Skip to main content

Worst-case-based robust beamforming for wireless cooperative networks

Abstract

It is known that distributed beamforming techniques can improve the performance of relay networks by using channel state information (CSI). In practical applications, there exist unavoidably estimation errors of the CSI, which results in outage of quality of service (QoS) or overconsumption of transmit power. In this paper, we propose two worst-case-based distributed beamforming techniques that are robust to the channel estimation errors. In the worst-case-based approaches, the worst case in a set that includes the actual case is optimized. Therefore, the performance of the actual case can be guaranteed. In our first approach, the maximal total relay transmit power in the set is minimized subject to the QoS constraint. This distributed beamforming problem can be approximately solved using second-order cone programming (SOCP). In our second method, the worst QoS in the set is maximized subject to the constraints of individual relay transmit powers. It is shown that the resultant problem can be approximately formulated as a quasi-convex problem and can be solved by using a bisection search method. Simulation results show that the proposed beamforming techniques are robust to the CSI errors and there is no outage of QoS or power in the proposed methods.

1 Introduction

Relay networks have recently attracted much interest in the literature as they can not only exploit cooperative diversity of different users in the network but also extend the coverage of wireless communication systems[111]. In such networks, users share their communication resources, including bandwidth and transmit power, to help each other in transmitting messages. Different relaying strategies have been proposed to achieve cooperative diversity. Amplify-and-forward (AF), decode-and-forward (DF), and compress-and-forward (CF) relaying protocols have been widely discussed in the literature[3, 4, 11]. Due to its simplicity and low implementation complexity, the AF protocol has become one of the most popular relaying protocols.

To improve the performance of the receiver, one can exploit distributed beamforming techniques by using channel state information (CSI). Distributed beamforming approaches that assume perfectly known CSI have been well studied in[1216]. In[12] and[13], relay networks that consist of one source and one destination together with multiple relays are considered and the optimal power allocation at the relays is addressed by using the knowledge of instantaneous CSI. While in[14], the optimal power allocation at the relays is obtained by making use of the second-order statistics of the CSI. The distributed beamforming problems for the relay networks that are comprised of multiple relays and multiple pairs of source and destination are proposed in[15] and[16]. The near-optimal solutions to those beamforming problems are obtained by using second-order cone programming (SOCP)[15] and semi-definite programming (SDP)[16], respectively.

The perfect knowledge of CSI is, however, difficult to obtain due to various reasons such as the error of channel estimation. Without the perfect knowledge of CSI, the conventional distributed beamformers will suffer from severe performance outage in practical applications. Many robust distributed beamforming techniques for relay networks have been proposed in the literature[1724]. Several Bayesian-based beamforming approaches for multiple-input multiple-output (MIMO) relay networks are developed in[17, 19] and[20], which consider optimizing an average objective function over channel uncertainties. When the requirement of quality of service (QoS) is considered, worst-case-based beamforming techniques are proposed in[18, 2124]. Relay networks consisting of one source, one relay, and one destination with multiple antennas are considered in[18], while robust beamforming techniques that consider the relay networks consisting of one source, one destination, and multiple relays equipped with single antenna are proposed to relieve the performance degradation[21, 23]. In[21], the estimated CSI from the relays to the destination is assumed to have errors, while the CSI from the source to the relays is assumed to be perfectly known. However, both the source-to-relay and relay-to-destination channels are assumed to have estimation errors in[23]. The beamforming approaches in[22] and[24] are proposed for the relay networks consisting of multiple sources, relays and destinations, which consider the case that the channel uncertainty is imposed on the correlation matrices of the channel vectors. It is also assumed that the uncertainties of the correlation matrices are independent to each other. Since the matrices are functions of the same channel vectors, such assumptions may deviate from the practical situations. In addition, the resultant beamforming problems of[2224] are formulated as SDP problems. Compared with SOCP, SDP has much higher computational complexity.

In this paper, we propose two worst-case-based robust distributed beamforming approaches for AF-based relay networks with one source, one destination, and multiple relays. We assume that both the channel vectors of the source-to-relays and the relays-to-destination have estimation errors with known norm bounds. In both of our beamforming approaches, the worst case of the total/individual relay transmit power and the worst case of the receive QoS in the norm-bound-determined set are found by solving several sub-problems, which are shown to have closed-form solutions. It is shown that the solutions to these sub-problems are consistent to each other, and the common case is referred to the worst case. We then optimize the performance of the worst case to improve the performance of the network. In our first approach, the maximal total relay transmit power in the set is minimized subject to the constraint of the receive QoS. In our second approach, we maximize the worst-case receive QoS under the constraints of individual relay transmit powers. Such a case is of particular interest in mobile communications or ad hoc networks when the relays are restricted by their own battery lifetimes.

It is shown in this paper that the first worst-case-based beamforming problem can be approximately solved using SOCP and the second beamforming problem can be approximately formulated as a quasi-convex problem, which can be solved by using a bisection search procedure. The problem of each step in the bisection search procedure is also shown to be an SOCP feasibility problem. Compared to the robust beamforming methods in[2224] that use SDP, the computational complexity of the proposed method is much lower since the computational complexity of SOCP isO( N 3.5 ) while that of SDP isO( N 6.5 )[25]. Here, N denotes the number of variables. Numerical simulations show that the proposed beamforming techniques are robust to the CSI estimation errors and can guarantee no outage of either receive QoS or relay transmit power.

