Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications

Wireless energy harvesting, physical-layer security, and full-duplex wireless are important, emerging fifth generation (5G) technologies. In this paper, we thus investigate a source–destination link with an energy-harvesting full-duplex relay and a jammer (to degrade the eavesdropper channel) in the presence of an eavesdropper. Thus, to exploit energy harvesting and to improve security, we propose a full-duplex jammer (FDJ) protocol and its half-duplex version (HDJ). Two cases for availability of the eavesdropper channel state information (ECSI) are considered: complete ECSI and incomplete ECSI. For both FDJ and HDJ protocols and for complete ECSI, we derive the instantaneous and average secrecy rates and compute optimal time split for energy harvesting. To gain more insights, we consider a practical interference-limited scenario and derive closed-form cumulative distribution function of the signal-to-interference plus noise ratio at the destination and eavesdropper nodes. Comparatively, we show that FDJ improves instantaneous secrecy rate over HDJ. However, the degree of improvement is highly dependent on time split for energy harvesting, amount of self-interference, the channel gains, and locations of the nodes. Our findings reveal that FDJ increases the average secrecy rate 150% over HDJ and 260% over HD relaying without jammer. For incomplete ECSI scenario, we derive asymptotic secrecy outage and show that FDJ performs better for small-to-medium values of source powers; otherwise, HDJ yields a higher gain.

[1]  Melissa Duarte,et al.  Full-duplex Wireless: Design, Implementation and Characterization , 2012 .

[2]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Risto Wichman,et al.  Guest Editorial: In-Band Full-Duplex Wireless Communications and Networks , 2014, IEEE J. Sel. Areas Commun..

[6]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[8]  Caijun Zhong,et al.  Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems , 2016, IEEE Transactions on Communications.

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[11]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Caijun Zhong,et al.  Secure Transmission in Cooperative Relaying Networks With Multiple Antennas , 2016, IEEE Transactions on Wireless Communications.

[13]  Rui Zhang,et al.  Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.

[14]  Taneli Riihonen,et al.  Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation , 2011, IEEE Transactions on Wireless Communications.

[15]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Derrick Wing Kwan Ng,et al.  Simultaneous wireless information and power transfer in modern communication systems , 2014, IEEE Communications Magazine.

[17]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[18]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[19]  Jianhui Wu,et al.  Secure wireless communications via cooperative relaying and jamming , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[20]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[21]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[22]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[23]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[24]  Erik G. Larsson,et al.  Multipair Full-Duplex Relaying With Massive Arrays and Linear Processing , 2014, IEEE Journal on Selected Areas in Communications.

[25]  H. Vincent Poor,et al.  Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.

[26]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[27]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[28]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[29]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[30]  Caijun Zhong,et al.  Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.

[31]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[32]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[33]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[34]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[35]  Sachin Katti,et al.  Full Duplex MIMO Radios , 2014, NSDI.

[36]  Chintha Tellambura,et al.  Full-Duplex Radio for Uplink/Downlink Wireless Access With Spatially Random Nodes , 2015, IEEE Transactions on Communications.

[37]  Chau Yuen,et al.  Full-Duplex Relay Selection for Amplify-and-Forward Cooperative Networks , 2012, IEEE Transactions on Wireless Communications.

[38]  Nikos C. Sagias,et al.  Physical Layer Security for Multiple-Antenna Systems: A Unified Approach , 2016, IEEE Transactions on Communications.

[39]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[40]  Chintha Tellambura,et al.  Security enhancement of wireless networks with wireless-powered full-duplex relay and friendly jammer nodes , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).