Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks

Việc bảo mật truyền thông vô tuyến

từ nơi gửi đến nơi nhận thường sử dụng các

thuật toán mật mã để mã hoá dữ liệu tại các tầng

phía trên trong mô hình phân lớp. Một xu hướng

khác đang được quan tâm rộng rãi là bảo mật

tầng vật lý dựa trên kỹ thuật truyền tin

beamforming và kỹ thuật tương tác fading kênh

chủ động. Xu hướng này hiện đang được thu hút

cả trong giới công nghiệp và nghiên cứu. Đóng

góp của bài báo này là làm rõ khả năng bảo mật

tầng vật lý và so sách chúng với phương pháp

bảo mật dùng kỹ thuật mật mã truyền thống. Bài

báo cũng so sánh hai kỹ thuật chuyển tiếp được

sử dụng chính trong bảo mật tầng vật lý cho

mạng vô tuyến chuyển tiếp là Amplify-andForward và Decode-and-Forward

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 1

Trang 1

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 2

Trang 2

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 3

Trang 3

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 4

Trang 4

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 5

Trang 5

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 6

Trang 6

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 7

Trang 7

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 8

Trang 8

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks trang 9

Trang 9

pdf 9 trang minhkhanh 5400
Bạn đang xem tài liệu "Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks", để tải tài liệu gốc về máy hãy click vào nút Download ở trên

Tóm tắt nội dung tài liệu: Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks

