Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary

被引:63
作者
Abedi, Mohammad Reza [1 ]
Mokari, Nader [1 ]
Saeedi, Hamid [1 ]
Yanikomeroglu, Halim [2 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran 14115, Iran
[2] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
基金
美国国家科学基金会;
关键词
Physical layer security; robust resource allocation; full-duplex communications; active eavesdropping; jammer; MIMO; NETWORKS; COMMUNICATION; TRANSMISSION; CHANNEL;
D O I
10.1109/TWC.2016.2633336
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper. In the considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works in the literature concentrate on passive eavesdroppers and half-duplex (HD) legitimate receivers. In this paper, the adversary intends to optimize its transmit and jamming signal parameters so as to minimize the secrecy data rate of the legitimate transmission. In the literature, assuming that the receiver operates in HD mode, secrecy data rate maximization problems subject to the power transmission constraint have been considered in which cooperating nodes act as jammers to confound the eavesdropper. This paper investigates an alternative solution in which we take advantage of FD capability of the receiver to send jamming signals against the eavesdroppers. The proposed self-protection scheme eliminates the need for external helpers. Moreover, we consider the channel state information uncertainty on the links between the active eavesdropper and other legitimate nodes of the network. Optimal power allocation is then obtained based on the worst-case secrecy data rate maximization, under a legitimate transmitter power constraint in the presence of the active eavesdropper. Numerical results confirm the advantage of the proposed secrecy design and in certain conditions, demonstrate substantial performance gain over the conventional approaches.
引用
收藏
页码:885 / 899
页数:15
相关论文
共 48 条
  • [21] Full-Duplex Relaying over Block Fading Channel: A Diversity Perspective
    Krikidis, Ioannis
    Suraweera, Himal A.
    Yang, Sheng
    Berberidis, Kostas
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (12) : 4524 - 4535
  • [22] Relay Selection for Secure Cooperative Networks with Jamming
    Krikidis, Ioannis
    Thompson, John S.
    McLaughlin, Steve
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) : 5003 - 5011
  • [23] Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    Laneman, JN
    Tse, DNC
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) : 3062 - 3080
  • [24] On Cooperative Relaying Schemes for Wireless Physical Layer Security
    Li, Jiangyuan
    Petropulu, Athina P.
    Weber, Steven
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 4985 - 4997
  • [25] Li Q, 2011, CONF REC ASILOMAR C, P207, DOI 10.1109/ACSSC.2011.6189986
  • [26] Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming
    Li, Qiang
    Ma, Wing-Kin
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (08) : 3799 - 3812
  • [27] Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis
    Li, Wei
    Ghogho, Mounir
    Chen, Bin
    Xiong, Chunlin
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (10) : 1628 - 1631
  • [28] Information Theoretic Security
    Liang, Yingbin
    Poor, H. Vincent
    Shamai, Shlomo
    [J]. FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (4-5): : 355 - 580
  • [29] Lioliou P, 2010, CONF REC ASILOMAR C, P658, DOI 10.1109/ACSSC.2010.5757643
  • [30] Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security
    Liu, Yupeng
    Li, Jiangyuan
    Petropulu, Athina P.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 682 - 694