Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
Abstract—We consider beamforming schemes for the multi- (AF) RWC is addressed in [4]–[6], [17], [18] and it boils
antenna decode-and-forward (DF) relays that maximize the down to the maximization of products of generalized Rayleigh
secrecy rate (SR) in the relay wiretap channel. Both full-duplex quotients.
(FD) and half-duplex (HD) relays are considered, where the
FD relay fights the loop-back self-interference while maximizing For the decode-and-forward (DF) relay based wiretap chan-
the SR. The HD relay beamforming is derived from the FD nel, the outage performance of the SR with single antenna
case as a byproduct. The facts that the weaker link among the nodes [7] and the average SR of buffer aided relaying [8]
two hops in the DF relay network dominates the throughput are studied. Also, the power allocation in the multi-hop DF
and that the first hop is shared among the destination and the relay network is considered in [19]. Recently, there have been
eavesdroppers make us divide the beamformer solution space
into three separate regions. Since only two of the three regions many research works [20]–[27] focusing on the full-duplex
effectively produce non-negative SR, separate beamformer de- (FD) relaying since it can double the spectral efficiency of the
signs for these two effective regions are provided. Numerical half-duplex (HD) relaying if the strong self-interference (SI)
results reveal performance trade-off of FD and HD modes in of FD mode can be curved sufficiently. However, the relay
various channel configurations, where the two challenges of self- beamforming problem in the DF RWC has not been addressed
interference suppression and the protection from eavesdropping
ask different requirements for the beamforming. enough both for the FD mode and for the HD mode. Thus,
we propose beamforming schemes for the DF RWC with these
Index Terms—Secrecy rate, relay wiretap channel, decode and two relay operating modes, where the FD mode relay protects
forward, beamformer design.
the message delivery from the security attacks and improves
the spectral efficiency in the due process through suppressing
I. I NTRODUCTION the loop-back SI. In HD mode of DF RWC, the role of
In future networks, it is expected that much more devices relay beamformer becomes less demanding since it only needs
than those of today are connected to the networks to serve to handle the information protection from the eavesdropping
various functions. Thus, the security of these new information and thus the key beamforming techniques derived for the FD
links puts new challenges for such network environment. mode can be applied to the HD beamforming with minor
Conventional high layer security approaches may require modifications.
high cost and complexity for those numerous devices. To The RWC is composed of the first hop toward the relay
protect such wireless communications from security attacks, and a set of second hops toward the legitimate receiver and
the physical layer security (PLS) issues draw much attention eavesdroppers. With the property of DF relaying, where the
recently [1]–[3] as a substitute for the expensive higher layer weaker link of the two hops of DF relay channel determines
approaches. Mostly, the PLS relies on signal processing at the end-to-end throughput, we can divide the beamformer
the physical layer and hence it asks for new designs and solution space into three separate regions according to link
additional complexity as well. In particular, the security of the conditions. Among these three regions, only two meet the
relay wiretap channel (RWC) draws much attention recently conditions for non-negative SR and hence we provide separate
[4]–[11] including the security in the two-way relay channels beamforming schemes for those two effective regions of
[12]–[16]. The beamforming for the multiple antenna relay solution space. For the first region, where the strength of
is helpful in improving the secrecy rate (SR) either through the first hop link in the relay channel dominates over that
protecting the message signals or through confounding the of the second hop link, we propose an optimization scheme
eavesdroppers with jamming noise [5]. The SR maximization that maximizes the SR over the information leakage level
beamforming in the multiple antenna amplify-and-forward at which all the beamformed eavesdropper channel gains are
kept. For the other region, we show that the zero forcing of the
This work was supported by the Basic Science Research Program through self-interference is the necessary condition for the optimality
the National Research Foundation of Korea Funded by the Ministry of Science and provide a beamforming scheme based on the projection
and ICT under Grant NRF-2017R1A2B4007398.