The rest of the paper is organized as follows. The signal model is presented in Section 2. The proposed worst-case-based distributed beamforming approaches are developed in Section 3. In Section 4, some simulation results are shown to illustrate the performance of the proposed methods, and the conclusions are given in Section 5.

Notations Throughout this paper, the bold upper- and lowercase letters denote matrices and vectors, respectively. (·) ij denotes the (i,j)th element of a matrix. The i th element of a vector x is denoted by the corresponding lowercase letter with a subscript, i.e., x i . |·| and · denote the norm of a complex number and the Euclidean norm of a vector, respectively. (·), (·)T and (·)H stand for the conjugate, transpose, and Hermitian transpose, respectively. E{·} is the statistical expectation. Re{·} and Im{·} denote the real and imaginary parts of a complex value, respectively.

2 Signal model

As shown in Figure1, a half-duplex relay network in flat fading channels with one transmitting source, one destination, and R relays is considered. Each of the node is equipped with one antenna. We assume in this paper that there is no direct link between the source and the destination due to the poor quality of the channel state. In practical applications, the coefficients of the source-to-relay and relay-to-destination channels are obtained by certain channel estimation methods[26, 27]. Therefore, there exist unavoidably some estimation errors. Let f ~ i and g ~ i , i = 1,,R, denote the actual channel coefficients of the source-to-relay and relay-to-destination channels, respectively, and e f i and e g i denote the estimation errors of the channel coefficients f ~ i and g ~ i , respectively. Assuming that the errors of the channel coefficients are bounded by some known constants ε > 0 and β > 0[28]:

| e f i | ε , | e g i | β , i = 1 , , R .
Figure 1
figure 1

System model.

Then, the actual channel coefficients belong to the following sets

F i ( ε ) { f i | f i = f ˆ i + δ f i , | δ f i | ε }
(1)
G i ( β ) { g i | g i = ĝ i + δ g i , | δ g i | β }
(2)

where f ˆ i and g ˆ i denote the estimates of the channel coefficients f ~ i and g ~ i , respectively. If δ f i = e f i and δ g i = e g i , then f i = f ~ i and g i = g ~ i . Since the actual channel coefficient can be any element of the set, we can optimize the performance of the worst case in the sets to guarantee the performance of the actual case.

Let us consider a two-stage AF relay transmission scheme. In the first stage of each transmission from the source to the destination, the source broadcasts information to the relays. In the second stage, the signal received by each relay is scaled by a complex coefficient and is then retransmitted to the destination. The signal received by the i th relay in the first stage can be written as

r i ( n ) = f i s ( n ) + η i ( n ) , i = 1 , , R
(3)

where n is the time index, s(n) is the signal transmitted by the source, and η i (n) is the receive noise at the i th relay. In the second stage, the relay transmits a scaled version of its received signal to the destination, which can be written as

t i ( n ) = w i r i ( n ) , i = 1 , , R
(4)

where w i is the complex weight coefficient of the i th relay. We assume in this paper that the weight coefficients are determined by the destination and are then sent back to the relays via low rate feedback channels. Note that such network beamforming is commonly referred to as ‘distributed’ because it is assumed that no relay can share its received signals with any other relay. The signal received at the destination is given by

y ( n ) = i = 1 R g i t i ( n ) + υ ( n )
(5)

where υ(n) denotes the receive noise at the destination. Using (3) and (4), we can rewrite (5) as

y ( n ) = i = 1 R g i w i r i ( n ) + υ ( n ) = i = 1 R g i w i f i s ( n ) signal + i = 1 R g i w i η i ( n ) + υ ( n ) noise .
(6)

Let y s (n) i = 1 R g i w i f i s(n) and y n (n) i = 1 R g i w i η i (n)+υ(n) denote the signal and noise components of the received signal at the destination, respectively. To make the following derivation more concise, we rewrite y s (n) and y n (n) as

y s ( n ) = w H ( f g ) s ( n ) = w H h s ( n )
(7)
y n ( n ) = w H G η ( n ) + υ ( n )
(8)

wherew [ w 1 , , w R ] T ,f [ f 1 , , f R ] T ,g [ g 1 , , g R ] T ,hfg can be viewed as the vector of the equivalent channel coefficients between the source and the destination,η(n) [ η 1 ( n ) , , η R ( n ) ] T , denotes the element-wise Schur-Hamadard product, and G is a diagonal matrix with g i , i = 1,,R, on the diagonal, i.e. G ii g i .

3 Robust distributed beamforming

In this section, we propose two worst-case based distributed beamforming approaches that are robust to the channel estimation errors. In our first approach, the maximal total relay transmit power in the predefined set of the channel coefficients is minimized while the condition of the worst-case QoS is satisfied. In our second method, the lowest QoS in the predefined set of the channel coefficients is maximized while the individual relay transmit powers are constrained.

