A New Design Paradigm for Secure Full-Duplex Multiuser Systems

We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate the Eves’ channels. To enhance the max-min SR, a major part of the power budget should be allocated to serve the users with poor channel qualities, such as those far from the FD-BS, undermining the SR for other users, and thus compromising the SR per-user. In addition, the main obstacle in designing an FD system is due to the self-interference (SI) and co-channel interference (CCI) among users. We therefore propose an alternative solution, where the FD-BS uses a fraction of the time block to serve near DL users and far UL users, and the remaining fractional time to serve other users. The proposed scheme mitigates the harmful effects of SI, CCI, and multiuser interference, and provides system robustness. The SR optimization problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints. For the case of perfect channel state information (CSI), we develop a low-complexity path-following algorithm, which involves only a simple convex program of moderate dimension at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optimum. Then, we extend the path-following algorithm to the cases of partially known Eves’ CSI, where only statistics of CSI for the Eves are known, and worst-case scenario in which Eves can employ a more advanced linear decoder. The merit of our proposed approach is further demonstrated by extensive numerical results.

[1]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[2]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[3]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[4]  Björn Debaillie,et al.  DUPLO Deliverable D 1 . 1 System Scenarios and Technical Requirements for Full-Duplex Concept , 2013 .

[5]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[6]  Marwan Krunz,et al.  Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.

[7]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[8]  Chungyong Lee,et al.  Non-orthogonal Multiple Access in a Downlink Multiuser Beamforming System , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[9]  H. Vincent Poor,et al.  A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.

[10]  H. D. Tuan,et al.  Successive Convex Quadratic Programming for Quality-of-Service Management in Full-Duplex MU-MIMO Multicell Networks , 2016, IEEE Transactions on Communications.

[11]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[12]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[13]  H. Tuy Convex analysis and global optimization , 1998 .

[14]  H. Vincent Poor,et al.  Joint Fractional Time Allocation and Beamforming for Downlink Multiuser MISO Systems , 2017, IEEE Communications Letters.

[15]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[16]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[17]  Ami Wiesel,et al.  Linear precoding via conic optimization for fixed MIMO receivers , 2006, IEEE Transactions on Signal Processing.

[18]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[19]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[20]  Octavia A. Dobre,et al.  Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[21]  Hoang Duong Tuan,et al.  Nonsmooth Optimization for Efficient Beamforming in Cognitive Radio Multicast Transmission , 2012, IEEE Transactions on Signal Processing.

[22]  Matti Latva-aho,et al.  On the Spectral Efficiency of Full-Duplex Small Cell Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[23]  H. Vincent Poor,et al.  Spectral and Energy Efficiencies in Full-Duplex Wireless Information and Power Transfer , 2017, IEEE Transactions on Communications.

[24]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[25]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[26]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[27]  H. Vincent Poor,et al.  MIMO Energy Harvesting in Full-Duplex Multi-User Networks , 2017, IEEE Transactions on Wireless Communications.

[28]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[29]  H. Vincent Poor,et al.  Precoder Design for Signal Superposition in MIMO-NOMA Multicell Networks , 2017, IEEE Journal on Selected Areas in Communications.

[30]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[31]  Robert Schober,et al.  Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs , 2017, IEEE Transactions on Communications.

[32]  Ming Chen,et al.  Joint Time Allocation and Power Control in Multicell Networks With Load Coupling: Energy Saving and Rate Improvement , 2017, IEEE Transactions on Vehicular Technology.

[33]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[34]  Octavia A. Dobre,et al.  Energy and Traffic Aware Full-Duplex Communications for 5G Systems , 2017, IEEE Access.

[35]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[36]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[37]  Tho Le-Ngoc,et al.  MIMO Full-Duplex Precoding: A Joint Beamforming and Self-Interference Cancellation Structure , 2015, IEEE Transactions on Wireless Communications.

[38]  Derrick Wing Kwan Ng,et al.  Key technologies for 5G wireless systems , 2017 .

[39]  Van-Dinh Nguyen,et al.  Spectral Efficiency of Full-Duplex Multi-user System: Beamforming Design, User Grouping, and Time Allocation , 2017, IEEE Access.

[40]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[41]  Athanasios V. Vasilakos,et al.  Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.

[42]  Lutz H.-J. Lampe,et al.  Multiple-antenna techniques for wireless communications - a comprehensive literature survey , 2009, IEEE Communications Surveys & Tutorials.

[43]  Tharmalingam Ratnarajah,et al.  Weighted Sum Rate Maximization in Full-Duplex Multi-User Multi-Cell MIMO Networks , 2017, IEEE Transactions on Communications.

[44]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[45]  Johan Löfberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .

[46]  P. Spreij Probability and Measure , 1996 .