Joint Beamforming and Jamming Design for Mmwave Information Surveillance Systems

Yunlong Cai,Cunzhuo Zhao,Qingjiang Shi,Geoffrey Ye Li,Benoit Champagne
DOI: https://doi.org/10.1109/jsac.2018.2825718
IF: 16.4
2018-01-01
IEEE Journal on Selected Areas in Communications
Abstract:This paper addresses the design of joint beamforming and jamming for a millimeter wave (mmWave) information surveillance system where a suspicious transmitter in the network sends messages to a suspicious receiver under the supervision of a surveillant controller (SC), which not only carries out the duty of a base station or other access point, but also legitimately monitor the suspicious link. Specifically, we seek to maximize the effective monitoring rate for information surveillance by jointly optimizing the analog transmit and receive beamforming vectors of the suspicious link, the analog jamming and monitoring beamforming vectors at the SC and the jamming signal’s power level under transmit power, successful monitoring, and self-interference power constraints at the SC, along with unit modulus constraint on the elements of the radio frequency analog beamforming vectors. The resulting optimization problem is quite challenging due to the tight coupling of the design variables in the objective function and constraints. To solve it, we develop a novel algorithm based on the penalty dual decomposition (PDD) technique, where the exacting constraints are penalized and dualized into the objective function as augmented Lagrangian components. The proposed PDD-based algorithm performs double-loop iterations, i.e., the inner loop resorts to the concave-convex procedure to update the optimization variables; while the outer loop adjusts the Lagrange multipliers and penalty parameter of the augmented Lagrangian cost function. We show that the proposed PDD-based joint beamforming and jamming algorithm converges to a stationary solution of the original problem. Based on our simulation results, the proposed algorithm achieves significantly better performance than the conventional beamforming and jamming algorithms.
What problem does this paper attempt to address?