Resource Allocation for Secure OFDMA
Decode-and-Forward Relay Networks
Derrick Wing Kwan Ng and Robert Schober
Department of Electrical and Computer Engineering, University of British Columbia, Canada
Email: wingn@ece.ubc.ca, rschober@ece.ubc.ca
Abstract— In this paper, we formulate an optimization problem
for resource allocation and scheduling in orthogonal frequency di-
vision multiple access (OFDMA) half-duplex decode-and-forward
(DF) relay assisted networks. Our problem formulation takes
into account artificial noise generation to combat a multiple
antenna eavesdropper. The secrecy data rate, power, and sub-
carrier allocation policies are optimized to maximize the average
secrecy outage capacity (bit/s/Hz securely delivered to the users via
relays). The optimization problem is solved by dual decomposition
which results in an efficient iterative algorithm. Simulation results
illustrate that the proposed iterative algorithm converges in a small
number of iterations and guarantees a non-zero secrecy date rate
for a given target secrecy outage probability.
I. I NTRODUCTION
In recent years, there has been a growing interest in
information-theoretic physical layer (PHY) security [1]-[7], as
a complement to traditional cryptographic encryption adopted
in the application/networks layer. The concept of creating a
perfectly secure communication link was first established by
Wyner [1]. Wyner demonstrated that a source and a destination
can exchange perfectly secure messages, if the eavesdropper’s
channel is a degraded version of the main channel. As a result,
secure communication via different forms of artificial noise gen-
eration has been proposed in the literature. In [2] and [3], power
allocation problems for ergodic secrecy capacity maximization
are studied for different system configurations. However, the
assumption of ergodic channels in [2], [3] cannot be justified for
delay constrained applications in practice, since the transmitted
packets of these applications only experience slow fading. In [4]
and [5], the resource allocation in OFDMA systems with PHY
security considerations was studied. On the other hand, power
allocation for systems employing cooperative jamming enabled
by amplify-and-forward and decode-and-forward (DF) relays
was investigated in [6] and [7], respectively. In these works,
the global channel state information (CSI) of the eavesdroppers
is assumed to be known at a centralized unit such that security
can always be guaranteed. However, eavesdroppers are usually
silent to hide their existence. Thus, the CSI of the eavesdroppers
may not be available for the resource allocation in practice. As a
result, a secrecy outage occurs whenever the scheduled data rate
exceeds the secrecy capacity, which introduces a new quality
of service (QoS) concern for secrecy.
Motivated by the aforementioned prior works, in this paper,
we derive an iterative resource allocation algorithm for OFDMA
DF relaying systems, which ensures secure communication in
slow fading by introducing artificial noise and converges fast
to the optimal solution.
II. OFDMA RELAY NETWORK MODEL
We consider an OFDMA DF downlink system which consists
of a base station (BS) with N
T
antennas, M relays with
N
T
antennas each, an eavesdropper with N
E
antennas, and
K mobile users equipped with a single antenna. We assume
that N
T
>N
E
to ensure secure communication. Both the BS
and the relays adopt multiple-input multiple-out beamforming
(MIMO-BF) to enhance the system performance. The downlink
transmission from the BSs to the users via the relays is
accomplished in two time slots. In the first time slot, the BS
transmits its signals to the relays. Then, in the second time slot,
the relays decode the previously received signals and forward
them to the corresponding users. Meanwhile, the eavesdropper
attempts to eavesdrop the transmitted messages by receiving the
signals in both time slots.
A. Channel Model
The impulse responses of all channels are assumed to be
time-invariant (slow fading). We consider an OFDMA DF relay
assisted system with n
F
subcarriers. The received symbols in
the first time slot at relay m for user k and the eavesdropper
on subcarrier i ∈{1,...,n
F
} are given by, respectively,
y
BRm
[i] = H
BRm
[i]x
k
[i]+ n
m
[i] and (1)
y
B,E
[i] = G
B,E
[i]x
k
[i]+ e
1
[i], (2)
where x
k
[i] ∈ C
NT ×1
denotes the transmitted symbol vector
and C
N×M
is the space of all N ×M matrices with complex en-
tries. H
BRm
[i] ∈ C
NT ×NT
denotes the channel matrix between
the BS and relay m on subcarrier i and G
B,E
[i] ∈ C
NE×NT
is the channel matrix between the BS and the eavesdropper
on subcarrier i. Both variables, H
BRm
[i] and G
B,E
[i], include
the effects of path loss and multipath fading of the associated
channels. n
m
[i] ∈ C
NT ×1
and e
1
[i] ∈ C
NE×1
are the additive
white Gaussian noise (AWGN) in subcarrier i at relay m and the
eavesdropper in the first time slot, respectively. Each entry in
both vectors has distribution CN (0,N
0
), where N
0
is the noise
power spectral density. Here, CN (ν, σ
2
) denotes a complex
Gaussian random variable with mean ν and variance σ
2
. In
the second time slot, relay m decodes the message x
k
[i] and
re-encodes the message as q
m,k
[i] ∈ C
NT ×1
. Then, relay m
forwards the re-encoded message q
m,k
[i] to user k. Therefore,
the signals received at user k and the eavesdropper on subcarrier
i from relay m are given by, respectively,
y
Rm,k
[i] = h
Rm,k
[i]q
m,k
[i]+ n
k
[i] and (3)
y
Rm,E
[i] = G
Rm,E
[i]q
m,k
[i]+ e
2
[i]. (4)
h
Rm,k
[i] ∈ C
1×NT
and G
Rm,E
[i] ∈ C
NE×NT
denote the
channel matrices from relay m to users k and from relay m
to the eavesdropper on subcarrier i, respectively. n
k
[i] ∈ C
1×1
and e
2
[i] ∈ C
NE×1
are the AWGN in subcarrier i at user k
and the eavesdropper in the second time slot, respectively. For
the sake of notational simplicity and without loss of generality,
a normalized noise variance of N
0
=1 is assumed for all
receivers in the following. We also assume that the CSI (path
loss information and multipath fading) of the desired relays
and users are perfectly known at the BS. On the other hand,
since the CSI of the eavesdropper is unavailable at the BS and
relays, in order to secure the desired wireless communication
links, artificial noise signals are generated at both the BS and
relays to degrade the channels between the BS/relays and the
eavesdropper.
Artificial Noise Generation: The BS and relay m choose x
k
[i]
and q
m,k
[i] as the linear combination of the information bearing
signal and an artificial noise signal, i.e.,
x
k
[i] = b
m,k
[i]u
k
[i]+ V
B,Rm
[i]v[i], (5)
q
m,k
[i] = r
m,k
[i]u
k
[i]+ W
Rm,k
[i]w[i], (6)
978-1-4577-0742-1/11/$26.00 ©2011 IEEE 202