Decode - And-forward vs. amplify - andforward scheme in physical layer security for wireless relay beamforming networks
Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin 
No 2.CS (10) 2019 9 
Decode-and-Forward vs. Amplify-and-
Forward Scheme in Physical Layer Security 
for Wireless Relay Beamforming Networks 
Nhu Tuan Nguyen 
Abstract— To secure communication from the 
sender to the receiver in wireless networks, 
cryptographic algorithms are usually used to 
encrypt data at the upper layers of a multi-tiered 
transmission model. Another emerging trend in 
the security of data transmitted over wireless 
networks is the physical layer security based on 
beamforming and interference fading 
communication technology and not using 
cryptographic algorithms. This trend has 
attracted increasing concerns from both 
academia and industry. This paper addresses 
how physical layer security can protect secret 
data compare with the traditional cryptographic 
encryption and which is the better cooperative 
relaying scheme with the state of the art 
approached methods in wireless relaying 
beamforming network. 
Tóm tắt— Việc bảo mật truyền thông vô tuyến 
từ nơi gửi đến nơi nhận thường sử dụng các 
thuật toán mật mã để mã hoá dữ liệu tại các tầng 
phía trên trong mô hình phân lớp. Một xu hướng 
khác đang được quan tâm rộng rãi là bảo mật 
tầng vật lý dựa trên kỹ thuật truyền tin 
beamforming và kỹ thuật tương tác fading kênh 
chủ động. Xu hướng này hiện đang được thu hút 
cả trong giới công nghiệp và nghiên cứu. Đóng 
góp của bài báo này là làm rõ khả năng bảo mật 
tầng vật lý và so sách chúng với phương pháp 
bảo mật dùng kỹ thuật mật mã truyền thống. Bài 
báo cũng so sánh hai kỹ thuật chuyển tiếp được 
sử dụng chính trong bảo mật tầng vật lý cho 
mạng vô tuyến chuyển tiếp là Amplify-and-
Forward và Decode-and-Forward. 
Keywords— Physical layer security; DC 
Programming and DCA; Amplify-and-Forward. 
Từ khoá— Bảo mật tầng vật lý; DC 
Programming and DCA; Amplify-and-Forward. 
This manuscript is received on July 18, 2019. It is 
commented on November 20, 2019 and is accepted on 
November 30, 2019 by the first reviewer. It is commented on 
December 15, 2019 and is accepted on December 25, 2019 
by the second reviewer. 
I. INTRODUCTION 
Most of the recent methods of ensuring 
security in the communication system are based 
on cryptography techniques or algorithms to 
encrypt the content of the messages from the 
sender to the receiver. The concept of secrecy 
communication was first proposed in the 
pioneering work from 1949 by Shannon [1], in 
which secrecy communication was investigated 
from the viewpoint of information theory. It 
was proposed therein that the approach termed 
“one-time pad” could achieve the perfect 
secrecy. The traditional communication 
security methods often use cryptographic 
algorithms at the upper layers of multi-layer 
communication models being studied and 
widely applied. Recently, these methods have 
still been considered to be safe in many 
application models. However, the security of 
these cryptographic algorithms often depends 
on the computational complexity of decryption 
without private keys. Therefore, when quantum 
computers are actually applied, this difficulty 
will no longer be a challenge in crypto analysis. 
Another trend for radio network security that 
has been extensively researched lately is 
physical layer security (PLS) without the use of 
cryptographic algorithms and resistance to 
quantum computers. In the recent years, PLS 
has been investigated both as an alternative and 
as a complementary approach to conventional 
cryptographic methods [2,3]. Actually, the 
research on physical layer security was 
pioneered by Dr. Aaron D. Wyner since 1975 
[4]. Wyner has demonstrated that it is possible 
to transmit security information at Cs rate in a 
