Advanced Properties of Full-Duplex Radio for Securing Wireless Network

This paper examines the role of full-duplex radio for securing wireless network from a new perspective. It first studies the secrecy capacity of two single-antenna full-duplex users against a multi-antenna eavesdropper (Eve) who has the perfect knowledge of the channel state information (CSI) from users to Eve. It is shown that if Eve uses a basic matched-filtering, the probability of zero secrecy (or outage) can be made small by a large jamming power from both users and a small gain of residual self-interference (RSI) power. But if Eve uses the optimal matched-filtering, the probability of outage grows rapidly as either the jamming power from the users increases or the number of antennas on Eve increases, regardless of the RSI gain. To prevent any Eve from obtaining its CSI, this paper then proposes a novel anti-eavesdropping channel estimation (ANECE) method, which allows users to obtain their own CSI while keeping all Eves in handicap. This method also prevents Eves from colluding with each other at any layer. The design of ideal pilots for ANECE for multiple multi-antenna users and multiple broadband multi-antenna users is discussed. It is also shown that the capacity of Eve with any number of antennas but without its CSI can be virtually eliminated over a time window corresponding to the number of antennas at the transmitter for each realization of the CSI.

[1]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[2]  Lei Chen,et al.  Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.

[3]  Yiming Ma,et al.  A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.

[4]  Daniel J. Ryan,et al.  Blind detection of PAM and QAM in fading channels , 2006, IEEE Transactions on Information Theory.

[5]  Zhu Han,et al.  Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.

[6]  Bin Zhao,et al.  A distributed medium access control scheme for a large network of wireless routers , 2008, IEEE Transactions on Wireless Communications.

[7]  Nader Mokari,et al.  How to manage resources to provide physical layer security: Active versus passive adversary? , 2018, Phys. Commun..

[8]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[9]  Yingbo Hua,et al.  Previously Published Works Uc Riverside Title: Fast Maximum Likelihood for Blind Identification of Multiple Fir Channels Fast Maximum Likelihood for Blind Identification of Multiple Fir Channels , 2022 .

[10]  Yifan Li,et al.  Radio self-interference cancellation by transmit beamforming, all-analog cancellation and blind digital tuning , 2015, Signal Process..

[11]  Pierre Hansen,et al.  A note on diameters of point sets , 2009, Optim. Lett..

[12]  Chong-Yung Chi,et al.  Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.

[13]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[14]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[15]  Yingbo Hua,et al.  Strict identifiability of multiple FIR channels driven by an unknown arbitrary sequence , 1996, IEEE Trans. Signal Process..

[16]  Qian Yang,et al.  Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.

[17]  Yingbo Hua,et al.  Capacity of Ultra-Wideband Power-Constrained Ad Hoc Networks , 2008, IEEE Transactions on Information Theory.

[18]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[19]  Derrick Wing Kwan Ng,et al.  Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.

[20]  Justin P. Coon,et al.  Physical Layer Security over OFDM-Based Links: Conjugate-and-Return , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[21]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[22]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[23]  Gil Zussman,et al.  1 Chip 2x the bandwidth , 2016, IEEE Spectrum.

[24]  Ahmed M. Eltawil,et al.  Full-Duplex Systems Using Multireconfigurable Antennas , 2015, IEEE Transactions on Wireless Communications.

[25]  Muriel Médard,et al.  The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel , 2000, IEEE Trans. Inf. Theory.

[26]  Mary Ann Ingram,et al.  Cross-Layer Design for the Physical, MAC, and Link Layer in Wireless Systems , 2009, EURASIP J. Adv. Signal Process..

[27]  Nico Temme,et al.  The uniform asymptotic expansion of a class of integrals related to cumulative distribution functions , 1981 .

[28]  T. Tony Cai,et al.  Phase transition in limiting distributions of coherence of high-dimensional random matrices , 2011, J. Multivar. Anal..

[29]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[30]  Philip Schniter,et al.  Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.

[31]  Lei Chen,et al.  Optimal power allocation for a full-duplex multicarrier decode-forward relay system with or without direct link , 2017, Signal Process..

[32]  Yang-Seok Choi,et al.  Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance , 2013, IEEE Transactions on Wireless Communications.

[33]  Matti Latva-aho,et al.  Precoding for Full Duplex Multiuser MIMO Systems: Spectral and Energy Efficiency Maximization , 2013, IEEE Transactions on Signal Processing.

[34]  Marwan Krunz,et al.  Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.

[35]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[36]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[37]  Yue Rong,et al.  MSE-Based Transceiver Designs for Full-Duplex MIMO Cognitive Radios , 2015, IEEE Transactions on Communications.

[38]  Bin Zhao,et al.  Further Development of Synchronous Array Method for Ad Hoc Wireless Networks , 2009, EURASIP J. Adv. Signal Process..

[39]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[40]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[41]  Ananthram Swami,et al.  Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks , 2007, EURASIP J. Wirel. Commun. Netw..

[42]  Yingbo Hua,et al.  Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications , 2017, ArXiv.

[43]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.