Janghoon Yang is the corresponding author (E-mail: jhyang00@smit.ac.kr).
onto the orthogonal space. Numerical results are provided to
1 Authors are with the Department of Electronics and information, com- compare the performances of FD and HD schemes and identify
munication Engineering, Sejong University. the conditions, where the use of computationally complex FD
2 Author is with Seoul Media Institute of Technology.
3 Author is with Konkuk University. operation is advocated over the HD mode.
4 Author is with the Department of Electronic Engineering, Korea Univer- This paper is organized as followings. In Section II, the sys-
sity. tem model of the proposed multi-antenna RWC is presented.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
TABLE I
D EFINITIONS optimization problem in (6).
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
t H
Lemma 1: The x that builds wT = Q̃x maximizing the cost maximal M and the setting (wR ) = hSR /khSR k achieves
the equality constraint is found from x1 =
function in (8) with p the maximum point.
√ T
γã and x0 = 1 − γkãk2 Q̄H hH H H
RD /kQ̄ hq RD k, where With this, we are given the SR expression for the second region
the row vector a = [1/α1E , . . . , 1/αK 1 −1 in (5) as
E ] and ã = PR aR .
The γ that optimizes (8) can be found from the roots of the 1 + khSR k2 PS
equation CS = min log . (10)
k 1 + (αkE )2 |hkRE wT |2 PR
C(γ 2 kãk2 + 2γkãk2 − 1) = (A − B) γ(1 − γkãk2 ), (9)
p
1) When MT ≥ K + 2 and MR ≥ 3: The relay
transmit beamformer wT that maximizes the SR expression
where A = 1 + α2D PR kQ̄H hH RD k ,
2
B = of (10) is the one minimizing the denominator to one by
2 2 H H 2 T 2
αD PR [kãk kQ̄ hRD k + khRD Qã k ], and projecting hH k
RD onto the orthogonal space of hRE , k =
C = 2α2D PR kQ̄H hH RD kRe{hRD Qã }.
T
1, . . . , K so that the leakage signals to the eavesdroppers
Proof: The proof appears in Appendix A. are perfectly suppressed. With the ZFC condition, we find
It is not hard to see that equation (11) is a concave a temporary relay transmit beamformer such as wTt =
function of γ and p thus (9) possesses a single zero within P⊥ H ⊥ H
Π hRD /kPΠ hRD k, where the MT × (K + 1) matrix is given
the interval [0, 1/ 1 − γkãk2 ], where the γ ∗ maximizing the as Π = [(h1RE )T , . . . , (hK T H t
RE ) , HRR wR ]. We still need to
cost function is found. Since we do not need x in solving 2
consider the condition αD |hRD wT | PR ≥ A(wR t 2 t
, wTt ) =
equation (9), we can solve it first before the relay transmit t H 2
|(wR ) hSR | PS to be satisfied since the other condition
beamformer wT is decided with Lemma 1. Once, wT is found α2E |hkRE wTt |2 PR < A(wR t
, wTt ) is obvious. If the condition
as above, we set it as wT1 and find the receive beamformer is met, we have a second candidate set of beamformer vectors
wR maximizing A(wR , wT ), which can be realized with denoted as wT2 = wTt and wR 2
= wR t
.
1 2 1 1 H H
wR = eig(PS hSR hH SR , IMT + PR αR HRR wT (wT ) HRR ). Otherwise, we need to adjust wR such that the con-
1 1
With the found wT and wR , we need to see if the two straint is met with equality such as α2D |hRD wT |2 PR =
link conditions α2D |hRD wT1 |2 PR < A(wR 1
, wT1 ) and γ ∗ = A(wR , wT ) = |wR H
hSR |2 PS instead of pursuing maxi-
k 2 k 1 2 1 1
(αE ) |hRE wT | PR ≤ A(wR , wT ) are met. If those two mization of the numerator of the second q SR expression
t |2 P
conditions are met, we have one candidate set of beamformer in (5). For this, we can define ϑ =
α2D |hRD wT R
.