communication system that has the presence of 
an eavesdropper (Cs ≥ 0). That is the secrecy 
capacity of a discrete memoryless channel was 
the maximum value of the difference between 
the mutual information of the legitimate 
channel and the mutual information of the 
Journal of Science and Technology on Information Security 
10 No 2.CS (10) 2019 
wiretap channel. At that time, Wyner made an 
important assumption in his results that the 
channel between Alice and Eve, called the 
wire-tap channel, had a greater loss than the 
channel from Alice to the legal recipient Bob, 
also known as the main channel. This 
assumption is not easy to guarantee because the 
wire-tap channel is often unchecked. Hence, the 
Wyner's idea was not really interested in the 
following years. 
Over the past decade, with the development 
of wireless communications technology, 
especially multi-antenna communications and 
beamforming techniques, physical layer 
security solutions have been studied widely 
[5,9]. A great effort to increase the achievable 
secrecy rate in physical layer security is 
cooperative nodes networks [3, 9] with act two 
roles are cooperative relaying and cooperative 
jamming (CJ) [10, 12]. In which, the secrecy 
rate value is defined as 
1,
min(log(1 ) log(1 )).s d ej
j K
R SNR SNR
=
= + − + (1) 
Where, SNRd and SNRej are the signal-to-
noise-ratio at the legitimate destination and the 
jth eavesdropper, respectively; K is the number 
of eavesdroppers in system. 
This paper focused on the cooperative 
relaying network with two main relaying 
schemes are Amplify-and-Forward (AF) and 
Decode-and-Forward (DF). This paper presents 
the state-of-the-art cooperative relaying 
networks and the experiments to show detail 
the effects of some techniques and schemes in 
it. These wireless relay beamforming networks 
are modeled as nonconvex optimization 
problems. In which, the solution of these 
optimization problem are the beamforming 
weights of the relay stations, the objective 
function is the value of the secrecy rate of the 
system Rs (bits/symbol). 
We investigate in the case  ... 
constrains [19], then we proposed DCA-AFME 
scheme by applied DCA to solve this problem 
as the following. 
Journal of Science and Technology on Information Security 
14 No 2.CS (10) 2019 
DCA-AFME SCHEME 
Input: Channel coefficients from source to 
relays hs, from relays to destination hd and from 
relays to eavesdroppers Hil, the predefined 
threshold . 
Initialization. Chose a random initial point 0x , 
l=0 
Repeat: l = l+1, calculate xl by solve this 
subproblem: 
𝑚𝑖𝑛
𝒙,𝑡
− (𝑯𝑠𝒙
𝑡−1)†𝒙 + 𝜏𝑡 
𝑠. 𝑡. 𝒙†𝑪𝑘
+𝒙 − 2(𝑪𝑘
−𝒙𝑙−1)†𝒙⟨𝒙 −
𝒙𝑙−1, 2(𝑪𝑘
−𝒙𝑙−1)⟩𝒙 ≤ 1 + (𝒙𝑙−1)†𝑪𝑘
−𝒙𝑙−1 +
2((𝒙𝑙−1)†𝑪𝑘
−𝒙𝑙−1) + 𝑡, ∀𝑘 ∈ 𝜅, 
𝒙†𝑫𝑖𝒙 ≤ 1, ∀𝑖 ∈ 𝑀, 𝑡 ≥ 0 
Until: 
‖𝒙𝑙−𝒙𝑙−1‖
1+‖𝒙𝑙−1‖
≤ 𝜀 or 
|𝑓(𝒙𝑙)−𝑓(𝒙𝑙−1)|
1+|𝑓(𝒙𝑙−1)|
≤ 𝜀 
where 𝑓(𝒙𝑙) = (𝒙𝑙)†𝑯𝑠𝒙
𝑙 
Output: Rs = h(t
l, xl), SNRe, SNRe (2). 
B. The approaches for DF problem 
Null steering 
The authors in [9] focus on the case of Null 
steering beamforming. In which, the signal is 
completely nulled out at all eavesdroppers, then 
the problem (5) addition constraints 
𝐰′𝐡𝑟𝑒𝑗𝐰 = 0𝐾×1 
and rewrite as 
max 
𝒘
(log (
𝜎2 + |∑ ℎ𝑟𝑑,𝑚𝑤𝑚
𝑀
𝑚=1 |
2
𝜎2
)) 
s.t. 𝐰†𝐰 ≤ 𝑃𝑅 
𝐰′𝐡𝑟𝑒𝑗𝐰 = 0𝐾×1. 
 (10) 
Then can be rewritten as 
max
𝒘
 𝐰′𝐇𝑟𝑑𝐰 
s.t. 𝐰†𝐰 ≤ 𝑃𝑅 
𝐰′𝐡𝑟𝑒𝑗𝐰 = 0𝐾×1. 
 (11) 
Where 
𝐇𝑟𝑑 = 𝐡′𝑟𝑑𝐡𝑟𝑑 and 𝐡𝑟𝑑 = [ℎr𝑑,1,  , ℎ𝑟𝑑,𝑀]
𝑇 
By used the equality power constrain 
𝑤†𝑤 = 𝑃𝑅 instead of inequality power 
constrain as 
max
𝐰†𝐰=𝑃𝑅
 𝐰′𝐇𝑟𝑑𝐰 
s.t. 𝐰′𝐡𝑟𝑒𝑗𝐰 = 0𝐾×1. 
 (12) 
The optimization problem (12) has the 
optimal solution given by 
𝒘 =
√𝑃𝑅
‖(𝐈𝑀 − 𝐏𝑟𝑒)𝐡𝑟𝑑‖
(𝐈𝑀 − 𝐏𝑟𝑒)𝐡𝑟𝑑 , 
where 𝐏𝑟𝑒 = 𝐇𝑟𝑒(𝐇𝑟𝑒
† 𝐇𝑟𝑒)
−1
𝐇𝑟𝑒
†
 is the 
orthogonal projection matrix onto the subspace 
spanned by the columns of 𝑯𝒓𝒆. 
3) DC programming and DCA approach 
In [18], we proposed a DC decomposition 
