Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers

被引:21
作者
Kim, Jongyeop [1 ]
Kim, Jinwoong [1 ]
Lee, Jemin [1 ]
Choi, Jihwan P. [1 ]
机构
[1] Daegu Gyeongbuk Inst Sci & Technol, Dept Informat & Commun Engn, Daegu 42998, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; full-duplex systems; optimal power allocation; jamming; eavesdropping; residual self-interference; secrecy outage probability; ARTIFICIAL-NOISE; WIRELESS NETWORKS; OFDM SYSTEMS; SECRECY RATE; COMMUNICATION; CHANNELS;
D O I
10.1109/ACCESS.2018.2844558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attacks on multiple-input-multiple-output wiretap channels for a legitimate transceiver. We present a smart eavesdropper model and a cooperative jamming solution between transceivers that can control the jamming signal power to achieve the optimal secrecy performance. In particular, for practical applications, our proposed solution considers the residual self-interference from the full-duplex receiver and the limited cancellation capability of the smart eavesdropper. We derive the secrecy outage probability in general and smart eavesdropper cases, and show numerical results and secrecy regions for evaluation. As a result, our proposed solutions can improve the secrecy performance significantly by exploiting the full-duplex receiver and the cooperative jamming strategies with the sophisticated power control according to power expenditure.
引用
收藏
页码:32945 / 32957
页数:13
相关论文
共 42 条
[1]  
[Anonymous], P IEEE ICC
[2]  
[Anonymous], 1974, MICROWAVE MOBILE CO
[3]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[4]   Full Duplex Radios [J].
Bharadia, Dinesh ;
McMilin, Emily ;
Katti, Sachin .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :375-386
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]   Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering [J].
Chen, Gaojie ;
Coon, Justin P. .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (03) :334-337
[7]   Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers [J].
Chen, Gaojie ;
Coon, Justin P. ;
Di Renzo, Marco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) :1195-1206
[8]   Dual Antenna Selection in Secure Cognitive Radio Networks [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) :7993-8002
[9]   Physical Layer Network Security in the Full-Duplex Relay System [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :574-583
[10]   Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks [J].
Chen, Gaojie ;
Tian, Zhao ;
Gong, Yu ;
Chen, Zhi ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :719-729