|(wRt )H h
SR | PS
2
vectors denoted as wT1 and wR 1
. Otherwise, we need to reduce
∗ 1 Then, we form the second receive beamformer vector as
γ from γ so that the second condition γ ≤ A(wR , wT1 ) t a t
∗ wR = ϑwR + ηwR , where wR is found as above and the
is met. Note that reducing γ from γ found above reduces a
auxiliary vector wR from the orthogonal space of the two
|hRD wT1 |2 as well since the cost function is increasing on the
column matrix ∆ = [hSR , HRR wTt ] is found from wR a
=
interval [0, γ ∗ ). For every reduced γ, we find new wT1 with ⊥ ⊥ 3
1 1 P∆ hRD /kP∆ hRDp k . To make kwR k = 1, the parameter η is
Lemma 1 and wR again, which leads us to a new A(wR , wT1 ).
set such that η = ϑ2 cos2 (Θ) + 1 − ϑ2 − ϑ cos(Θ), where
This process is repeated until the two link conditions are met.
Θ = cos−1 (|(wR t H a
) wR |). It is easy to see that wR H
HRR wTt =
2 t 2 H 2
0 and αD |hRD wT | PR = |(wR ) hSR | PS . We, then, form
B. The second region when α2D |hRD wT |2 PR ≥ A(wR , wT ) the second candidate beamformer set as wT2 = wTt and
2
wR = wR .
Now, we present the second candidate set of the relay 2) When MT ≤ (K + 1): If MT ≤ (K + 1), the MT ×
beamformer vectors from the second search region. The ar- (K + 1) matrix Π is a full column rank matrix and hence the
gument of logarithm in the second SR expressions of (5) projection onto orthogonal space of Π will null out wTt . To
α2 |wH H wT |2 PR +1+|wR H
hSR |2 PS
is (1+(αkR)2 |hRk RR
wT | 2 P )(α2 |wH H
R RR wT |2 PR +1)
. Since the term bypass such a situation, we have to allow a portion of leakage
E RE R R
k 2 k 2 signal toward K − MT + 2 of the eavesdroppers (k, k ∈
1+(αE ) |hRE wT | PR related to the k-th eavesdropper chan-
nel from the denominator depends only on wT , we ignore this {1, . . . , K}) by striking out the corresponding columns from
H
|wR hSR |2 PS the matrix Π and making Π a MT × (MT − 1) matrix. In this
term. Then, we are left with M = 1 + α2 |wH H RR wT |2 PR +1
=
R R
1 + A(wR , wT ), which reveals the relation between wR and case, the selection of the K − MT + 2 columns hkRE , k ∈
wT as in Lemma 2. {1, . . . , K} should be made so that the CS in (10) should
Lemma 2: The M is maximized when the ZFC for the SI be maximized. Such objective is achieved if we select the
(wRH
HRR wT = 0) is met with a temporary wR as (wR t H
) = K − MT + 2 eavesdroppers minimizing (αkE )2 |hkRE hH RD | .
2
hSR /khSR k so that we have the maximal M as M = 1 + The adjustment of wR can be carried out in the same way as
khSR k2 PS . above if MR ≥ 3.
Proof: Given wT , the optimal wR 3) When MR = 2: The MR × 2 matrix ∆ will null
a a
maximizing M is found from wR H
= out wR if MR = 2. Instead, we have to form wR =
⊥ H ⊥ H
eig(hSR hH 2 H H PhSR hRD /kPhSR hRD k with a violation of ZFC and hence
SR PS , αR HRR wT wT HRR PR + IMR ), which
results in M = 1 + λ(hSR hH 2 H H with reduction of the first hop SINR A(wR , wT ). The beam-
SR PS , αR HRR wT wT HRR PR +
IMR ). Therefore, a necessary condition for the former wT2 can be found in the same way as above if MT ≥ 3.