by recall problem (5) with the total power 
constrain as 
𝑚𝑎𝑥
𝒘
𝜎2 + 𝒘†𝑯𝑟𝑑𝒘
𝑚𝑎𝑥𝑗=1..𝐾(𝜎2 + 𝒘†𝑯𝑟𝑒,𝑗𝒘)
𝑠. 𝑡
𝒘†𝒘 ≤ 𝑃𝑅
 (13) 
equivalent to 
𝑚𝑖𝑛
𝒘,𝒕
−
𝜎2 + 𝒘†𝑯𝑟𝑑𝒘
𝑡
s.t. 𝒘†𝒘 ≤ 𝑃𝑅, 𝑡 > 0, 
𝜎2 + 𝒘†𝑯𝑟𝑒,𝑗𝒘 ≤ 𝑡, ∀𝑗 ∈ 𝐾. 
 (14) 
Change to real variables form we have an 
equivalent problem as 
𝑚𝑖𝑛 
𝒙,𝑡
0 −
𝜎2 + 𝒙𝑇𝒁𝒙
𝑡 
𝑠. 𝑡. 𝒙𝑇𝑩𝑗𝒙 ≤ 𝑡 − 𝜎
2, ∀𝑗 ∈ 𝐾 
𝒙𝑇𝒙 ≤ 𝑃𝑅 , 𝑡 ≥ 0 
 (15) 
where 
𝒁 = [
𝑅𝑒(𝑯𝑟𝑑) − 𝐼𝑚(𝑯𝑟𝑑)
𝐼𝑚(𝑯𝑟𝑑) 𝑅𝑒(𝑯𝑟𝑑)
] , 𝑥 = [
𝑅𝑒(𝒘)
𝐼𝑚(𝒘) 
] 
𝑩𝑗 = [
𝑅𝑒( 𝑯𝑟𝑒,𝑗) − 𝐼𝑚( 𝑯𝑟𝑒,𝑗)
𝐼𝑚(𝑯𝑟𝑒,𝑗) 𝑅𝑒(𝑯𝑟𝑒,𝑗)
]
𝑇
. 
Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin 
No 2.CS (10) 2019 15 
The problem (15) is restated as a standard 
DC program, then we can apply DCA 
algorithm to have DCA-DFME scheme 
following: 
The DCA-DFME scheme [18]: 
Input: The channel coefficient matrix Bj, Z 
Initialization: the random initial points x0, t0>0 
and set l=0, 𝒖0 = (𝑡0, 𝒙0)
Repeat: l=l+1, to calculate 𝒖𝑙 = (𝑡𝑙 , 𝒙𝑙) by 
solving the following subproblem: 
𝑚𝑖𝑛
𝒖=(𝑡,𝒙)
0 − ⟨𝑦𝑙−1, 𝒖⟩
𝑠. 𝑡. 𝒙𝑇𝑩𝑗𝒙 ≤ 𝑡 − 𝜎
2, ∀𝑗 ∈ 𝐾 
𝒙𝑇𝒙 ≤ 𝑃𝑟, 𝑡 > 0,
Until: 
‖𝒖𝑙−𝒖𝑙−1‖
1+‖𝒖𝑙‖
≤ 𝜀
 or 
|𝑓(𝒖𝑙)−𝑓(𝒖𝑙−1)|
1+|𝑓(𝒖𝑙)|
≤ 𝜀 
where 𝑓(𝒖𝑙) =
𝜎2+(𝒙𝑙)
𝑇
𝒁𝒙𝑙
𝑡𝑙
Output: 
𝑅𝑠 = ℎ(𝑡
𝑙 , 𝒙𝑙) = 𝑓(𝒖𝑙), SNRd, SNRe. 
V. EXPERIMENT AND RESULTS 
This section presents the experimental 
results and evaluation of all four proposed 
methods in part IV. We compare the quality of 
AF scheme to DF scheme in wireless relying 
network from the perspectives of the values of 
secrecy rate. It shows that, DF scheme has 
better secrecy performance than AF scheme. In 
the rest of this section, we also describe 
received signal-to-noise-ratio at destination and 
eavesdroppers. From this viewpoint, it is clear 
that, the signal received at eavesdroppers is too 
bad then they cannot decode to get the 
messages which send from relays. 
A. Generating experimental datasets: 
We focus on the wireless communication 
model operating under both AF and DF 
schemes with the appearance of multiple 
eavesdropping station as Fig.1 with the two 
cases of number of eavesdropping stations 
used as K = 5 and 7 eavesdroppers; The 
relay nodes variable from 5 to 40 nodes; the 
power consumption P = 30 dBm. Assuming 
a one-way communication system, these 
channel coefficients are randomly generated 
according to the Gaussian distribution and 
are known in advance. 
For each case, we generated 100 datasets of 
channel coefficient values from the source 
station to the relay station and from the relay 
stations to the destination one and to the 
eavesdroppers with the given configuration 
parameters as above mentioned. These datasets 
are shared for all four methods. 
B. Experimental results 
With the assumption of one-way 
communication system model (considering 
only the direction from source station S to 
receiver D without the opposite direction) as 
illustrated in Fig.2 with the given parameters. 
For each case, 100 independent tests were 
carried out and took the average result for the 
optimal solution value and the signal-to-noise-
ratio received at legitimate destination and 
eavesdroppers for the comparison. The 
experimental results are as follows: 
Fig.2. AF vs. DF in wireless relay 
beamforming network with 5 eavesdroppers 
The optimal solution values: The results 
shown in Fig.2 and Fig.3 reflect the fact that, 
the value of the secrecy rate RS always 
increasing with the number of relay stations. 
Specially, it shown an important thing that, 
the value 𝑅𝑠 has strong increasing when the 
number of relay nodes reached around three 
times of the number of eavesdroppers, after 
that it is lightly increasing. 
Journal of Science and Technology on Information Security 
16 No 2.CS (10) 2019 
Fig.3: AF vs. DF in wireless relay beamforming 
network with 7 eavesdroppers 
The secrecy rate efficiency of DF scheme 
is definitely higher than AF scheme as in 
figures. The gap of DC programming and 
DCA method with SDR method in AF 
