Zheng, Gan and Krikidis, Ioannis and Li, Jiangyuan and Petropulu, Athina P and Ottersten, Bjorn (2013) Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. IEEE Transactions on Signal Processing, 61 (20). pp. 4962-4974. DOI https://doi.org/10.1109/tsp.2013.2269049
Zheng, Gan and Krikidis, Ioannis and Li, Jiangyuan and Petropulu, Athina P and Ottersten, Bjorn (2013) Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. IEEE Transactions on Signal Processing, 61 (20). pp. 4962-4974. DOI https://doi.org/10.1109/tsp.2013.2269049
Zheng, Gan and Krikidis, Ioannis and Li, Jiangyuan and Petropulu, Athina P and Ottersten, Bjorn (2013) Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers. IEEE Transactions on Signal Processing, 61 (20). pp. 4962-4974. DOI https://doi.org/10.1109/tsp.2013.2269049
Abstract
This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Beamforming; MIMO; convex optimization; full-duplex; jamming; physical-layer security |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 22 Aug 2015 20:05 |
Last Modified: | 24 Oct 2024 11:07 |
URI: | http://repository.essex.ac.uk/id/eprint/14676 |