optimal wT for the maximal M is to maximize 3 For the auxiliary vector wa , only the fact that it lies in the orthogonal
2
λ(hSR hH H H
SR PS , αR HRR wT wT HRR PR + IMR ). Now, it
R
space of the columns of Π is important while the direction of it does not
is trivial to see the ZFC is a necessary condition for the matter. Hence, hRD is used for wR a here.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
From the two candidate beamformer sets found from the 3.5
two constraint regions, we choose the set with the better SR FD, PS=10, PR=100
value. 3
FD PS=100, PR=10
FD P =100, P =100
S R
HD PS=10, PR=100
C. Half-duplex relay beamforming 2.5
HD P =100, P =10
S R
HD P =100, P =100
In this subsection, we modify the beamforming methods S R
SR(bps/Hz)
2
provided for the FD DF RWC in the previous subsections so
that they work for the HD DF RWC. Here, the relay has only 1.5
one antenna set, which receives the signal from the source
in the first phase and transmits the decoded and remodulated 1
HD relaying. 2 2
FD αD/αE=10
IV. N UMERICAL R ESULTS Fig. 3. The SR comparison of the FD mode and the HD mode in the DF
RWC against PR /PS when PS = 20 (dBW ). Here, α2R = 1, MT =
In this section, we compare the performance of the proposed MR = 4, K = 2 for the FD mode and the number of antennas is 4 for the
beamforming schemes for the FD RWC and the HD RWC. In HD mode.
Fig. 2, the SR of the two modes for three different pairs of
PS and PR value are plotted against the ratio α2D /α2E , where
the channel becomes a strong wiretap channel as the ratio in (5) becomes prevalent and the beamforming scheme in
α2D /α2E decreases and the other way around. Note that the SR subsection III-B is applied most of the time. In Fig. 3, it
gains of the FD mode over the HD mode widen as α2D /α2E is shown that the SR of FD mode degrades in this regime
increases, which tells us that the FD mode suffers more in the of PR /PS and even performs worse than the HD counterpart
throughput as the requirement for secrecy becomes stronger. for all the three pairs of α2D and α2E . This failure of the FD
Regardless of the pair values PS and PR , the gaps narrow mode (with respect to the HD mode) mainly comes from the
down fast in the other direction of α2D /α2E so that the FD fact that the ZFC for the SI suppression in the beamforming
mode provides not much benefit over the HD mode in strong in subsection III-B incurs painful performance loss that can
eavesdropper situations. Therefore, protecting the legitimate not be overcome even by the spectral gain of two coming
transmission from the eavesdroppers and acquiring the FD gain from the FD operation. This loss becomes severer when the
at the same time is a hard task. eavesdropper channels get stronger than the legitimate channel
Fig. 3 compares the SR of the two modes against the ratio toward the destination. From the above numerical results,
PR /PS for different pairs of α2D and α2E . Here, PS is set we conclude that the benefit of FD operation over the HD
to 20 (dBW ) while the value of PR varies. As PR increases, mode can be limited both by the relative intensity of the
the second hops (toward the destination and the eavesdroppers) eavesdropper channels and by the relative strength of the two
dominate over the first hop so that the second SR expression hops.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
1.8
three pairs of destination/eavesdropper channel strength ratio
FD PS=10,PR=100 α2D /α2E compared to the proposed scheme. The degradation of
1.6 FD PS=100,PR=10 SR is severe when PR /PS is low in all pairs of α2D /α2E while
FD PS=100,PR=100
1.4 the difference becomes negligible as PR increases, where the
HD PS=10,PR=100
HD PS=100,PR=10
second SR expression in (5) becomes prevalent as is observed
1.2
HD PS=100,PR=100 in the results of Fig. 3. Also, the SR degradation reduces as
SR(bps/Hz)
0.2 V. C ONCLUSION
0 Beamforming schemes for the multi-antenna DF RWC that
1 2 3 4 5 6
K maximize the secrecy rate are provided for the FD mode and
the HD mode. The solution space for the beamformer vectors
Fig. 4. The SR comparison of the FD mode and the HD mode in the DF is divided into three regions and the beamformer sets for the
RWC against K, the number of eavesdroppers when α2D = α2E = 0.1. Here, two effective regions are found. From these two sets, the one
α2R = 1, MT = MR = 8 for the FD mode and the number of antennas is providing the best performance is selected. Numerical results
8 for the HD mode.
compare the performances of FD mode and HD mode with the
proposed designs and identify the conditions under which the
2
2 2
FD mode provides the SR benefit over the HD mode. Also, a
FD αD/αE=0.1
1.8 FD α2 /α2 =1
comparison with a ZF based FD scheme shows the condition
D E
2 2
FD αD/αE=10 under which the proposed FD scheme provides advantage.
