B m j | 2 + σ 2 α 2 P A m i | h A m , R i | 2 | g B m j | 2 ] [ 2 σ 4 α 2 | g A m j | 2 + σ 2 α 2 P B m i | h B m , R i | 2 | g A m j | 2 ] } σ 6 α 2 P B m i | h B m , R i | 2 | g A m j | 2 | g B m j | 4 σ 4 α 2 P A m i P B m i | h A m , R i | 2 | h B m , R i | 2 | g A m j | 2 | g B m j | 4 σ 6 α 2 P A m i | h A m , R i | 2 | g A m j | 4 | g B m j | 2 σ 4 α 2 P A m i P B m i | h A m , R i | 2 | h B m , R i | 2 | g A m j | 4 | g B m j | 2 d = 2 λ ( ln 2 ) [ 2 σ 8 α 6 | g B m j | 2 + σ 6 α 6 P A m i | h A m , R i | 2 | g B m j | 2 + 2 σ 8 α 6 | g A m j | 2 + σ 6 α 6 P B m i | h B m , R i | 2 | g A m j | 2 2 σ 6 α 4 P B m i | h B m , R i | 2 | g A m j | 2 | g B m j | 2 2 σ 4 α 4 P A m i P B m i | h A m , R i | 2 | h B m , R i | 2 | g A m j | 2 | g B m j | 2 2 σ 6 α 4 P A m i | h A m , R i | 2 | g A m j | 2 | g B m j | 2 e = 2 λ ( ln 2 ) [ 2 σ 8 α 6 | g B m j | 2 + σ 6 α 6 P A m i | h A m , R i | 2 | g B m j | 2 + 2 σ 8 α 6 | g A m j | 2 + σ 6 α 6 P B m i | h B m , R i | 2 | g A m j | 2 ] σ 6 α 6 P B m i | h B m , R i | 2 | g A m j | 2 σ 6 α 6 P A m i | h A m , R i | 2 | g B m j | 2
Step 2. In the above step, we achieve the optimal P ^ R , T k j and P ^ R , ( A m , B m ) j . For the given subcarrier pairing strategy π i , j = 1 , η i , j = 1 , the subcarrier assignment can be expressed as:
max π , ρ { j = 1 N L j , k ( π i , j , ρ k i , j , P ^ R , T k j , λ ) + j = 1 N L j , m ( η i , j , ρ m i , j , P ^ R , ( A m , B m ) j , λ ) + λ P t o t a l B }
The solution is:
ρ ^ k i , j = { 1 , k = k ( i , j ) = arg max k ( L j , k ( π i , j , ρ k i , j , P ^ R , T k j , λ ) + L j , m ( η i , j , ρ m i , j , P ^ R , ( A m , B m ) j , λ ) ) 0 , o t h e r w i s e
ρ ^ m i , j = { 1 , m = m ( i , j ) = arg max m ( L j , k ( π i , j , ρ k i , j , P ^ R , T k j , λ ) + L j , m ( η i , j , ρ m i , j , P ^ R , ( A m , B m ) j , λ ) ) 0 , o t h e r w i s e
Step 3. For the given P ^ R , T k j , P ^ R , ( A m , B m ) j , ρ ^ k i , j and ρ ^ m i , j , the subcarrier pairing is expressed as:
max π { j = 1 N ( L j , k ( π i , j , ρ ^ k i , j , P ^ R , T k j , λ ) + L j , m ( η i , j , ρ ^ m i , j , P ^ R , ( A m , B m ) j , λ ) ) }
Inserting P ^ R , T k j and P ^ R , ( A m , B m ) j into Equations (15) and (16), we get R ^ sec , m i , j and R ^ sec , T k i , j . Formula (32) can be expressed as:
maxmize   i = 1 N j = 1 N π i , j R ^ sec , T k i , j + i = 1 N j = 1 N η i , j R ^ sec , m i , j λ ( j = 1 N ( P ^ R , T k j + P ^ R , ( A m , B m ) j ) ) .
So, we only need to maximize:
i = 1 N j = 1 N π i , j R ^ sec , T k i , j + i = 1 N j = 1 N η i , j R ^ sec , m i , j
We define two profit matrices [ R ^ sec , m i , j ] N × N and [ R ^ sec , T k i , j ] N × N . In order to maximize (34), we need to pick elements in the two profit matrices to make the sum of profits maximization. This is obviously a standard linear assignment problem [27], which can be efficiently solved by the Hungarian method.

