Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective

Security is an issue of paramount importance, yet is it a significant challenge for wireless communications, which becomes more intricate when facing a full duplex (FD) active eavesdropper capable of performing eavesdropping and jamming simultaneously. In this paper, we investigate the physical layer security issue in the presence of an FD active eavesdropper, who launches jamming attacks to further improve the eavesdropping. The jamming, however, also results in self-interference at the eavesdropper itself. This security problem is formulated within a hierarchical game framework where the eavesdropper acts as the leader and the legitimate user is the follower. In particular, we first investigate the follower’s secrecy rate maximization problem and derive the optimal legitimate transmission strategy. Then, the leader’s wiretap rate maximization is expressed as a mathematical program with equilibrium constraints (MPEC). Leveraging the concavity of the follower’s problem, we transform the MPEC problem into a single-level optimization and obtain the jamming power allocation strategy by applying the primal-dual interior-point method. Moreover, we analyze the situations where only partial channel state information is available at the legitimate user and the corresponding impacts on the game. Finally, we present extensive simulation results to validate our theoretical analysis.

[1]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[2]  Jorge Nocedal,et al.  An interior algorithm for nonlinear optimization that combines line search and trust region steps , 2006, Math. Program..

[3]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[4]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[5]  Matthew R. McKay,et al.  Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Zhi Ding,et al.  On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.

[8]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[9]  Xiang-Yang Li,et al.  Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication , 2012, IEEE Journal on Selected Areas in Communications.

[10]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[11]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[12]  Ananthanarayanan Chockalingam,et al.  Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.

[13]  Jorge Nocedal,et al.  A trust region method based on interior point techniques for nonlinear programming , 2000, Math. Program..

[14]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[15]  Ė. B. Vinberg,et al.  A course in algebra , 2003 .

[16]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[17]  Pierre Duhamel,et al.  Achievable Secrecy Rates for the Broadcast Channel With Confidential Message and Finite Constellation Inputs , 2015, IEEE Transactions on Communications.

[18]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[19]  Laura Galluccio,et al.  Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.

[20]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[21]  Gaston H. Gonnet,et al.  On the LambertW function , 1996, Adv. Comput. Math..

[22]  Tao Zhang,et al.  Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.

[23]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[24]  Yichen Wang,et al.  Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[25]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[26]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[27]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[28]  R. Lucchetti,et al.  Existence theorems of equilibrium points in stackelberg , 1987 .

[29]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[30]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[31]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[32]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[33]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[34]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[35]  Dongfeng Yuan,et al.  Secrecy rate analysis for jamming assisted relay communications systems , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[36]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[37]  Charalambos D. Charalambous,et al.  An Algorithm for Global Maximization of Secrecy Rates in Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Communications.

[38]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[39]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[40]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[41]  Zhu Han,et al.  Combating full-duplex active eavesdropper: A game-theoretic perspective , 2016, 2016 IEEE International Conference on Communications (ICC).

[42]  Victor C. M. Leung,et al.  In-Band Full-Duplex Relaying: A Survey, Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[43]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[44]  Bethany L. Nicholson,et al.  Mathematical Programs with Equilibrium Constraints , 2021, Pyomo — Optimization Modeling in Python.

[45]  H. Vincent Poor,et al.  Secure Communication Under Channel Uncertainty and Adversarial Attacks , 2015, Proceedings of the IEEE.