3.1 Minimize the total relay transmit power

In this subsection, let us consider the beamforming problem that minimizes the worst-case total relay transmit power subject to the constraint that the lowest receive signal-to-noise-ratio (SNR) at the destination is satisfied. We use SNR as the measure of QoS in this paper. This worst-case-based beamforming problem can be written as

min w max f i F i ( ε ) i = 1 , , R P T ( w , f i ) s.t. min f i F i ( ε ) , g i G i ( β ) i = 1 , , R SNR ( w , f i , g i ) γ
(9)

where P T is the total relay transmit power and γ > 0 is the minimal required receive SNR. It should be noticed that the value of γ should not be too large to result in the infeasibility of problem (9). According to (1) and (2), we can rewrite (9) as

min w max | δ f i | ε i = 1 , , R P T ( w , δ f i ) s.t. min | δ f i | ε , | δ g i | β i = 1 , , R SNR ( w , δ f i , δ g i ) γ .
(10)

Using (3) and (4), we can write the transmit power of the i th relay as

P i = E | t i ( n ) | 2 = E | w i f i s ( n ) + w i η i ( n ) | 2 .
(11)

Assuming that the source signal and the relay noises are statistically independent, we can rewrite (11) as

P i = E | w i f i s ( n ) | 2 + E | w i η i ( n ) | 2 = P 0 | w i | 2 | f i | 2 + σ η 2 | w i | 2
(12)

where P0 denotes the power of the source signal s(n) and σ η 2 is the variance of the relay noise. According to (1), we can rewrite (12) as

P i = | w i | 2 P 0 | f ˆ i + δ f i | 2 + σ η 2 .
(13)

Using (13), the total relay transmit power can be written as

P T = i = 1 R | w i | 2 P 0 | f ˆ i + δ f i | 2 + σ η 2 .
(14)

Letting the elements on the diagonal matrix R be R ii P 0 | f ˆ i + δ f i | 2 + σ η 2 , we can rewrite (14) as

P T = w H R w .
(15)

The receive SNR at the destination is given by

SNR = E | y s ( n ) | 2 E | y n ( n ) | 2 .
(16)

Using (7), we have

E | y s ( n ) | 2 = E | w H h s ( n ) | 2 = P 0 w H h h H w
(17)

Using (1) and (2) and introducing f ˆ [ f ˆ 1 , , f ˆ R ] T , g ˆ [ ĝ 1 , , ĝ R ] T , δ f [ δ f 1 , , δ f R ] T , δ g [ δ g 1 , , δ g R ] T , we can rewrite the equivalent channel vector h as

h = ( f ˆ + δ f ) ( g ˆ + δ g ) = f ˆ g ˆ + f ˆ δ g + δ f g ˆ + δ f δ g = h ˆ + δ h .
(18)

where

h ˆ f ˆ g ˆ δ h f ˆ δ g + δ f g ˆ + δ f δ g .
(19)

Using (18), we can rewrite (17) as

E | y s ( n ) | 2 = P 0 | w H ( h ˆ + δ h ) | 2 .
(20)

According to (1) and (2), we have

| δ h i | β | f ˆ i | + ε | ĝ i | + ε β ξ i , i = 1 , , R .

As a result, the norm of the error vector δ h can be written as

δ h = i = 1 R | δ h i | 2 1 2 i = 1 R ξ i 2 1 2 ζ .
(21)

Making use of (8), we can write the power of the noise component at the destination as

E | y n ( n ) | 2 = E | w H G η ( n ) + υ ( n ) | 2 .
(22)

Assuming that the relay and the destination noises are statistically independent, we can rewrite (22) as

E | y n ( n ) | 2 = E | w H G η ( n ) | 2 + E | υ ( n ) | 2 = σ η 2 w H G G H w + σ υ 2 = σ η 2 w H D w + σ υ 2
(23)

where σ υ 2 denotes the variance of the noise at the destination andDG G H is a diagonal matrix with D ii  = |g i |2. Using (2), the diagonal elements of matrix D can be rewritten as D ii = | ĝ i + δ g i | 2 .

Using (15), (20), and (23), the problem in (10) can be rewritten as

min w max | δ f i | ε i = 1 , , R w H R ( δ f i ) w s.t. min | δ f i | ε , | δ g i | β i = 1 , , R P 0 | w H h ˆ + δ h ( δ f i , δ g i ) | 2 σ η 2 w H D ( δ g i ) w + σ υ 2 γ .
(24)

As the problem in (24) is difficult to solve, we solve the following problem instead

min w max | δ f i | ε i = 1 , , R w H R ( δ f i ) w s.t. min δ h ζ , | δ g i | β i = 1 , , R P 0 | w H ( h ˆ + δ h ) | 2 σ η 2 w H D ( δ g i ) w + σ υ 2 γ .
(25)

The optimal value of problem (25) gives the upper bound for the problem in (24) since the feasibility set of the inner problem in the constraint of (24) is enlarged by replacing| δ f i |ε, i = 1,,R, with δ h  ≤ ζ. To simplify the problem in (25), we find first the optimal objective values of the following three sub-problems:

max δ f i w H R ( δ f i ) w s.t. | δ f i | ε , i = 1 , , R
(26)
min δ h P 0 | w H ( h ˆ + δ h ) | 2 s.t. δ h ζ
(27)
max δ g i σ η 2 w H D( δ g i )w+ σ υ 2 s.t.| δ g i |β,i=1,,R
(28)

where w is fixed in these sub-problems. Although we solve the three sub-problems in (26) to (28) independently, we find later that the solutions to these sub-problems are consistent to each other in the worst case.

