Physical-Layer Security With Full-Duplex Transceivers and Multiuser Receiver at Eve

Full-duplex communication enables simultaneous transmission from both ends of a communication link, thereby promising significant performance gains. Generally, it has been shown that the throughput and delay gains of full-duplex communication are somewhat limited in realistic network settings, leading researchers to study other possible applications that can accord higher gains. The potential of full-duplex communication in improving the physical-layer security of a communication link is investigated in this contribution. We specifically present a thorough analysis of the achievable ergodic secrecy rate and the secrecy degrees of freedom with full-duplex communication in the presence of a half-duplex eavesdropper node, with both single-user decoding and multi-user decoding capabilities. For the latter case, an eavesdropper with successive interference cancellation and joint decoding capabilities is assumed. Irrespective of the eavesdropper capabilities and channel strengths, the ergodic secrecy rate with full-duplex communication is found to grow linearly with the log of the direct channel signal-to-noise-ratio (SNR) as opposed to the flattened out secrecy rate with conventional half-duplex communication. Consequently, the secrecy degrees of freedom with full-duplex is shown to be two as opposed to that of zero in half-duplex mode.

[1]  Rudolf Mathar,et al.  Physical-Layer Security for Simultaneous Information and Power Transfer in Full-Duplex Multi-User Networks , 2016, WSA.

[2]  Preben E. Mogensen,et al.  On the potential of full duplex performance in 5G ultra-dense small cell networks , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).

[3]  Ekram Hossain,et al.  5G cellular: key enabling technologies and research challenges , 2015, IEEE Instrumentation & Measurement Magazine.

[4]  Preben E. Mogensen,et al.  Can Full Duplex Boost Throughput and Delay of 5G Ultra-Dense Small Cell Networks? , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[5]  Fernando M. L. Tavares,et al.  On the Potential of Full Duplex Communication in 5G Small Cell Networks , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[6]  Philip Levis,et al.  Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.

[7]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[8]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[9]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[10]  Preben E. Mogensen,et al.  Can full duplex reduce the discovery time in D2D communication? , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[11]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Nurul H. Mahmood,et al.  Analyzing the potential of full duplex in 5G ultra-dense small cell networks , 2016, EURASIP J. Wirel. Commun. Netw..

[13]  Victor Adamchik,et al.  The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.

[14]  Martin Haenggi,et al.  Throughput analysis for wireless networks with full-duplex radios , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Kenneth Stewart,et al.  Enabling technologies and architectures for 5G wireless , 2014, 2014 IEEE MTT-S International Microwave Symposium (IMS2014).

[16]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[17]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[18]  Ashutosh Sabharwal,et al.  Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes , 2013, IEEE Transactions on Wireless Communications.

[19]  Ananthanarayanan Chockalingam,et al.  Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).

[20]  Pei Liu,et al.  Full duplex cellular systems: will doubling interference prevent doubling capacity? , 2015, IEEE Communications Magazine.

[21]  Ekram Hossain,et al.  Analysis of Massive MIMO-Enabled Downlink Wireless Backhauling for Full-Duplex Small Cells , 2015, IEEE Transactions on Communications.

[22]  Nurul H. Mahmood,et al.  Throughput Analysis of Full Duplex Communication with Asymmetric Traffic in Small Cell Systems , 2015, ICWMC 2015.

[23]  Preben E. Mogensen,et al.  On the ergodic secrecy capacity with full duplex communication , 2017, 2017 IEEE International Conference on Communications (ICC).

[24]  Li Sun,et al.  Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[25]  Namyoon Lee,et al.  Relay-Aided Successive Aligned Interference Cancellation for Wireless $X$ Networks With Full-Duplex Relays , 2017, IEEE Transactions on Vehicular Technology.

[26]  Pei Liu,et al.  Full Duplex Operation for Small Cells , 2014, ArXiv.

[27]  K. Sharma Integrals involving products of G -function and Gauss's hypergeometric function , 1964 .

[28]  Samir Saoudi,et al.  Performance Analysis of Project-and-Forward Relaying in Mixed MIMO-Pinhole and Rayleigh Dual-Hop Channel , 2016, IEEE Communications Letters.

[29]  Xinyu Zhang,et al.  Does full-duplex double the capacity of wireless networks? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[30]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[31]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[32]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[33]  Ping Cao,et al.  A 15GHz Full Duplex System for Microwave Backhauling , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[34]  Aylin Yener,et al.  MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[35]  Kostas Peppas,et al.  A New Formula for the Average Bit Error Probability of Dual-Hop Amplify-and-Forward Relaying Systems over Generalized Shadowed Fading Channels , 2012, IEEE Wireless Communications Letters.

[36]  Matti Latva-aho,et al.  On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels , 2015, IEEE Signal Processing Letters.

[37]  Ming Xiao,et al.  Two-Timeslot Two-Way Full-Duplex Relaying for 5G Wireless Communication Networks , 2016, IEEE Transactions on Communications.

[38]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[39]  Günes Karabulut-Kurt,et al.  A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex Beamforming , 2014, IEEE Communications Letters.

[40]  Preben E. Mogensen,et al.  On the secrecy degrees of freedom with full-duplex communication , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[41]  Petar Popovski,et al.  Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation , 2009, IEEE Transactions on Information Forensics and Security.

[42]  Urs Niesen,et al.  Interference alignment: From degrees-of-freedom to constant-gap capacity approximations , 2011, 2012 IEEE International Symposium on Information Theory Proceedings.

[43]  Mohamed-Slim Alouini,et al.  A New Formula for the BER of Binary Modulations with Dual-Branch Selection over Generalized-K Composite Fading Channels , 2010, IEEE Transactions on Communications.

[44]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[45]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[46]  Caijun Zhong,et al.  Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems , 2016, IEEE Transactions on Communications.

[47]  Taneli Riihonen,et al.  Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation , 2011, IEEE Transactions on Wireless Communications.

[48]  Preben E. Mogensen,et al.  Analysing self interference cancellation in full duplex radios , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[49]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[50]  Nurul H. Mahmood,et al.  Full duplex communications in 5G small cells , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).