Secure full-duplex small-cell networks in a spectrum sharing environment

In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network's channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.

[1]  Adrish Banerjee,et al.  Outage Analysis of Spectrum Sharing Energy Harvesting Cognitive Relays in Nakagami-m Channels , 2014, GLOBECOM 2014.

[2]  Dac-Binh Ha,et al.  Secrecy outage probability of full-duplex networks with cognitive radio environment and partial relay selection , 2017, 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom).

[3]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[4]  Haiyan Cao,et al.  Performance Analysis for Opportunistic Full-Duplex Relay Selection in Underlay Cognitive Networks , 2015, IEEE Transactions on Vehicular Technology.

[5]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[6]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[7]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[8]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Trung Quang Duong,et al.  Performance Analysis of Cognitive Spectrum-Sharing Single-Carrier Systems With Relay Selection , 2012, IEEE Transactions on Signal Processing.

[11]  George K. Karagiannidis,et al.  Full-duplex spectrum sharing in cooperative single carrier systems , 2015, WCNC.

[12]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Mohamed-Slim Alouini,et al.  On the Outage Performance of Full-Duplex Selective Decode-and-Forward Relaying , 2013, IEEE Communications Letters.

[15]  H. Vincent Poor,et al.  Performance Analysis of Cyclic Prefixed Single-Carrier Spectrum Sharing Relay Systems in Primary User Interference , 2012, IEEE Transactions on Signal Processing.

[16]  Derrick Wing Kwan Ng,et al.  Dynamic Resource Allocation in MIMO-OFDMA Systems with Full-Duplex and Hybrid Relaying , 2012, IEEE Transactions on Communications.

[17]  Matti Latva-aho,et al.  On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels , 2015, IEEE Signal Processing Letters.

[18]  Daesik Hong,et al.  Optimal Power Allocation and Outage Analysis for Cognitive Full Duplex Relay Systems , 2012, IEEE Transactions on Wireless Communications.

[19]  Jinhong Yuan,et al.  Antenna switching for security enhancement in full-duplex wiretap channels , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[20]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[21]  Matti Latva-aho,et al.  Performance of Block-Markov Full Duplex Relaying with Self Interference in Nakagami-m Fading , 2013, IEEE Wireless Communications Letters.

[22]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[23]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[24]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[25]  Daniel Benevides da Costa,et al.  Cognitive Amplify-and-Forward Relaying with Best Relay Selection in Non-Identical Rayleigh Fading , 2013, IEEE Communications Letters.

[26]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[27]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[28]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[29]  Matti Latva-aho,et al.  On the performance of full-duplex relaying under phy security constraints , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[30]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[31]  Yu-Dong Yao,et al.  Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.