scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers

TL;DR: The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search.
Abstract: This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations


Cites background from "Improving Physical Layer Secrecy Us..."

  • ...Jamming by the destination for the special case of a single-hop system was examined in [169], [170], which is feasible only when the destination has full-duplex capabilities, i....

    [...]

Journal ArticleDOI
TL;DR: This paper identifies and provides a detailed description of various potential emerging technologies for the fifth generation communications with SWIPT/WPT and provides some interesting research challenges and recommendations with the objective of stimulating future research in this emerging domain.
Abstract: Initial efforts on wireless power transfer (WPT) have concentrated toward long-distance transmission and high power applications. Nonetheless, the lower achievable transmission efficiency and potential health concerns arising due to high power applications, have caused limitations in their further developments. Due to tremendous energy consumption growth with ever-increasing connected devices, alternative wireless information and power transfer techniques have been important not only for theoretical research but also for the operational costs saving and for the sustainable growth of wireless communications. In this regard, radio frequency energy harvesting (RF-EH) for a wireless communications system presents a new paradigm that allows wireless nodes to recharge their batteries from the RF signals instead of fixed power grids and the traditional energy sources. In this approach, the RF energy is harvested from ambient electromagnetic sources or from the sources that directionally transmit RF energy for EH purposes. Notable research activities and major advances have occurred over the last decade in this direction. Thus, this paper provides a comprehensive survey of the state-of-art techniques, based on advances and open issues presented by simultaneous wireless information and power transfer (SWIPT) and WPT assisted technologies. More specifically, in contrast to the existing works, this paper identifies and provides a detailed description of various potential emerging technologies for the fifth generation communications with SWIPT/WPT. Moreover, we provide some interesting research challenges and recommendations with the objective of stimulating future research in this emerging domain.

621 citations

Journal ArticleDOI
TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Abstract: Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution toward 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.

580 citations


Cites background from "Improving Physical Layer Secrecy Us..."

  • ...[90] investigate the joint transmit and receive beamforming design for a singleantenna input, multiple-antenna output, and multiple-antenna eavesdropper (SIMOME) wiretap channel with imperfect SIC....

    [...]

  • ...The transmission design for the statistical CSI of the eavesdropper assumption is also studied in [90]....

    [...]

Journal ArticleDOI
TL;DR: This survey covers a wide array of technologies that have been proposed in the literature as feasible for IBFD transmission and evaluates the performance of the IBFD systems compared to conventional half-duplex transmission in connection with theoretical aspects such as the achievable sum rate, network capacity, system reliability, and so on.
Abstract: In-band full-duplex (IBFD) transmission represents an attractive option for increasing the throughput of wireless communication systems A key challenge for IBFD transmission is reducing self-interference Fortunately, the power associated with residual self-interference can be effectively canceled for feasible IBFD transmission with combinations of various advanced passive, analog, and digital self-interference cancellation schemes In this survey paper, we first review the basic concepts of IBFD transmission with shared and separated antennas and advanced self-interference cancellation schemes Furthermore, we also discuss the effects of IBFD transmission on system performance in various networks such as bidirectional, relay, and cellular topology networks This survey covers a wide array of technologies that have been proposed in the literature as feasible for IBFD transmission and evaluates the performance of the IBFD systems compared to conventional half-duplex transmission in connection with theoretical aspects such as the achievable sum rate, network capacity, system reliability, and so on We also discuss the research challenges and opportunities associated with the design and analysis of IBFD systems in a variety of network topologies This work also explores the development of MAC protocols for an IBFD system in both infrastructure-based and ad hoc networks Finally, we conclude our survey by reviewing the advantages of IBFD transmission when applied for different purposes, such as spectrum sensing, network secrecy, and wireless power transfer

569 citations


Cites background from "Improving Physical Layer Secrecy Us..."

  • ...statistical information on the eavesdropper channel, moreover, they also proposed an optimal power allocation scheme in terms of ergodic and outage secrecy rates in [27] and relay topology...

    [...]

  • ...been dedicated to improving secure wireless performance by utilizing IBFD transmission to enhance secrecy capacity [27]– [29], [204], [205]....

    [...]

  • ...• Can improve network secrecy: The use of simultaneous transmission at two nodes means that eavesdroppers receive mixed signals that are hard for the eavesdropper to decode due to interference signals [27]–[29]....

    [...]

