Full-Duplex Small-Cell Networks: A Physical-Layer Security Perspective

We provide a theoretical study of physical (PHY)-layer security performance in full-duplex (FD) small-cell networks. Here, the multi-antenna base stations (BSs) and user equipments (UEs) follow from the homogeneous Poisson point process-based abstraction model. To facilitate FD communications, we take into account: 1) successive interference cancellation capability at the UE side via guard regions of arbitrary radii and 2) residual self-interference at the BS side using Rician fading distribution with arbitrary statistics. We investigate the small-cell network PHY-layer security performance in the presence of a Poisson field of eavesdroppers, under the different scenarios of passive and colluding eavesdropping. Considering linear zero-forcing beamforming, we characterize the downlink and the uplink ergodic secrecy rates and derive closed-form expressions for the different useful and interference signals statistics. In certain special cases of interest, we apply non-linear curve-fitting techniques to large sets of (exact) theoretical data in order to obtain closed-form approximations for the different ergodic rates and ergodic secrecy rates under consideration. Our findings indicate that the FD functionality, in addition to enhancing the spectral efficiency, can significantly improve the PHY-layer security performance, especially with the aid of multi-antenna communications and interference cancellation schemes.

[1]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[2]  Zhu Han,et al.  Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.

[3]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[4]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[6]  Kai-Kit Wong,et al.  Full-Duplex MIMO Small-Cells: Secrecy Capacity Analysis , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[7]  Wei Yu,et al.  Full-Duplex Cloud Radio Access Network: Stochastic Design and Analysis , 2017, IEEE Transactions on Wireless Communications.

[8]  Jeffrey G. Andrews,et al.  User Association for Load Balancing in Heterogeneous Cellular Networks , 2012, IEEE Transactions on Wireless Communications.

[9]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[10]  Kai-Kit Wong,et al.  Physical layer security in full-duplex cellular networks , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[11]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[12]  Mikael Skoglund,et al.  Achieving the Degrees of Freedom of Wireless Multi-User Relay Networks , 2012, IEEE Transactions on Communications.

[13]  Aydin Sezgin,et al.  Divide-and-Conquer: Approaching the Capacity of the Two-Pair Bidirectional Gaussian Relay Network , 2012, IEEE Transactions on Information Theory.

[14]  George K. Karagiannidis,et al.  Massive Multiuser MIMO in Heterogeneous Cellular Networks With Full Duplex Small Cells , 2017, IEEE Transactions on Communications.

[15]  Martin Haenggi,et al.  Throughput Analysis for Full-Duplex Wireless Networks With Imperfect Self-Interference Cancellation , 2015, IEEE Transactions on Communications.

[16]  Ekram Hossain,et al.  On User Association in Multi-Tier Full-Duplex Cellular Networks , 2017, IEEE Transactions on Communications.

[17]  Huiming Wang,et al.  On Transmission Secrecy Outage of a Multi-Antenna System With Randomly Located Eavesdroppers , 2014, IEEE Communications Letters.

[18]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[19]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[20]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Ekram Hossain,et al.  On Stochastic Geometry Modeling of Cellular Uplink Transmission With Truncated Channel Inversion Power Control , 2014, IEEE Transactions on Wireless Communications.

[22]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[23]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[25]  Jeffrey G. Andrews,et al.  Analytical Modeling of Uplink Cellular Networks , 2012, IEEE Transactions on Wireless Communications.

[26]  Matti Latva-aho,et al.  On the Spectral Efficiency of Full-Duplex Small Cell Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[27]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[28]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[29]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[30]  Kai-Kit Wong,et al.  Self-Interference in Full-Duplex Multi-User MIMO Channels , 2017, IEEE Communications Letters.

[31]  Martin Haenggi,et al.  Stochastic Geometry for Wireless Networks , 2012 .

[32]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[33]  Kai-Kit Wong,et al.  Massive MIMO-Enabled Full-Duplex Cellular Networks , 2016, IEEE Transactions on Communications.

[34]  Justin P. Coon,et al.  Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering , 2017, IEEE Wireless Communications Letters.

[35]  Giuseppe Thadeu Freitas de Abreu,et al.  Asymptotic Secrecy Analysis of Random Networks With Colluding Eavesdroppers , 2018, IEEE Systems Journal.

[36]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[37]  Ashutosh Sabharwal,et al.  Asymptotic Analysis of MIMO Multi-Cell Full-Duplex Networks , 2017, IEEE Transactions on Wireless Communications.

[38]  Ashutosh Sabharwal,et al.  Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes , 2013, IEEE Transactions on Wireless Communications.

[39]  Qian Yang,et al.  Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.

[40]  Francesco Faà di Bruno Théorie des formes binaires , 1876 .

[41]  Ekram Hossain,et al.  Analysis of Massive MIMO-Enabled Downlink Wireless Backhauling for Full-Duplex Small Cells , 2015, IEEE Transactions on Communications.

[42]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[43]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[44]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[45]  Kai-Kit Wong,et al.  Design, Modeling, and Performance Analysis of Multi-Antenna Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[46]  Jeffrey G. Andrews,et al.  Transmission capacity of ad hoc networks with spatial diversity , 2007, IEEE Transactions on Wireless Communications.

[47]  Dongkyu Kim,et al.  A Survey of In-Band Full-Duplex Transmission: From the Perspective of PHY and MAC Layers , 2015, IEEE Communications Surveys & Tutorials.

[48]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[49]  Marco Di Renzo,et al.  Stochastic Geometry Modeling and System-Level Analysis of Uplink Heterogeneous Cellular Networks With Multi-Antenna Base Stations , 2016, IEEE Transactions on Communications.

[50]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[51]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[52]  Victor C. M. Leung,et al.  In-Band Full-Duplex Relaying: A Survey, Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[53]  Jie Tang,et al.  Exact SINR Statistics in the Presence of Heterogeneous Interferers , 2015, IEEE Transactions on Information Theory.

[54]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[55]  Geoffrey Ye Li,et al.  Full-Duplex Cellular Networks , 2017, IEEE Communications Magazine.

[56]  Marios Kountouris,et al.  Full-Duplex MIMO Small-Cell Networks With Interference Cancellation , 2016, IEEE Transactions on Wireless Communications.

[57]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[58]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[59]  Honglin Zhao,et al.  Relay Selection for Improved Security in Cognitive Relay Networks With Jamming , 2017, IEEE Wireless Communications Letters.

[60]  Jeffrey G. Andrews,et al.  Coverage in multi-antenna two-tier networks , 2009, IEEE Transactions on Wireless Communications.