Using the definition that R ii = P 0 | f ˆ i + δ f i | 2 + σ η 2 and the triangle inequality, we have

w H R ( δ f i ) w = i = 1 R | w i | 2 P 0 | f ˆ i + δ f i | 2 + σ η 2 i = 1 R | w i | 2 P 0 ( | f ˆ i | + | δ f i | ) 2 + σ η 2 = i = 1 R | w i | 2 P 0 ( | f ˆ i | 2 + 2 | f ˆ i | | δ f i | + | δ f i | 2 ) + σ η 2 .
(29)

According to the constraints in (26), we can write the maximum of (29) as

w H R ( δ f i ) w i = 1 R | w i | 2 P 0 ( | f ˆ i | 2 + 2 ε | f ˆ i | + ε 2 ) + σ η 2 = w H R ~ w
(30)

where R ~ is a diagonal matrix with R ~ ii P 0 ( | f ˆ i | 2 +2ε| f ˆ i |+ ε 2 )+ σ η 2 . It can be shown that the equalities in (29) and (30) hold true when

δ f i = ε f ˆ i | f ˆ i | .
(31)

Making use of (30) and (31), the optimal objective value of sub-problem (26) can be written as

max | δ f i | ε , i = 1 , , R w H R ( δ f i ) w = w H R ~ w .
(32)

Using the triangle and Cauchy-Schwarz inequalities, we have

| w H ( h ˆ + δ h ) | | w H h ˆ | - | w H δ h | | w H h ˆ | - w · δ h
(33)

Considering the constraint in sub-problem (27), the minimum of (33) can be written as

| w H ( h ˆ + δ h ) | | w H h ˆ | - ζ w .
(34)

Note that we require the values of ε and β to satisfyζw<| w H h ˆ |. Otherwise, the receive SNR may be too low to satisfy the SNR requirement in (25).

It can be verified that the equalities in (33) and (34) hold true when

δ h = - ζ w w e j ϕ
(35)

whereϕangle( w H h ˆ ).

Combining (34) and (35), we can obtain the minimum of the objective function in sub-problem (27)

min δ h ζ P 0 | w H ( h ˆ + δ h ) | 2 = P 0 ( | w H h ˆ | - ζ w ) 2 .
(36)

Using the definition that D ii = | ĝ i + δ g i | 2 and the triangle equality, we have

w H D ( δ g i ) w = i = 1 R | w i | 2 | ĝ i + δ g i | 2 i = 1 R | w i | 2 | ĝ i | + | δ g i | 2 = i = 1 R | w i | 2 | ĝ i | 2 + 2 | ĝ i | | δ g i | + | δ g i | 2 .
(37)

Using the constraints in (28), the upper bound of w H D( δ g i )w can be written as

w H D ( δ g i ) w i = 1 R | w i | 2 | ĝ i | 2 + 2 β | ĝ i | + β 2 = w H D ~ w
(38)

where D ~ is a diagonal matrix with D ~ ii | ĝ i | 2 +2β| ĝ i |+ β 2 . The equalities in (37) and (38) hold true when

δ g i = β ĝ i | ĝ i | i = 1 , , R .
(39)

Using (38) and (39), we can write the optimal value of the objective function in sub-problem (28) as

max | δ g i | β , i = 1 , , R σ η 2 w H D ( δ g i ) w + σ υ 2 = σ η 2 w H D ~ w + σ υ 2 .
(40)

We can see from (35) and (39) that the sub-problems (27) and (28) achieve their optimal values at the same case if

δ f i = - ζ w i w e j ϕ - β f ˆ i ĝ i | ĝ i | ĝ i + β ĝ i | ĝ i | , i = 1 , , R .
(41)

In such case, the optimal value of the inner problem in the constraint of problem (25) can be written as

min | δ g i | β , δ h ζ i = 1 , , R P 0 | w H ( h ˆ + δ h ) | 2 σ η 2 w H D ( δ g i ) w + σ υ 2 = P 0 ( | w H h ˆ | - ζ w ) 2 σ η 2 w H D ~ w + σ υ 2 .
(42)

We can also see from (30) and (31) that the inner problem in the objective function of problem (25) achieves its optimum if (31) holds true. Therefore, the inner problems in the objective function and the constraint of problem (25) achieves their optima in the case if (31) and (41) hold true at the same time. In such worst case, the channel estimates satisfy the equality

- ζ w i w e j ϕ = f ˆ i β ĝ i | g i | + ĝ i ε f ˆ i | f ˆ i | + ε β f ˆ i ĝ i | f ˆ i | | ĝ i | , i = 1 , , R .
(43)

Therefore, we can rewrite problem (25) as following by making use of (32) and (42)

min w w H R ~ w s.t. P 0 ( | w H h ˆ | - ζ w ) 2 σ η 2 w H D ~ w + σ υ 2 γ .
(44)