4. Simulation Results and Discussion

In order to verify the effectiveness of the proposed algorithm, computer simulations are carried out. The path-loss exponent is set to 3, and the adopted wireless broadband frequency selective fading channel model is Stanford University Interim-6, each channel of which is a six-tap channel. The first tap follows Ricean distribution, while the other five taps follow Rayleigh distribution. There is only one eavesdropper in one cell. All the users are deployed 40 m away from the base station and the eavesdropper is 200 m away from the base station. The noise power σ 2 is −119 dBm. There are two simulation scenarios.
(1)
Two normal users and two paired users with 32 subcarriers
(2)
Four normal users and four paired users with 64 subcarriers
The relation between secrecy spectral efficiency and base station transmitting power is shown in Figure 2 when all the users have the same transmitting power of 2 dBm over all subcarriers in the uplink. The equal power allocation method means to allocate equal power to all users, which is less complicated than the proposed scheme. For the conventional scheme, there is no subcarrier pairing or subcarrier assignment.
It can be seen that the total secrecy spectral efficiency rises with the increase of transmitting power. The total secrecy spectral efficiency under the condition with 48 subcarriers is higher than the secrecy spectral efficiency under the condition with 32 subcarriers. This is because the second scenario with 48 subcarriers has more users, which can increase the signal-to-noise ratio. The relation between secrecy spectral efficiency and user transmitting power is shown in Figure 3, when the base station has a transmitting power of 20 dBm. It can be seen that the secrecy spectral efficiency rises with the increase of user signal-to-noise ratio. The proposed scheme has the largest secrecy spectral efficiency. The equal power allocation method almost has the same secrecy spectral efficiency as the proposed scheme when the number of subcarriers is small at a low signal-to-noise ratio. When the signal-to-noise ratio is about 43 dB, the secrecy spectral efficiency tends to be stable. This is because the capacity of the wiretap channel grows with the increase of user signal-to-noise ratio. From Equation (15), we can see that the mean value of the secrecy spectral efficiency is a constant for fixed power at the base station, which is relevant to the channel characteristics.

5. Conclusions and Future Research

We have set up the mathematical model to maximize the total secrecy rate when paired and normal users coexists in one cell. We take into account the joint optimization problem consisting of subcarrier pairing, subcarrier assignment and power allocation. The optimization problem belongs to mixed integer programming, which is very complicated. We solve this problem in a dual domain and put forward the equal power allocation method to reduce the calculation complexity. Simulation results show that the proposed scheme can improve the secrecy rate compared to conventional schemes, and the secrecy spectral efficiency tends to be stable at a high signal-to-noise ratio, because the mean value of the secrecy spectral efficiency is a constant for fixed power at the base station. As the user power reaches infinity, the average secrecy spectral efficiency expressed as Equation (15) can be worked out according to channel statistical characteristics. Recently, related issues in cooperative communication, such as wireless resource allocation, relay selection, physical-layer security, energy harvesting and the relationship between nodes, have triggered a great deal of research interest. Based on these research topics, we further investigate some key technologies of cooperative communication. In the future, we will take into account the possibility of an eavesdropper with multiple antennas. However, the perfect channel state information only makes sense in a slowly changing environment. In actual wireless links, due to a series of uncertain factors such as channel estimation error, quantization error and feedback delay, it is difficult to obtain full channel state information. Therefore, it is very important to establish the optimization model of partial channel status information for the application of the actual system in our future research.

Acknowledgments

The authors would like to express their acknowledgement for the support from the Natural Science Foundation of Shandong Province in China (ZR2015FL028), Science and Technology Plan Project of the Educational Department of Shandong Province of China (No. J16LI12) and project of the 13th five-year planning of education science in Shandong Province (Joint resource allocation research in OFDMA relay network based on convex optimization).