1.6 2 2
ZF αD/αE=0.1
2 2
Extension of current work to multi-rank transmission case or
ZF αD/αE=1
1.4
ZF α2 /α2 =10
D E
multiple relay case can be considered in future. Also, the case
1.2
with imperfect channel knowledge for the eavesdroppers could
address more practical assumption.
SR(bps/Hz)
0.8 A PPENDIX A
P ROOF OF L EMMA 1
0.6
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2884202, IEEE
Access
Now, the extreme points of (11) can be attained by differentia- [22] D. Nguyen, L. Tran, P. Pirinen, and M. Latva-aho, “On the spectral
tion with respect to γ (11) and setting it to zero, which results efficiency of full-duplex small cell wireless systems,” IEEE Trans.
Wireless Comm., vol. 13, no. 9, pp. 4896–4909, Sep. 2014.
in (9). [23] M. Heino, D. Korpi, T. Huusari, E. Antonio-Rodriiguez, S. Venkatasub-
ramanian, T. Riihonen, L. Anttila, C. Icheln, K. Haneda, R. Wichman,
and M. Valkama, “Recent advances in antenna design and interference
R EFERENCES cancellation algorithms for in-band full duplex relays,” IEEE Commun.
Magazine, vol. 53, no. 5, pp. 91–101, May 2015.
[1] H. V. Poor, “Information and inference in the wireless physical layer,” [24] G. Liu, F. R. Yu, H. Ji, V. C. M. Leung, and X. Li, “In-band full-duplex
IEEE Wireless Commun., vol. 19, no. 7, pp. 40–47, Feb. 2012. relaying: A survey, research issues and challenges,” IEEE Commun.
[2] Y.-W. P. Hong, P. Lan, and C.-C. J. Kuo, “Enhancing physical-layer Surveys and Tutorials, vol. 17, no. 2, pp. 500–524, 2015.
securecy in multiantenna wireless systems,” IEEE Signal Processing [25] S. Han, C. Yang, and P. Chen, “Full duplex-assisted intercell interference
Magazine, vol. 30, no. 5, pp. 29–40, Sep. 2013. cancellation in heterogeneous networks,” IEEE Trans. Commun., vol. 63,
[3] Z. Chu, H. Xing, M. Johnston, and S. L. Goff, “Secrecy rate op- no. 12, pp. 5218–5234, Dec. 2015.
timizations for a MISO secrecy channel with multiple multiantenna [26] D. Hwang, J. Yang, and S. S. Nam, “SINR maximizing beamforming
eavesdroppers,” IEEE Trans. Wireless Comm., vol. 15, no. 1, pp. 283– schemes for the full duplex amplify-and-forward relay channel,” IEEE
297, Jan. 2016. Access, vol. 5, no. 1, pp. 18 987–18 998, Dec. 2017.
[4] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless [27] D. Hwang, S. S. Nam, and J. Yang, “Multi-antenna beamforming tech-
physical layer security via cooperating relays,” IEEE Trans. on Signal niques in full-duplex and self-energy recycling systems: Opportunities
Processing, vol. 58, no. 3, pp. 1875–1888, Mar. 2010. and challenges,” IEEE Commun. Magazine, vol. 10, pp. 160–167, Oct.
[5] M. Lin, J. Ge, and Y. Yang, “An effective secure transmission scheme for 2017.
AF relay networks with two-hop information leakage,” IEEE Commun. [28] A. Khisti and G. W. Wornell, “Secure transmission with multiple
Lett., vol. 17, no. 8, pp. 1676–1679, Aug. 2013. antennas I: The MISOME wiretap channel,” IEEE Trans. Inform. Theory,
[6] Y. Yang, Q. Li, W. Ma, J. Ge, and P. Ching, “Cooperative secure vol. 56, no. 7, pp. 3088–3104, Jul. 2010.
beamforming for AF relay netowrks with multiple eavesdroppers,” IEEE
SignalProcessing Lett., vol. 20, no. 1, pp. 35–38, Jan. 2013.
