scispace - formally typeset
Open AccessJournal ArticleDOI

Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers

TLDR
The proposed self-protection scheme eliminates the need for external helpers and provides system robustness and the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search.
Abstract
This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach

TL;DR: A novel frequency diverse array (FDA) beamforming approach is proposed, which intentionally introduces some frequency offsets across array antennas to decouple the highly correlated channels of LU and Eve and can degrade Eve’s reception and thus enhance PHY security.
Journal ArticleDOI

Energy Efficient Legitimate Wireless Surveillance of UAV Communications

TL;DR: A tracking algorithm is developed for the legitimate UAV to track the suspicious UAV by comprehensively utilizing eavesdropped packets, angle-of-arrival and received signal strength of the suspicious transmitter's signal.
Journal ArticleDOI

Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying

TL;DR: In this article, the authors investigated the secrecy energy efficiency (SEE) maximization problem for UAV enabled mobile relaying system, where a high-mobility UAV is exploited to assist transmitting confidential information from a ground source to a legitimate ground destination, in the presence of a potential eavesdropper.
Journal ArticleDOI

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

TL;DR: In this paper, the theoretical limits and practical designs of jamming approaches for PLS are presented, and the achievable secrecy rates of user cooperation-based jamming are explored for practical implementations.
Journal ArticleDOI

Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization

TL;DR: A joint optimization scheme is proposed to assign the TX/RX antennas for Bob and to design the beamforming and power allocation for Alice's information and AN signal, and a computable secrecy rate is obtained for this model over a Rayleigh-fading eavesdropping channel.
References
More filters
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Guaranteeing Secrecy using Artificial Noise

TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Journal ArticleDOI

Improving Wireless Physical Layer Security via Cooperating Relays

TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Journal ArticleDOI

Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays

TL;DR: Targeting at minimal interference power, a broad range of multiple-input multiple-output mitigation schemes are analyzed and the results confirm that self-interference can be mitigated effectively also in the presence of imperfect side information.
Journal ArticleDOI

Secure Communication Over Fading Channels

TL;DR: In this article, the secrecy capacity region of the fading broadcast channel with confidential messages (BCC) was investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Related Papers (5)