network is clear. In contrast, this gap in DF 
network is quite small. 
The maximum value Rs = 5 bits/symbol 
when the number of relay nodes is 40 
respected to the case of DF network and 40 
relays with 5 eavesdroppers (Fig.2). When the 
number of relays equal to the number of 
eavesdroppers then the Rs value down to zero 
for the case of Null steering method as in (12). 
The SNR values: The data in Table 2 
illustrates the SNR values at both destination 
(D) and eavesdroppers (E) as formula (2) and 
(4). It is clearly that, with the optimal 
beamforming weights at the relays, the SNRs 
received at eavesdropper are too small. As 
Wyner’s condition [4] that the wire-tap 
channel had a greater loss than the main 
channel is not difficult to satisfy with the 
beamforming and fading techniques. The SNR 
values at eavesdroppers in the Null steering 
case as in the Tables 2 is suitable with the 
constrain of this system model (11). When the 
number of relays and eavesdroppers are 
equally, these SNRs become to similar then 
the Rs values down to zero (1) as in Fig.2 and 
Fig.3. 
IV. CONCLUSION 
With the emergence of 5G communication 
networks and the powerful development of IoT 
networks, wireless communication networks 
are gradually replacing fiber optic 
communication networks. Therefore, the study 
of the security method of physical layers for 
wireless networks is very necessary and really 
being widely concerned around the world. 
According to the information theory, the 
physical layer security problem for the wireless 
network based on Amplify-and-Forward 
scheme is used as the optimal form with the 
goal of increasing the speed of secrecy rate (Rs) 
with a primary constraint on signal source 
power and considering the amplification factor 
at transition stations. This problem has a non-
convex form and is difficult to solve to find a 
globally optimal solution. Some solutions for 
finding solutions to this optimization problem 
are the amplification values of the transition 
stations so that the most optimal security rate 
published recently is often the solution to an 
approximated solution. Therefore, the results 
suggest a new solution method based on the 
study of applying DC programming and DCA 
to solve these difficult problems to find better 
optimal solutions that have shown new and 
scientific features. 
TABLE 2: THE SNR RECEIVED AT D AND E VS. NUMBER OF RELAYS WITH PS = 30 dBm, 5 EAVESDROPPERS. 
Number of Relays 
5 10 15 20 25 30 35 
SNR D E D E D E D E D E D E D E 
DCA_AF 9.4 0.31 70.4 0.30 172.1 0.31 260.3 0.32 325.4 0.32 451.2 0.33 534.8 0.33 
SDR_AF 3.0 0.43 25.1 0.46 77.5 0.58 105.9 0.51 140.7 0.50 220.2 0.50 252.1 0.53 
DCA_DF 60.4 2.46 165.5 0.03 296.4 0.01 473.7 0.00 589.3 0.00 741.7 0.00 880.7 0.00 
SDR_DF 30.3 37.5 157.9 0.00 292.2 0.00 470.5 0.00 587.0 0.00 740.0 0.00 879.3 0.00 
Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin 
No 2.CS (10) 2019 17 
REFERENCE 
[1]. C. E. Shannon, “Communication theory of secrecy 
systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 
656–715, Oct. 1949, 
[2]. G. de Meulenaer, F. Gosset, F.-X. Standaert, and 
O. Pereira, “On the Energy Cost of 
Communication and Cryptography in Wireless 
Sensor Networks,” in 2008 IEEE International 
Conference on Wireless and Mobile Computing, 
Networking and Communications, 2008, pp. 580–
585, doi: 10.1109/WiMob.2008.16. 
[3]. D. Wang, B. Bai, W. Zhao, and Z. Han, “A Survey 
of Optimization Approaches for Wireless Physical 
Layer Security,” ArXiv190107955 Cs Math, Jan. 
2019. 
[4]. A. D. Wyner, “The Wire-Tap Channel,” Bell Syst. 
Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975, 
doi: 10.1002/j.1538-7305.1975.tb02040.x. 
[5]. I. Csiszar and J. Korner, “Broadcast channels with 
confidential messages,” IEEE Trans. Inf. Theory, 
vol. 24, no. 3, pp. 339–348, May 1978. 
