Full-Duplex Decode-and-Forward Relaying: Secrecy Rates and Optimal Power Allocation

This paper investigates the secrecy rates and optimal power allocation schemes of a decode-and-forward (DF) wiretap relay channel where a relay operates in a full-duplex (FD) mode. A practical self-interference model is adopted to take into account the effect of residual self-interference. At first, we demonstrate that while the optimal power allocation schemes between the source and the relay are non-convex, closed-form solutions can still be established under different power constraints. An asymptotic behavior of the solutions is then provided to shed important insights on the derived power allocation schemes. Specifically, by using the method of dominant balance, we show that the relay should use full power when its power budget is sufficiently small as compared to power budget at the source. Otherwise, the optimal power consumed at the relay approaches a constant to effectively handle the residual self-interference. The analysis is also helpful to demonstrate that the secrecy capacity of the considered full-duplex relay system is twice as much as that of the half-duplex system. In addition, numerical results reveal that DF relaying provides significantly higher secrecy rate over Amplify-and-Forward (AF) relaying.

[1]  Jian Wang,et al.  Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[2]  Harish Krishnaswamy,et al.  A 60 GHz CMOS Full-Duplex Transceiver and Link with Polarization-Based Antenna and RF Cancellation , 2016, IEEE Journal of Solid-State Circuits.

[3]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Dongkyu Kim,et al.  A Survey of In-Band Full-Duplex Transmission: From the Perspective of PHY and MAC Layers , 2015, IEEE Communications Surveys & Tutorials.

[5]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[6]  Sachin Shetty,et al.  On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel , 2017, IEEE Transactions on Vehicular Technology.

[7]  Ranjan Bose,et al.  Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.

[8]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[9]  Taneli Riihonen,et al.  Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation , 2011, IEEE Transactions on Wireless Communications.

[10]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[11]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[12]  Sachin Shetty,et al.  Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[13]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[14]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[16]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Taneli Riihonen,et al.  Full-Duplex Transceiver System Calculations: Analysis of ADC and Linearity Challenges , 2014, IEEE Transactions on Wireless Communications.

[18]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[19]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[20]  Lingyang Song,et al.  Performance Analysis of Hybrid Relay Selection in Cooperative Wireless Systems , 2012, IEEE Transactions on Communications.