Noticing that taking the square root of the objective function and both sides of the constraint does not change the solution set, we can rewrite problem (44) as

min w R ~ 1 2 w s.t. w H h ˆ γ P 0 σ η 2 w H D ~ w + σ υ 2 1 2 + ζ w Re w H h ˆ 0 , Im w H h ˆ = 0
(45)

where we have used the property that w can be rotated with arbitrary phase without affecting the objective function value. Introducing auxiliary variables τ, τ1, and τ2, we can rewrite problem (45) in the form of SOCP as

min w , τ , τ 1 , τ 2 τ s.t. τ R ~ 1 2 w w H h ˆ = τ 1 + τ 2 τ 1 γ P 0 ( σ η 2 w H D ~ w + σ υ 2 ) 1 2 τ 2 ζ w τ , τ 1 , τ 2 > 0
(46)

which can be solved in polynomial time using interior point algorithm[29, 30]. Compared with the methods of[2224] that use SDP, the robust beamforming approach (46) has much lower computational complexity. Specifically speaking, the computational complexity of (46) isO( R 3.5 ) and those of the methods in[2224] areO( R 6.5 ).

3.2 Maximize the receive SNR

In this subsection, we propose another beamforming approach that maximizes the lowest receive SNR in the predefined set subject to the constraints of individual relay transmit powers. This worst-case-based beamforming problem can be formulated as

max w min f i F i ( ε ) , g i G i ( β ) i = 1 , , R SNR ( w , f i , g i ) s.t. max f i F i ( ε ) P i ( w , f i ) P i max i = 1 , , R
(47)

where P i max denotes the maximal allowed individual relay transmit power. Different from the problem in (9), problem (47) considers the constraints of individual relay transmit powers. Such constraints correspond to the applications that the power of the relay is limited. According to (1) and (2), problem (47) can be rewritten as

max w min | δ f i | ε , | δ g i | β i = 1 , , R SNR ( w , δ f i , δ g i ) s.t. max | δ f i | ε P i ( w , δ f i ) P i max i = 1 , , R .
(48)

Using (13), (16) to (18), and (23), the problem in (48) can be rewritten as

max w min | δ f i | ε , | δ g i | β i = 1 , , R P 0 | w H h ˆ + δ h ( δ f i , δ g i ) | 2 σ η 2 w H D ( δ g i ) w + σ υ 2 s.t. max | δ f i | ε | w i | 2 P 0 | f ˆ i + δ f i | 2 + σ η 2 P i max i = 1 , , R .
(49)

Instead of solving the problem in (49), we solve the following problem

max w min | δ g i | β , δ h ζ i = 1 , , R P 0 | w H ( h ˆ + δ h ) | 2 σ η 2 w H D ( δ g i ) w + σ υ 2 s.t. max | δ f i | ε | w i | 2 P 0 | f ˆ i + δ f i | 2 + σ η 2 P i max i = 1 , , R .
(50)

It can be seen that the optimal value of (50) is a lower bound of that of problem (49) since the error set of the inner problem of the objective function is enlarged by using δ h  ≤ ζ instead of| δ f i |ε, i = 1,,R. We consider solving the sub-problem in the constraint of (50) first:

max δ f i | w i | 2 ( P 0 | f ˆ i + δ f i | 2 + σ η 2 ) s.t. | δ f i | ε .
(51)

Applying the triangle inequality to the objective function in (51), we have

P i = | w i | 2 ( P 0 | f ˆ i + δ f i | 2 + σ η 2 ) | w i | 2 ( P 0 ( | f ˆ i | + | δ f i | ) 2 + σ η 2 ) = | w i | 2 ( P 0 ( | f ˆ i | 2 + 2 | f ˆ i | | δ f i | + | δ f i | 2 ) + σ η 2 )
(52)

According to the constraint in (51), we can get

P i | w i | 2 ( P 0 ( | f ˆ i | 2 + 2 ε | f ˆ i | + ε 2 ) + σ η 2 ) = | w i | 2 α i 2
(53)

where α i ( P 0 ( | f ˆ i | 2 + 2 ε | f ˆ i | + ε 2 ) + σ η 2 ) 1 2 . The equalities in (52) and (53) hold true when

δ f i = ε f ˆ i | f ˆ i | , i = 1 , , R .
(54)

Making use of (53) and (54), the maximum of the objective function in (51) can be written as

max | δ f i | ε | w i | 2 ( P 0 | f ˆ i + δ f i | 2 + σ η 2 ) = | w i | 2 α i 2 .
(55)

Similar to the case in Section 3.1, the inner problems in the objective function and the constraints of problem (50) achieve their optima in the same case if (43) holds true, which can be obtained by using (35), (39), and (54). Using (36), (40), and (55), problem (50) can be rewritten as

max w P 0 ( | w H h ˆ | - ζ w ) 2 w H D ~ w + σ υ 2 s.t. | w i | 2 α i 2 P i max , i = 1 , , R .
(56)

Considering that taking square root of the objective function does not change the solution set and introducing an auxiliary variable τ > 0, we can rewrite (56) as

max w , τ > 0 τ s.t. w H h ˆ τ P 0 ( w H D ~ w + σ υ 2 ) 1 2 + ζ w | w i | 2 α i 2 P i max , i = 1 , , R . Re w H h ˆ 0 , Im w H h ˆ = 0
(57)

where we have used the fact that the weight vector w can be rotated with arbitrary phase without affecting the objective value.

