pith. the verified trust layer for science. sign in

arxiv: 1611.05839 · v1 · pith:ILKP3I5Vnew · submitted 2016-11-17 · 💻 cs.IT · cs.CR· math.IT

Maximizing the minimum achievable secrecy rate of two-way relay networks using the null space beamforming method

classification 💻 cs.IT cs.CRmath.IT
keywords relayachievablemaximizingmethodminimumnullratesecrecy
0
0 comments X p. Extension
Add this Pith Number to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{ILKP3I5V}

Prints a linked pith:ILKP3I5V badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

This paper concerns maximizing the minimum achievable secrecy rate of a two-way relay network in the presence of an eavesdropper, in which two nodes aim to exchange messages in two hops, using a multi-antenna relay. Throughout the first hop, the two nodes simultaneously transmit their messages to the relay. In the second hop, the relay broadcasts a combination of the received information to the users such that the transmitted signal lies in the null space of the eavesdropper's channel; this is called null space beamforming (NSBF). The best NSBF matrix for maximizing the minimum achievable secrecy rate is studied, showing that the problem is not convex in general. To address this issue, the problem is divided into three sub-problems: a close-to-optimal solution is derived by using the semi-definite relaxation (SDR) technique. Simulation results demonstrate the superiority of the proposed method w.r.t. the most well-known method addressed in the literature.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.