Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers

This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination.

[1]  Qiang Li,et al.  Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[2]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[3]  Kostas Berberidis,et al.  Full-Duplex Relaying over Block Fading Channel: A Diversity Perspective , 2012, IEEE Transactions on Wireless Communications.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[6]  Mats Viberg,et al.  Self-interference suppression in full-duplex MIMO relays , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[7]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[8]  Athina P. Petropulu,et al.  Outage constrained secrecy rate maximization using cooperative jamming , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[9]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[10]  Taneli Riihonen,et al.  Optimized gain control for single-frequency relaying with loop interference , 2009, IEEE Transactions on Wireless Communications.

[11]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Taneli Riihonen,et al.  Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation , 2011, IEEE Transactions on Wireless Communications.

[15]  Shuzhong Zhang,et al.  Complex Matrix Decomposition and Quadratic Programming , 2007, Math. Oper. Res..

[16]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[17]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[18]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[19]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[20]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[21]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[22]  Philip Schniter,et al.  Full-Duplex MIMO Relaying: Achievable Rates Under Limited Dynamic Range , 2011, IEEE Journal on Selected Areas in Communications.

[23]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[24]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[25]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[26]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[27]  Le Thi Hoai An,et al.  The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems , 2005, Ann. Oper. Res..

[28]  N. K. Shankaranarayanan,et al.  Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks , 2012, IEEE Transactions on Vehicular Technology.

[29]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[30]  Cong Ling,et al.  Lattice codes achieving strong secrecy over the mod-Λ Gaussian Channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[31]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[32]  Dan Raphaeli,et al.  Series expansions for the distribution of noncentral indefinite quadratic forms in complex normal variables , 1995 .

[33]  M. E. Knox,et al.  Single antenna full duplex communications using a common carrier , 2012, WAMICON 2012 IEEE Wireless & Microwave Technology Conference.