The problem in (57) is a quasi-convex problem[30], which can be solved by using a bisection search method. In particular, for any given value of τ, we check the feasibility of the following convex problem

find w s.t. w H h ˆ τ P 0 ( w H D ~ w + σ υ 2 ) 1 2 + ζ w | w i | 2 α i 2 P i max , i = 1 , , R Re w H h ˆ 0 , Im w H h ˆ = 0 .
(58)

Let τmax denote the optimal objective value of (57). If the feasibility problem in (58) is feasible, then we have τ ≤ τmax. It can be proven by the contradict method. Assuming that τ > τmax and problem (58) is feasible, we can see that it contradicts the assumption that τmax is the optimal value of problem (57). On the contrary, if the feasibility problem (58) is infeasible, then, we can conclude that τ > τmax.

As a result, we can apply a bisection search technique by checking the feasibility of the convex problem (58) in each step, which can be summarized as following:

  1. 1.

    τ := (τ l  + τ u )/2.

  2. 2.

    Solve the convex feasibility problem (58). If (58) is feasible, then τ l  := τ, otherwise τ u  := τ.

  3. 3.

    If (τ u -τ l ) < ε 0 then stop. Otherwise, go to Step 1.

Here, [τ l ,τ u ] determines the interval that contains the optimal value of τmax and ε0 is the tolerance of the error in finding τmax.

4 Simulation results

In our simulations, we consider a relay network with R=20 relays. For each scenario, 300 simulation runs are used to obtain each simulation point. In all examples, we assume that the channels are of Rayleigh flat-fading with unit variance. In all simulations, the variances of the relay and the destination noises are assumed to be equal to each other and the transmit power of the source is assumed to be 10 dB higher than the noise powers. Except that specified, the norm bounds of the channel estimation errors are assumed to be equal to each other, i.e., ε = β. The proposed beamformers are compared with the nonrobust distributed beamforming method proposed in[14]. In our simulations, the estimated instant CSI is used in the method of[14] instead of the second-order statistics of the CSI.

4.1 Minimize the total relay transmit power

Figure2 shows the outage probability of the receive SNR at the destination. An SNR outage occurs when the receive SNR is lower than the minimal required SNR. We assume in this example that ε = β = 0.1. We can see from Figure2 that there is no SNR outage in the proposed robust method. While in the method of[14], there is an outage probability that is larger than 0.55 for all the tested points. In addition, this probability goes higher when the minimal required SNR increases. Figure3 compares the total relay transmit power versus the minimal required SNR for the case that ε = β = 0.05. The performance of the robust method of[23] is also plotted in Figure3. From the figure, we can see that the minimal relay transmit power of the proposed method is 4 dB lower than that of the method of[23]. We can also see that the relay transmit power of the proposed method is 2 dB higher than the case that the perfect CSI is used, which can be viewed as the price for the robustness.

Figure 2
figure 2

Outage probability of the receive SNR versus minimal required SNR.

Figure 3
figure 3

Total relay transmit power versus minimal required SNR.

Figure4 shows the total relay transmit power versus the minimal required SNR for several different values of ε and β. Figure5 displays the total relay transmit power versus ε and β for several different values of the minimal required SNR. It can be seen from Figures4 and5 that the total relay transmit power increases as the minimal required SNR becomes higher. The beamforming problem is infeasible when the minimal required SNR is higher than certain value. For example, we can see from Figure4 that the problem is infeasible when γ ≥ 18 dB for the case of ε = β = 0.1. In our simulations, it is viewed as infeasible when more than half of the simulation runs are infeasible. It can also be seen from the figures that the relay transmit power increases as the values of ε and β are getting higher. It is reasonable since the values of ε and β determine the sizes of the sets in (1) and (2).

Figure 4
figure 4

Total relay transmit power versus minimal required SNR for different norm bounds of the channel estimation error.

Figure 5
figure 5

Total relay transmit power versus norm bound of the channel estimation error.

In practical applications, the estimates of the norm bounds of the channel estimation errors may have errors. Let ε ˆ and β ˆ denote the estimates of the norm bounds of the channel estimation errors ε and β, respectively. We simulate the case that ε ˆ ε and β ˆ β. In this example, the channel coefficients are generated according to the values of ε and β, while the problem in (46) is solved using ε ˆ and β ˆ . Figure6 shows the outage probability of the receive SNR versus ε ˆ for the case that ε ˆ = β ˆ and ε = 0.1. We can see from Figure6 that the proposed method is robust to the estimation errors of ε and β since the outage probability of the receive SNR is close to 0 when ε ˆ 0.05. There is no SNR outage when ε ˆ ε since the actual case is included in the sets of (1) and (2).

Figure 6
figure 6

Outage probability of the receive SNR versus estimated value of the norm bound of the channel estimation error.

