{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T09:39:57Z","timestamp":1767173997726,"version":"build-2238731810"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T00:00:00Z","timestamp":1398643200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.<\/jats:p>","DOI":"10.1186\/1687-6180-2014-56","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T07:04:39Z","timestamp":1398668679000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Distributed beamforming designs to improve physical layer security in wireless relay networks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Mujun","family":"Qian","sequence":"first","affiliation":[]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Youhua","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,28]]},"reference":[{"issue":"11","key":"622_CR1","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TCOMM.2003.818096","volume":"51","author":"A Sendonaris","year":"2003","unstructured":"Sendonaris A, Erkip E, Aazhang B: User cooperative diversity-part I: system description. IEEE Trans. Commun. 2003, 51(11):1927-1938. 10.1109\/TCOMM.2003.818096","journal-title":"IEEE Trans. Commun"},{"issue":"11","key":"622_CR2","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1109\/TCOMM.2003.819238","volume":"51","author":"A Sendonaris","year":"2003","unstructured":"Sendonaris A, Erkip E, Aazhang B: User cooperative diversity-part II: implementation aspects and performance analysis. IEEE Trans. Commun. 2003, 51(11):1939-1948. 10.1109\/TCOMM.2003.819238","journal-title":"IEEE Trans. Commun"},{"issue":"12","key":"622_CR3","doi-asserted-by":"publisher","first-page":"3062","DOI":"10.1109\/TIT.2004.838089","volume":"51","author":"JN Laneman","year":"2004","unstructured":"Laneman JN, Tse DNC: Cooperative diversity in wireless networks: efficient protocols and outage behaviour. IEEE Trans. Inf. Theory 2004, 51(12):3062-3080.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"622_CR4","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD: The wire-tap channel. Bell Syst. Tech. J. 1975, 54(8):1355-1387. 10.1002\/j.1538-7305.1975.tb02040.x","journal-title":"Bell Syst. Tech. J"},{"issue":"4","key":"622_CR5","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"SK Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong SK, Hellman ME: The Gaussian wiretap channels. IEEE Trans. Inf. Theory 1978, 24(4):451-456. 10.1109\/TIT.1978.1055917","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"622_CR6","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"Gopala PK, Lai L, Gamal HE: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54(10):4687-4698.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"622_CR7","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/ALLERTON.2008.4797687","volume-title":"The 46-th Annual Allerton Conference on Communication, Control and Computing","author":"L Dong","year":"2008","unstructured":"Dong L, Zhu H, Petropulu AP, Poor HV: Secure wireless communication via cooperation. In The 46-th Annual Allerton Conference on Communication, Control and Computing. Urbana-Champaign, IL, USA; 23\u201326 September 2008:1132-1138."},{"issue":"3","key":"622_CR8","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong L, Han Z, Petropulu AP, Poor HV: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58(3):1875-1888.","journal-title":"IEEE Trans. Signal Process"},{"issue":"10","key":"622_CR9","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis I, Thompson S, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8(10):5003-5011.","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"4","key":"622_CR10","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/JCN.2012.6292243","volume":"14","author":"J Kim","year":"2012","unstructured":"Kim J, Ikhlef A, Schober R: Combined relay selection and cooperative beamforming for physical layer Security. IEEE J. Commun. Netw. 2012, 14(4):364-373.","journal-title":"IEEE J. Commun. Netw"},{"issue":"1","key":"622_CR11","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TSP.2011.2172433","volume":"60","author":"C Jeong","year":"2012","unstructured":"Jeong C, Kim I-M, Kim DI: Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Trans. Signal Process. 2012, 60(1):310-325.","journal-title":"IEEE Trans. Signal Process"},{"issue":"1","key":"622_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TWC.2012.120412.101358","volume":"12","author":"X He","year":"2013","unstructured":"He X, Yener A: End-to-end secure multi-hop communication with untrusted relays. IEEE Trans. Wirel. Commun. 2013, 12(1):1-11.","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"10","key":"622_CR13","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Zou Y, Wang X, Shen W: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Select. Areas Commun. 2013, 31(10):2099-2111.","journal-title":"IEEE J. Select. Areas Commun"},{"issue":"1","key":"622_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2012.2227313","volume":"20","author":"Y Yang","year":"2013","unstructured":"Yang Y, Li Q, Ge J, Ching PC: Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 2013, 20(1):35-38.","journal-title":"IEEE Signal Process. Lett"},{"issue":"12","key":"622_CR15","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TIFS.2013.2287046","volume":"8","author":"H-M Wang","year":"2013","unstructured":"Wang H-M, Luo M, Yin Q, Xia X-G: Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans. Inf. Forensics Secur. 2013, 8(12):2007-2020.","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"2","key":"622_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/LSP.2014.2298497","volume":"21","author":"Z Chen","year":"2014","unstructured":"Chen Z, Li H, Cui G, Rangaswamy M: Adaptive transmit and receive beamforming for interference mitigation. IEEE Signal Process. Lett. 2014, 21(2):235-239.","journal-title":"IEEE Signal Process. Lett"},{"key":"622_CR17","first-page":"528","volume-title":"Matrix Analysis and Applications","author":"X Zhang","year":"2004","unstructured":"Zhang X: Matrix Analysis and Applications. Tsinghua University Press, Beijing; 2004:528-541."}],"updated-by":[{"DOI":"10.1186\/1687-6180-2014-129","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T00:00:00Z","timestamp":1408320000000}}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-56.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-56\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-56.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T23:41:14Z","timestamp":1630539674000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,28]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["622"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-56","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,28]]},"assertion":[{"value":"13 March 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"56"}}