Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers
TLDR
The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search.Abstract:
This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.read more
Citations
More filters
Proceedings ArticleDOI
Correlation-Based Power Allocation for Secure Transmission with Artificial Noise
TL;DR: The impact of transmitter-side correlation on the secure transmission with artificial noise (AN) is examined for the first time and it is demonstrated that CPA is nearly optimal and can significantly outperform the widely-used uniform power allocation (UPA) even for a moderate number of correlated transmit antennas.
Journal ArticleDOI
Secure full duplex OFDM wireless communication based on phase relay between the legitimate nodes
Yong Guo,Lijie Zhang +1 more
TL;DR: A computation efficient algorithm is presented to optimally allocate power over sub-carriers for secrecy capacity maximisation and can guarantee secrecy capacity to be positive in all circumstances and work well for single-input single-output systems.
Proceedings ArticleDOI
Secure spectrum-sharing networks with full-duplex multiple-antenna wireless-powered secondary system
TL;DR: This work proposes a beamforming scheme at the secondary receiver with the main purpose of minimizing the outage probability of the secondary data transmission and maximizing the achievable secrecy rate of the primary system.
Proceedings ArticleDOI
Physical-Layer Security against Non-Degraded Eavesdroppers
Joao P. Vilela,Joao Sa Sousa +1 more
TL;DR: This work characterize the secrecy level of two schemes for physical-layer security under non-degraded eavesdroppers: a spread spectrum uncoordinated frequency hopping scheme, and a jamming receiver with self-interference cancellation.
Proceedings ArticleDOI
Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint
TL;DR: A practical uncoordinated cooperative jamming (UCJ) scheme with multiple single-antenna helpers with good secrecy performance especially when the number of helpers is large is proposed to enhance the physical layer security of single-input-multiple-output (SIMO) wiretap channel.
References
More filters
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Guaranteeing Secrecy using Artificial Noise
Satashu Goel,Rohit Negi +1 more
TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Journal ArticleDOI
Improving Wireless Physical Layer Security via Cooperating Relays
TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Journal ArticleDOI
Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays
TL;DR: Targeting at minimal interference power, a broad range of multiple-input multiple-output mitigation schemes are analyzed and the results confirm that self-interference can be mitigated effectively also in the presence of imperfect side information.
Journal ArticleDOI
Secure Communication Over Fading Channels
TL;DR: In this article, the secrecy capacity region of the fading broadcast channel with confidential messages (BCC) was investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.