Joint power and beam optimization in a multi-carrier MIMO wiretap channel with Full-Duplex jammer

In this paper we address a sum secrecy rate maximization problem for a multi-carrier and MIMO communication system. We consider the case that the receiver is capable of full-duplex (FD) operation and simultaneously sends jamming signal to a potential eavesdropper. In particular, we simultaneously take advantage of the spatial and frequency diversity in the system in order to obtain a higher level of security in the physical layer. Due to the non-convex nature of the resulting mathematical problem, we propose an iterative solution with a guaranteed convergence, based on block coordinate descent method, by re-structuring our problem as a separately convex program. Moreover, for the special case that the transmitter is equipped with a single antenna, an optimal transmit power allocation strategy is obtained analytically, assuming a known jamming strategy. The performance of the proposed design is then numerically evaluated compared to the other design strategies, and under different system assumptions.

[1]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[2]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[3]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[4]  Philip Schniter,et al.  Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.

[5]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Stephen P. Boyd,et al.  Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..

[8]  Tho Le-Ngoc,et al.  Full-duplex relay with jamming protocol for improving physical-layer security , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[9]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[10]  K. Schittkowski,et al.  NONLINEAR PROGRAMMING , 2022 .

[11]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[12]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Halim Yanikomeroglu,et al.  Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[14]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[15]  Ananthanarayanan Chockalingam,et al.  Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).

[17]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[18]  N. K. Shankaranarayanan,et al.  Full- or half-duplex? A capacity analysis with bounded radio resources , 2012, 2012 IEEE Information Theory Workshop.

[19]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[20]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[22]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[23]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[24]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[25]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[26]  Yiming Ma,et al.  A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.

[27]  Zhi Xue,et al.  Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.

[28]  Narayan Prasad,et al.  On Robust Weighted-Sum Rate Maximization in MIMO Interference Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[29]  Philip Levis,et al.  Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.

[30]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[31]  Sachin Katti,et al.  Full Duplex MIMO Radios , 2014, NSDI.

[32]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[33]  Guo Fei,et al.  Secure power and subcarrier auction in uplink full-duplex cellular networks , 2015, China Communications.