Author Contributions

Ning Du conceived and designed the experiments; Ning Du analyzed the data and wrote the paper; Yan Zang performed the experiments; and Fansheng Liu provided some suggestions and revised the paper.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. Wang, X.; Tao, M.; Mo, J.; Xu, Y. Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks. IEEE Trans. Inf. Forensics Secur. 2011, 6, 693–702. [Google Scholar] [CrossRef]
  2. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  3. Yang, Y.; Li, Q.; Ma, W.K.; Ge, J.; Ching, P.C. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 2013, 20, 35–38. [Google Scholar] [CrossRef]
  4. Li, Q.; Yang, Y.; Ma, W.K.; Lin, M.; Ge, J.; Lin, J. Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 2015, 63, 206–220. [Google Scholar] [CrossRef]
  5. Chen, J.C.; Zhang, R.Q.; Song, L.Y.; Han, Z.; Jiao, B.L. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks. IEEE Trans. Inf. Forensics Secur. 2012, 7, 310–320. [Google Scholar] [CrossRef]
  6. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  7. Ng, D.; Lo, E.; Schober, R. Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks. IEEE Trans. Wirel. Commun. 2011, 10, 3528–3540. [Google Scholar] [CrossRef]
  8. Mokari, N.; Parsaeefard, S.; Saeedi, H.; Azmi, P. Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users. IEEE Trans. Wirel. Commun. 2014, 13, 1058–1073. [Google Scholar] [CrossRef]
  9. Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar] [CrossRef]
  10. Huang, J.; Swindlehurst, A.L. Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal Process. 2011, 59, 4871–4884. [Google Scholar] [CrossRef]
  11. Zheng, G.; Choo, L.C.; Wong, K.K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 2011, 59, 1317–1322. [Google Scholar] [CrossRef]
  12. Jeon, H.; McLaughlin, S.; Kim, I.M.; Ha, J. Secure communications with untrusted secondary nodes in cognitive radio networks. IEEE Trans. Wirel. Commun. 2014, 13, 1790–1805. [Google Scholar] [CrossRef]
  13. Sakran, H.; Shokair, M.; Nasr, O.; EI-Rabaie, S.; EI-Azm, A. Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun. 2012, 6, 2676–2687. [Google Scholar] [CrossRef]
  14. Zou, Y.; Zhu, J.; Wang, X.; Leung, V. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw. 2015, 29, 42–48. [Google Scholar] [CrossRef]
  15. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.; Leung, K.K. Secrecy rate optimizations for a MIMO secrecy channel with a multiple antenna eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
  16. Ng, D.W.K.; Lo, E.S.; Schober, R. Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Commun. 2014, 13, 4599–4615. [Google Scholar] [CrossRef]
  17. Jiang, W. Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network. Int. J. Antennas Propag. 2015, 2015, 1–15. [Google Scholar] [CrossRef]
  18. Geraci, G.; Singh, S.; Andrews, J.; Yuan, J.; Collings, I. Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans. Wirel. Commun. 2013, 13, 2931–2943. [Google Scholar]
  19. Liu, Y.; Wang, L.; Duy, T.T.; Elkashlan, M.; Duong, T.Q. Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 2015, 4, 46–49. [Google Scholar] [CrossRef]
  20. Alves, H.; Souza, R.D.; Debbah, M.; Bennis, M. Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett. 2012, 19, 372–375. [Google Scholar] [CrossRef]
  21. Wang, L.; Elkashlan, M.; Huang, J.; Tran, N.H.; Duong, T.Q. Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wirel. Commun. Lett. 2014, 3, 289–292. [Google Scholar] [CrossRef]
  22. Biswas, S.; Morris, R. ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, PA, USA, 22–26 August 2005; pp. 133–144. [Google Scholar]
  23. Cacciapuoti, A.S.; Caleffi, M.; Paura, L. Optimal Constrained Candidate Selection for Opportunistic Routing. In Proceedings of the GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010. [Google Scholar]
  24. Rankov, B.; Wittneben, A. Spectral efficient protocols for half-duplex fading relay channels. IEEE J. Sel. Areas Commun. 2007, 25, 379–389. [Google Scholar] [CrossRef]
  25. Li, X.; Zhang, Q.; Zhang, G.; Qin, J. Joint Power Allocation and Subcarrier Pairing for Cooperative OFDM AF Multi-Relay Networks. IEEE Commun. Lett. 2013, 17, 872–875. [Google Scholar]
  26. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wiretap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  27. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: New York, NY, USA, 2004. [Google Scholar]
  28. Tao, M.; Liang, Y.C.; Zhang, F. Resource allocation for delay differentiated traffic in multiuser OFDM systems. IEEE Trans. Wirel. Commun. 2008, 7, 2190–2201. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Applsci 07 00520 g001
Figure 2. Secrecy spectral efficiency versus base station transmitting power.
Figure 2. Secrecy spectral efficiency versus base station transmitting power.
Applsci 07 00520 g002
Figure 3. Secrecy spectral efficiency versus user transmitting power.
Figure 3. Secrecy spectral efficiency versus user transmitting power.
Applsci 07 00520 g003

Share and Cite

MDPI and ACS Style

Du, N.; Liu, F.; Zang, Y. Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay. Appl. Sci. 2017, 7, 520. https://0-doi-org.brum.beds.ac.uk/10.3390/app7050520

AMA Style

Du N, Liu F, Zang Y. Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay. Applied Sciences. 2017; 7(5):520. https://0-doi-org.brum.beds.ac.uk/10.3390/app7050520

Chicago/Turabian Style

Du, Ning, Fasheng Liu, and Yan Zang. 2017. "Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay" Applied Sciences 7, no. 5: 520. https://0-doi-org.brum.beds.ac.uk/10.3390/app7050520

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop