Loading...

Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning

Bastami, H ; Sharif University of Technology | 2021

284 Viewed
  1. Type of Document: Article
  2. DOI: 10.1016/j.phycom.2021.101476
  3. Publisher: Elsevier B.V , 2021
  4. Abstract:
  5. This paper investigates the physical layer security (PLS) design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdropping attacks performed by both untrusted relay nodes and Eve. Considering the hardware impairments (HIs), both total power budget constraint for the whole network and the individual power constraint at each node, this paper presents a novel approach to jointly optimize relay beamformer and transmit powers aiming at maximizing average secrecy rate (ASR). To safeguard the first cooperative phase, destination-aided cooperative jamming (DACJ) is employed, while for the second phase, the relay beamformer is adjusted. The resultant optimization problem is non-convex, and a suboptimal solution is obtained through the sequential parametric convex approximation (SPCA) method. In order to prevent any failure due to infeasibility, we propose an iterative initialization algorithm to find the feasible initial point of the original problem instead of an arbitrary point, as in the conventional SPCA. To satisfy low-latency as one of the main key performance indicators (KPI) required in beyond 5G (B5G) communications, a computationally efficient data-driven approach is developed exploiting a deep learning model to evaluate the proposed scheme while the computational burden is significantly reduced. Simulation results assess the effect of different system parameters on the ASR performance as well as the effectiveness of the proposed deep learning solution in large-scale cases. © 2021 Elsevier B.V
  6. Keywords:
  7. 5G mobile communication systems ; Antennas ; Beamforming ; Budget control ; Deep learning ; Iterative methods ; Beam formers ; Eavesdroppe ; Hardware impairment ; Passive eavesdroppers ; Physical layer security ; Relay node ; Security design ; Source nodes ; Untrusted relays ; Benchmarking
  8. Source: Physical Communication ; Volume 49 , 2021 ; 18744907 (ISSN)
  9. URL: https://www.sciencedirect.com/science/article/abs/pii/S1874490721002135