[6]. F. Jameel, S. Wyne, G. Kaddoum, and T. Q. 
Duong, “A Comprehensive Survey on Cooperative 
Relaying and Jamming Strategies for Physical 
Layer Security,” IEEE Commun. Surv. Tutor., vol. 
21, no. 3, pp. 2734–2771, 2019, doi: 
10.1109/COMST.2018.2865607. 
[7]. Tạp chí An toàn thông tin, “Bảo mật dữ liệu tầng 
vật lý trong mạng truyền tin không dây: Những ý 
tưởng đầu tiên và hướng nghiên cứu hiện nay”, 
viet-cua-101779. [Accessed: 15-Feb-2020]. 
[8]. X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-
H. Chen, “A Survey on Multiple-Antenna 
Techniques for Physical Layer Security,” IEEE 
Commun. Surv. Tutor., vol. 19, no. 2, pp. 1027–
1053, Secondquarter 2017. 
[9]. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, 
“Improving Wireless Physical Layer Security via 
Cooperating Relays,” IEEE Trans. Signal Process., 
vol. 58, no. 3, pp. 1875–1888, Mar. 2010, doi: 
10.1109/TSP.2009.2038412. 
[10]. Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, 
“Enhancing Physical-Layer Secrecy in 
Multiantenna Wireless Systems: An Overview of 
Signal Processing Approaches,” IEEE Signal 
Process. Mag., vol. 30, no. 5, pp. 29–40, Sep. 
2013, doi: 10.1109/MSP.2013.2256953. 
[11]. A. Mukherjee, S. A. A. Fakoorian, J. Huang, and 
A. L. Swindlehurst, “Principles of Physical Layer 
Security in Multiuser Wireless Networks: A 
Survey,” IEEE Commun. Surv. Tutor., vol. 16, no. 
3, pp. 1550–1573, 2014. 
[12]. H.-M. Wang and X.-G. Xia, “Enhancing wireless 
secrecy via cooperation: signal design and 
optimization,” IEEE Commun. Mag., vol. 53, no. 
12, pp. 47–53, Dec. 2015, doi: 
10.1109/MCOM.2015.7355565. 
[13]. O. G. Aliu, A. Imran, M. A. Imran, and B. Evans, 
“A Survey of Self Organisation in Future Cellular 
Networks,” IEEE Commun. Surv. Tutor., vol. 15, 
no. 1, pp. 336–361, First 2013. 
[14]. F. I. Kandah, O. Nichols, and Li Yang, “Efficient 
key management for Big Data gathering in 
dynamic sensor networks,” in 2017 International 
Conference on Computing, Networking and 
Communications (ICNC), 2017, pp. 667–671, doi: 
10.1109/ICCNC.2017.7876209. 
[15]. Physical Layer Security: Bounds, Codes and 
Protocols (João Barros) - Part 2 
(SPCodingSchool). 
[16]. N. N. Tuan and D. V. Son, “DC Programming and 
DCA for Enhancing Physical Layer Security in 
Amplify-and-Forward Relay Beamforming 
Networks Based on the SNR Approach,” in 
Advanced Computational Methods for Knowledge 
Engineering, vol. 629, N.-T. Le, T. van Do, N. T. 
Nguyen, and H. A. L. Thi, Eds. Cham: Springer 
International Publishing, 2018, pp. 23–33. 
[17]. S. Sarma, S. Agnihotri, and J. Kuri, “Secure 
Communication in Amplify-and-Forward 
Networks with Multiple Eavesdroppers: Decoding 
with SNR Thresholds,” Wirel. Pers. Commun., 
vol. 85, no. 4, pp. 1945–1956, Dec. 2015. 
[18]. N. N. Tuan and T. T. Thuy, “Physical Layer 
Security Cognitive Decode-and-Forward Relay 
Beamforming Network with Multiple 
Eavesdroppers,” in Intelligent Information and 
Database Systems, vol. 11432, N. T. Nguyen, F. L. 
Gaol, T.-P. Hong, and B. Trawiński, Eds. Cham: 
Springer International Publishing, 2019, pp. 254–
263. 
[19]. H. A. Le Thi, V. N. Huynh, and T. P. Dinh, “DC 
Programming and DCA for General DC 
Programs,” in Advanced Computational Methods 
for Knowledge Engineering, Cham, 2014, pp. 15–
35, doi: 10.1007/978-3-319-06569-4_2. 
ABOUT THE AUTHOR 
M.Sc Nhu Tuan Nguyen 
Workplace: Vietnam Information 
Security Journal 
Email:nguyennhutuan@bcy.gov.vn 
The education process: received 
the Master of science degree in 
Engineering from Academy of 
Cryptography Technique in 
2007. He is a PhD student in 
Academy of Cryptography Technique. 
Research today: machine learning and data mining 
in cyber security, cloud computing security, 
physical layer security. 

File đính kèm:

  • pdfdecode_and_forward_vs_amplify_andforward_scheme_in_physical.pdf