Sum secrecy rate maximization for multi-carrier MIMOME systems with full-duplex jamming

Abstract In this work we study the sum secrecy rate maximization problem for a multi-carrier and multiple-input-multiple-output multiple-antenna eavesdropper (MIMOME) communication system. We consider the setup that the receiver is capable of full-duplex (FD) operation and simultaneously sends jamming signal to a potential eavesdropper. In particular, we intend to achieve a higher security level in the physical layer by simultaneously utilizing the spatial and frequency diversity of the FD-enabled system. In order to deal with the non-convex nature of the problem, we reformulate the problem as a separately convex program and propose an iterative algorithm. The iterative solution has a guaranteed convergence based on block coordinate descent method. Furthermore, for a simplified scenario where the transmitter is only equipped with a single antenna, the system is mitigated to a transmit power allocation problem. We obtain an optimal solution analytically with the assumption of a known jamming strategy. We also study an FD bidirectional secure communication system, where both transceivers are capable of FD operation. The numerical evaluations indicate the gain of an optimized jamming strategy for an FD multi-carrier system.

[1]  N. K. Shankaranarayanan,et al.  Full- or half-duplex? A capacity analysis with bounded radio resources , 2012, 2012 IEEE Information Theory Workshop.

[2]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[3]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[4]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[5]  Ashutosh Sabharwal,et al.  JointNull : Combining Reconfigurable Analog Cancellation with Transmit Beamforming for Large-antenna Full-duplex Wireless , 2017 .

[6]  Ananthanarayanan Chockalingam,et al.  Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).

[7]  Stephen P. Boyd,et al.  Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.

[8]  Kaare Brandt Petersen,et al.  The Matrix Cookbook , 2006 .

[9]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[10]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[11]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[12]  Rudolf Mathar,et al.  Joint power and beam optimization in a multi-carrier MIMO wiretap channel with Full-Duplex jammer , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[13]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[14]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[15]  Halim Yanikomeroglu,et al.  Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[16]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[18]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Mounir Ghogho,et al.  Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation , 2011, Phys. Commun..

[20]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[21]  Mohanad Obeed,et al.  Efficient algorithms for physical layer security in two-way relay systems , 2018, Phys. Commun..

[22]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[23]  Yiming Ma,et al.  A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.

[24]  Philip Schniter,et al.  Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.

[25]  PROPAGATION DATA AND PREDICTION METHODS FOR THE PLANNING OF INDOOR RADIOCOMMUNICATION SYSTEMS AND RADIO LOCAL AREA NETWORKS IN THE FREQUENCY RANGE 900 MHz TO 100 GHz , 1997 .

[26]  Ashutosh Sabharwal,et al.  SoftNull: Many-Antenna Full-Duplex Wireless via Digital Beamforming , 2015, IEEE Transactions on Wireless Communications.

[27]  Rudolf Mathar,et al.  Hardware Impairments Aware Transceiver Design for Bidirectional Full-Duplex MIMO OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.

[28]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.

[29]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[30]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[31]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[32]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[33]  Garimella Rama Murthy,et al.  Full-duplex communication for future wireless networks: Dynamic resource block allocation approach , 2016, Phys. Commun..

[34]  Zhi Xue,et al.  Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.

[35]  Narayan Prasad,et al.  On Robust Weighted-Sum Rate Maximization in MIMO Interference Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[36]  Philip Levis,et al.  Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.

[37]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[38]  Sachin Katti,et al.  Full Duplex MIMO Radios , 2014, NSDI.

[39]  Stephen P. Boyd,et al.  Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..

[40]  Tho Le-Ngoc,et al.  Full-duplex relay with jamming protocol for improving physical-layer security , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[41]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[42]  Ashutosh Sabharwal,et al.  Full-duplex wireless communications using off-the-shelf radios: Feasibility and first results , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[43]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[44]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[45]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[46]  R. Hunger Floating Point Operations in Matrix-Vector Calculus , 2022 .