Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network

This paper investigates the physical layer security of orthogonal frequency division multiplexing technique. The investigation considers a multi -user untrustworthy half/full-duplex based two-way wireless relay with a finite number of friendly jammers in the system model. According to Monte-Carlo simulation results, the system model that operates in full-duplex mode achieves slightly better secrecy outage performance than the system model that operates in half-duplex mode. The results also show that friendly jammers , besides minimizing the information leakage, degrade the system performance severely and cause system coding gain losses in high signal-to-noise ratios.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[3]  Petar Popovski,et al.  Physical-Layer Security With Full-Duplex Transceivers and Multiuser Receiver at Eve , 2017, IEEE Transactions on Communications.

[4]  Victor Adamchik,et al.  The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.

[5]  Jorge Cabral,et al.  Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[6]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[7]  Tho Le-Ngoc,et al.  Performance of Full-Duplex AF Relaying in the Presence of Residual Self-Interference , 2014, IEEE Journal on Selected Areas in Communications.

[8]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[9]  Yueming Cai,et al.  Secrecy Rates for Relay Selection in OFDMA Networks , 2011, 2011 Third International Conference on Communications and Mobile Computing.

[10]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[11]  Volkan Ozduran Physical Layer Security of Multi-user Full-Duplex One-Way Wireless Relaying Network , 2018, 2018 Advances in Wireless and Optical Communications (RTUWO).

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Yueming Cai,et al.  Resource allocation for physical layer security in cooperative OFDM networks , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[14]  Michail Matthaiou,et al.  Two-Way AF Relaying in the Presence of Co-Channel Interference , 2013, IEEE Transactions on Communications.

[15]  Waqas Aman,et al.  Enhancing physical layer security in dual-hop multiuser transmission , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[16]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[17]  Ehsan Soleimani-Nasab,et al.  Opportunistic source-pair selection for multi-user two-way amplify-and-forward wireless relaying networks , 2016, IET Commun..

[18]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.