[7] G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, “Physical layer network
security in the full-duplex relay system,” IEEE Trans. Information
Forensics ans security, vol. 10, no. 3, pp. 574–583, Mar. 2015.
[8] A. E. Shafie, A. Sultan, and N. Al-Dhahir, “Physical-layer security of a
buffer-aided full-duplex relaying system,” IEEE Commun. Lett., vol. 20,
no. 9, pp. 1856–1859, Sep. 2016.
[9] B. Fang, Z. Quan, W. Zhong, and W. Shao, “Precoder design for secrecy
maximization in the DF-based MIMO relay networks,” in International
Conference on Wireless Communications & Signal Processing (WCSP),
Oct. 2015.
[10] X. Chen, L. Lei, H. Zhang, and C. Yuen, “Large-scale MIMO relaying
techniques for physical layer security:AF or DF?” IEEE Trans. Wireless
Comm., vol. 14, no. 9, pp. 5135–5146, Sep. 2015.
[11] A. E. Shafie, D. Niyato, and N. Al-Dhahir, “Artificail-noise-aided secure
MIMO full-duplex relay channels with fixed-power transmission,” IEEE
Commun. Lett., vol. 20, no. 8, pp. 1591–1594, Aug. 2016.
[12] H. Wang, Q. Yin, and X. Xia, “Distributed beamforming for physical-
layer security of two-way relay networks,” IEEE Trans. on Signal
Processing, vol. 60, no. 7, pp. 3532–3545, Jul. 2012.
[13] H. Wang, M. Luo, Q. Yin, and X. Xia, “Hybrid cooperative beamforming
and jamming for physical-layer security of two-way relay networks,”
IEEE Trans. Information Forensics ans security, vol. 8, no. 12, pp. 2007–
2020, Dec. 2013.
[14] C. Zhang, H. Gao, T. Lv, Y. Lu, and X. Su, “Beamforming for
secure two-way relay networks with physical layer network coding,”
in Globecom 2014, Dec. 2014, pp. 1734–1739.
[15] Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, “Algorithms
for secrecy guarantee with null space beamforming in two-way relay
networks,” IEEE Trans. on Signal Processing, vol. 62, no. 8, pp. 2111–
2126, Apr. 2014.
[16] Q. Li, W.-K. Ma, and D. Han, “Sum secrecy rate maximization for
full-duplex two-way relay networks using Alamouti-based rank-two
beamforming,” IEEE J. Select. Topics in Signal Process., vol. 10, no. 8,
pp. 1359–1373, Dec. 2016.
[17] Y. Gao, Y. Cai, Q. Shi, B. Champagne, and M. Zhao, “Joint transceiver
designs for secure communications over MIMO relay,” in IEEE In-
ternational Conference on Acoustics, Speech and Signal Processing
(ICASSP), Mar. 2016.
[18] X. Wang, Z. Zhang, and K. Long, “Secure beamforming for multiple-
antenna amplify-and-forward relay networks,” IEEE Trans. on Signal
Processing, vol. 64, no. 6, pp. 1477–1492, Mar. 2016.
[19] J. Lee, “Optiaml power alloation for physical layer security in multi-hop
DF relay networks,” IEEE Trans. Wireless Comm., vol. 15, no. 1, pp.
28–38, Jan. 2016.
[20] T. Riihonen, S. Werner, and R. Wichman, “Mitigation of loopback
self-interference in full-duplex MIMO relays,” IEEE Trans. on Signal
Processing, vol. 59, no. 12, pp. 5983–5993, Dec. 2011.
[21] H. A. Suraweera, I. Krikidis, G. Zheng, C. Yuen, and P. J. Smith, “Low-
complexity end-to-end performance optimization in MIMO full-duplex
relay systems,” IEEE Trans. Wireless Comm., vol. 13, no. 2, pp. 913–
9278, Feb. 2014.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.