  • ...studied the secrecy rate of IBFD systems using full-duplex jamming receivers with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper [27]....

    [...]

Journal ArticleDOI
TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Abstract: Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.

457 citations


Cites methods from "Improving Physical Layer Secrecy Us..."

  • ...The technique can be employed by using a single antenna fullduplex receiver or multiple antenna full-duplex receiver [160], where the jamming signal is generated by utilizing a portion of...

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Abstract: We consider the situation in which digital data is to be reliably transmitted over a discrete, memoryless channel (dmc) that is subjected to a wire-tap at the receiver. We assume that the wire-tapper views the channel output via a second dmc). Encoding by the transmitter and decoding by the receiver are permitted. However, the code books used in these operations are assumed to be known by the wire-tapper. The designer attempts to build the encoder-decoder in such a way as to maximize the transmission rate R, and the equivocation d of the data as seen by the wire-tapper. In this paper, we find the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission. In particular, if d is equal to Hs, the entropy of the data source, then we consider that the transmission is accomplished in perfect secrecy. Our results imply that there exists a C s > 0, such that reliable transmission at rates up to C s is possible in approximately perfect secrecy.

7,129 citations

Journal ArticleDOI
TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Abstract: The broadcast nature of the wireless medium makes the communication over this medium vulnerable to eavesdropping. This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. The assumption used is that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdropper. The transmitter ensures secrecy of communication by utilizing some of the available power to produce 'artificial noise', such that only the eavesdropper's channel is degraded. Two scenarios are considered, one where the transmitter has multiple transmit antennas, and the other where amplifying relays simulate the effect of multiple antennas. The channel state information (CSI) is assumed to be publicly known, and hence, the secrecy of communication is independent of the secrecy of CSI.

1,846 citations

Journal ArticleDOI
TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications.

1,385 citations

Journal ArticleDOI
TL;DR: Targeting at minimal interference power, a broad range of multiple-input multiple-output mitigation schemes are analyzed and the results confirm that self-interference can be mitigated effectively also in the presence of imperfect side information.
Abstract: Full-duplex relaying is more spectrally efficient than half-duplex relaying as only one channel use is needed per two hops. However, it is crucial to minimize relay self-interference to render full duplex feasible. For this purpose, we analyze a broad range of multiple-input multiple-output (MIMO) mitigation schemes: natural isolation, time-domain cancellation, and spatial suppression. Cancellation subtracts replicated interference signal from the relay input while suppression reserves spatial dimensions for receive and transmit filtering. Spatial suppression can be achieved by antenna subset selection, null-space projection, i.e., receiving and transmitting in orthogonal subspaces, or joint transmit and receive beam selection to support more spatial streams by choosing the minimum eigenmodes for overlapping subspaces. In addition, minimum mean square error (MMSE) filtering can be employed to maintain the desired signal quality, which is inherent for cancellation, and the combination of time- and spatial-domain processing may be better than either alone. Targeting at minimal interference power, we solve optimal filters for each scheme in the cases of joint, separate and independent design. The performance of mitigation schemes is evaluated and compared by simulations. The results confirm that self-interference can be mitigated effectively also in the presence of imperfect side information.

944 citations


"Improving Physical Layer Secrecy Us..." refers background or methods in this paper

  • ...Ioannis Krikidis is with the Department of Electrical and Computer Engineering, University of Cyprus, Cyprus, E-mail:krikidis@ucy.ac.cy....

    [...]

  • ...An efficient way to increase the secrecy rate in wireless systems is to degrade the decoding capability of the eavesdroppers by introducing controlled interference, or artificialnoise (AN)....

    [...]

Journal ArticleDOI
TL;DR: In this article, the secrecy capacity region of the fading broadcast channel with confidential messages (BCC) was investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Abstract: The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The broadcast channel from the source node to receivers 1 and 2 is corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The parallel BCC with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established, which gives the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity region is then established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the basic Gaussian BCC. The secrecy capacity results are then applied to study the fading BCC. The ergodic performance is first studied. The ergodic secrecy capacity region and the optimal power allocations that achieve the boundary of this region are derived. The outage performance is then studied, where a long-term power constraint is assumed. The power allocation is derived that minimizes the outage probability where either the target rate of the common message or the target rate of the confidential message is not achieved. The power allocation is also derived that minimizes the outage probability where the target rate of the confidential message is not achieved subject to the constraint that the target rate of the common message must be achieved for all channel states.

942 citations