4.2 Maximize the receive SNR

Figure7 shows the outage probability of the individual relay transmit power. It is assumed in this example that ε = β = 0.05. A power outage occurs when any of the relay transmit power P i , i = 1,,R, is larger than the maximal allowed relay transmit power P i max. In the examples of this subsection, it is assumed that all the relays have the same maximal allowed transmit power. We can see from Figure7 that the proposed robust method guarantees no power outage while the method of[14] with the estimated CSI has power outage in all the simulation points. Figure8 compares the receive SNR versus individual relay transmit power for both methods. We can see that the maximal SNR of the proposed method is 2 dB lower than the method of[14]. Although the robustness of the proposed method is at the cost of performance degradation, it is necessary in the case that the relays have strict power limitation.

Figure 7
figure 7

Outage of relay transmit power versus maximal allowed individual relay transmit power.

Figure 8
figure 8

Receive SNR versus individual relay transmit power.

Figure9 displays the maximal receive SNR versus the individual relay transmit power for several different values of ε and β. Figure10 shows the maximal receive SNR versus the values of ε and β for several different individual relay transmit power limitations. As can be seen from these figures, the maximal receive SNR increases as the transmit power increases. In addition, the maximal receive SNR decreases as the value of ε or β increases. Figure11 shows the outage probability of the individual relay transmit power versus the estimate of the norm of the channel estimation error ε. In this example, the channel coefficients are generated according to the values of ε and β while problem (57) is solved using ε ˆ and β ˆ . It is assumed that ε ˆ = β ˆ and ε = β = 0.05. We can see from this figure that the outage probability of the transmit power is close to 0 when ε ˆ deviates from ε.

Figure 9
figure 9

Receive SNR versus individual relay transmit power for different norm bounds of the channel estimation error.

Figure 10
figure 10

Receive SNR versus norm bound of the channel estimation error.

Figure 11
figure 11

Outage probability of the transmit power versus estimated value of the norm bound of the channel estimation error.

5 Conclusions

We have developed two worst-case-based robust distributed beamforming approaches for networks that consist of one source, one destination, and multiple relays. The worst performance in the set that is determined by the norm bounds of the source-to-relay and relay-to-destination channel estimation errors is optimized to guarantee the actual case. In the first distributed beamforming approach, we minimize the maximal total relay transmit power in the set subject to the constraint of receive QoS. In the second distributed beamforming method, the lowest receive QoS in the set is maximized subject to individual relay transmit power constraints. These two distributed beamforming problems are shown to be convex and quasi-convex problems, respectively, which can be efficiently solved by using interior point method. Simulation results demonstrate that the proposed methods are robust to the estimation errors of the source-to-relay and relay-to-destination channels.

Author’s information

Haihua Chen is the corresponding author and co-works with the National Mobile Communications Research Laboratory, Southeast University.

References

  1. Sedonaris A, Erkip E, Aazhang B: User cooperation diversity — Part I. System description. IEEE Trans. Commun 2003, 51: 1927-1938. 10.1109/TCOMM.2003.818096

    Article  Google Scholar 

  2. Sedonaris A, Erkip E, Aazhang B: User cooperation diversity — Part II. Implementation aspects and performance analysis. IEEE Trans. Commun 2003, 51: 1939-1948. 10.1109/TCOMM.2003.819238

    Article  Google Scholar 

  3. Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inform. Theory 2004, 50: 3062-3080. 10.1109/TIT.2004.838089

    Article  MathSciNet  MATH  Google Scholar 

  4. Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inform. Theory 2005, 51: 3037-3063. 10.1109/TIT.2005.853304

    Article  MathSciNet  MATH  Google Scholar 

  5. Larsson P: Large-scale cooperative relaying network with optimal coherent combining under aggregate relay power constraint. Proc. Future Telecomm. Conf. (FTC’03), Beijing, China, pp.166-170.

  6. Nabar RU, Boelcskei H, Kneubuhler FW: Fading relay channels: performance limits and space-time signal design. IEEE J. Sel. Areas Commun 2004, 22: 1099-1109. 10.1109/JSAC.2004.830922

    Article  Google Scholar 

  7. Boelcskei H, Nabar RU, Oyman O, Paulraj AJ: Capacity scaling laws in MIMO relay networks. IEEE Trans. Wireless Commun 2006, 5: 1433-1444.

    Article  Google Scholar 

  8. Janani M, Hedayat A, Hunter TE, Nosratinia A: Coded cooperation in wireless communications: space-time transmission and iterative decoding. IEEE Trans. Signal Process 2004, 52: 362-371. 10.1109/TSP.2003.821100

    Article  MathSciNet  Google Scholar 

  9. Nosratinia A, Hunter TE, Hedayat A: Cooperative communication in wireless networks. IEEE Commun. Mag 2004, 42: 68-73.

    Article  Google Scholar 

  10. Laneman JN, Wornell GW: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Trans. Inform. Theory 2003, 49: 2415-2425. 10.1109/TIT.2003.817829

    Article  MathSciNet  MATH  Google Scholar 

  11. Luo J, Blum RS, Cimini LJ, Greenstein LJ, Haimovich AM: Decode-and-forward cooperative diversity with power allocation in wireless networks. IEEE Trans. Wireless Commun 2007, 6: 793-799.

