Robust Secrecy Rate Optimization for Full-Duplex Bidirectional Communications

This paper considers the physical-layer secrecy design for full-duplex (FD) bidirectional communications in the presence of an eavesdropper (Eve). The goal of this work is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions via appropriately designing the transmit covariance matrices at the legitimate nodes. To this end, we propose an alternating difference-of-concave (ADC) approach to iteratively optimizing the transmit covariance matrices. We show that each ADC iteration can be carried out efficiently with a semi-closed- form solution, and that every limit point of ADC iterations is a stationary solution of the SSR maximization problem. Besides the SSR maximization, this paper also deals with a robust SSR maximization problem to account for imperfect CSI of Eve. Assuming a moment-based random CSI error model (i.e., only mean and covariance of the error are known, but the exact distribution is not known), robust transmit designs based on Markov's inequality and the robust conic reformulation are developed. The efficacy of the proposed designs is demonstrated through simulations.

[1]  Qiang Li,et al.  Sum secrecy rate maximization for full-duplex two-way relay networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Rui Zhang,et al.  Full-Duplex Wireless-Powered Relay With Self-Energy Recycling , 2014, IEEE Wireless Communications Letters.

[3]  David G. Luenberger,et al.  Linear and nonlinear programming , 1984 .

[4]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[5]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[6]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[7]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[9]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[10]  Qi Zhang,et al.  Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications , 2015, IEEE Wireless Communications Letters.

[11]  Zhi-Quan Luo,et al.  A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization , 2012, SIAM J. Optim..

[12]  Qiang Li,et al.  Distributionally robust chance-constrained transmit beamforming for multiuser MISO downlink , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[14]  Sumei Sun,et al.  Full-Duplex Wireless-Powered Communication Network With Energy Causality , 2014, IEEE Transactions on Wireless Communications.

[15]  Dong Han,et al.  Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming , 2016, IEEE Journal of Selected Topics in Signal Processing.

[16]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[17]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[18]  Qi Zhang,et al.  Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications , 2016, IEEE Transactions on Vehicular Technology.