Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary

被引:63
作者
Abedi, Mohammad Reza [1 ]
Mokari, Nader [1 ]
Saeedi, Hamid [1 ]
Yanikomeroglu, Halim [2 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115, Iran
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
基金
美国国家科学基金会;
关键词
Physical layer security; robust resource allocation; full-duplex communications; active eavesdropping; jammer; MIMO; NETWORKS; COMMUNICATION; TRANSMISSION; CHANNEL;
D O I
10.1109/TWC.2016.2633336
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper. In the considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works in the literature concentrate on passive eavesdroppers and half-duplex (HD) legitimate receivers. In this paper, the adversary intends to optimize its transmit and jamming signal parameters so as to minimize the secrecy data rate of the legitimate transmission. In the literature, assuming that the receiver operates in HD mode, secrecy data rate maximization problems subject to the power transmission constraint have been considered in which cooperating nodes act as jammers to confound the eavesdropper. This paper investigates an alternative solution in which we take advantage of FD capability of the receiver to send jamming signals against the eavesdroppers. The proposed self-protection scheme eliminates the need for external helpers. Moreover, we consider the channel state information uncertainty on the links between the active eavesdropper and other legitimate nodes of the network. Optimal power allocation is then obtained based on the worst-case secrecy data rate maximization, under a legitimate transmitter power constraint in the presence of the active eavesdropper. Numerical results confirm the advantage of the proposed secrecy design and in certain conditions, demonstrate substantial performance gain over the conventional approaches.
引用
收藏
页码:885 / 899
页数:15
相关论文
共 48 条
  • [1] Abedi M. R., 2015, 2015 IEEE 82 VEH TEC, P1
  • [2] Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks
    Abedi, Mohammad Reza
    Mokari, Nader
    Javan, Mohammad Reza
    Yanikomeroglu, Halim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) : 2604 - 2618
  • [3] Abedi M, 2015, IEEE INT CONF COMM, P497, DOI 10.1109/ICCW.2015.7247229
  • [4] Performance Analysis of Zero-Forcing for Two-Way MIMO AF Relay Networks
    Amarasuriya, Gayan
    Tellambura, Chintha
    Ardakani, Masoud
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (02) : 53 - 56
  • [5] Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme
    Amariucai, George T.
    Wei, Shuangqing
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) : 4660 - 4677
  • [6] [Anonymous], 2009, P 2009 IEEE INT C IN
  • [7] [Anonymous], 1999, Athena scientific Belmont
  • [8] Bertsekas D. P., 2003, CONVEX ANAL OPTIMIZA
  • [9] Boyd S, 2004, CONVEX OPTIMIZATION
  • [10] On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers
    Chorti, Arsenia
    Perlaza, Samir M.
    Han, Zhu
    Poor, H. Vincent
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1850 - 1863