    Article  Google Scholar 

  12. Jing Y, Jafarkhani H: Network beamforming using relays with perfect channel information. Proc. International Conference on Acoustics, Speech and Signal Processing (ICASSP’07). IEEE, Piscataway, USA; 2007:473-476,.

    Google Scholar 

  13. Zheng G, Wong KK, Paulraj A, Ottersten B: Collaborative-relay beamforming with perfect CSI: optimum and distributed implementation. IEEE Signal Process. Lett 2009, 16: 257-260.

    Article  Google Scholar 

  14. Havary-Nassab V, Shahbazpanahi S, Grami A, Luo Z-Q: Distributed beamforming for relay networks based on second-order statistics of the channel state information. IEEE Trans. Signal Process 2008, 56: 4306-4316.

    Article  MathSciNet  Google Scholar 

  15. Chen H, Gershman AB, Shahbazpanahi S: Distributed peer-to-peer beamforming for multiuser relay networks. Proc. International Conference on Acoustics, Speech and Signal Processing (ICASSP’09). IEEE, Piscataway, USA; 2009:2265-2268,.

    Google Scholar 

  16. Fazeli-Dehkordy S, Shahbazpanahi S, Gazor S: Multiple peer-to-peer communications using a network of relays. IEEE Trans. Signal Process 2009, 57(8):3053-3062.

    Article  MathSciNet  Google Scholar 

  17. Xing C, Ma S, Wu Y: Robust joint design of linear relay precoder and destination equalizer for dual-hop amplify-and-forward MIMO relay systems. IEEE Trans. Signal Process 2010, 58(4):2273-2283.

    Article  MathSciNet  Google Scholar 

  18. Chalise BK, Vandendorpe L: MIMO relay design for multipoint-to-multipoint communications with imperfect channel state information. IEEE Trans. Signal Process 2009, 57(7):2785-2796.

    Article  MathSciNet  Google Scholar 

  19. Xing C, Ma S, Fei Z, Wu Y, Vincent Poor H: A general robust linear transceiver design for multi-hop amplify-and-forward MIMO relaying systems. IEEE Trans. on Signal Process 2013, 61(5):1196-1209.

    Article  MathSciNet  Google Scholar 

  20. Xing C, Ma S, Wu Y, Ng T: Transceiver design for dual-hop non-regenerative MIMO-OFDM relay systems under channel uncertainties. IEEE Trans. Signal Process 2010, 58(12):6325-6339.

    Article  MathSciNet  Google Scholar 

  21. Zheng G, Wong KK, Paulraj A, Ottersten B: Robust collaborative-relay beamforming. IEEE Trans. Signal Process 2009, 57: 3130-3143.

    Article  MathSciNet  Google Scholar 

  22. Krishna R, Cumanan K, Sharma V, Lambotharan S: A robust cooperative relaying strategy for wireless networks using semidefinite constraints and worst-case performance optimization. Proc. International Symposium on Information Theory and Its Applications (ISITA 2008). IEEE, Piscataway, USA; 2008:1-5.

    Google Scholar 

  23. Ubaidulla P, Chockalingam A: Robust distributed beamforming for wireless relay networks. Proc. International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’09). IEEE, Piscataway, USA; 2345-2349,.

  24. Mahboobi B, Ardebilipour M, Kalantari A, Soleimani-Nasab E: Robust cooperative relay beamforming. IEEE Wireless Commun. Lett 2013, 2(4):399-402.

    Article  Google Scholar 

  25. Vandenberghe L, Boyd S: Semidefinite programming. SIAM Rev 1996, 38(1):49-95. 10.1137/1038003

    Article  MathSciNet  MATH  Google Scholar 

  26. Patel CS, Stüber GL: Channel estimation for amplify and forward relay based cooperation diversity systems. IEEE Trans. Wireless Commun 2007, 6(6):2348-2356.

    Article  Google Scholar 

  27. Jing Y, Yu X: ML-based channel estimations for non-regenerative relay networks with multiple transmit and receive antennas. IEEE J. Sel. Areas commun 2012, 30(8):1428-1439.

    Article  Google Scholar 

  28. Cui S, Luo Z-Q, Ding Z: Robust blind multiuser detection against CDMA signature mismatch. Proc. International Conference on Acoustics, Speech and Signal Processing (ICASSP’01). IEEE, Piscataway, USA; 2001:2297-2300,.

    Google Scholar 

  29. Sturm JF: Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optim. Meth. Software 1999, 11–12: 625-653.

    Article  MathSciNet  MATH  Google Scholar 

  30. Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, New York; 2004.

    Book  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Fundamental Research Funds for the Central Universities and by the open research fund of National Mobile Communications Research Laboratory, Southeast University (No. 2011D06). The results of this paper have been presented in part at the International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, May 2013, and the 8th International Conference on Communications and Networking in China (Chinacom), Guilin, China, August 2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haihua Chen.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, L., Chen, H. & He, M. Worst-case-based robust beamforming for wireless cooperative networks. EURASIP J. Adv. Signal Process. 2014, 96 (2014). https://doi.org/10.1186/1687-6180-2014-96

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2014-96

Keywords