On the performance of full-duplex relaying under phy security constraints

In this paper we investigate the performance of a cooperative network in the presence of an eavesdropper (Eve). Alice and Bob communicate with the help of a relay, which can operate either in half-duplex (HD) or full-duplex (FD) mode. We account for the self interference at the relay when operating under FD mode. Our analysis focus in the case that the CSI of Eve is not available at Alice. Thus, we derive closed-form expressions for secrecy outage probability. Our results allow us to compare the performance of FD and HD cooperative scenarios under secrecy constraints and, despite the additional interference at the relay, show the advantages of FD relaying over HD. In addition, we also show that a cooperative network is more vulnerable if Eve is closer to Alice than to the relay.

[1]  E. Alotaibi and K. Hamdi Physical Layer Security in Wireless Networks , 2014 .

[2]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.

[3]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[4]  Daesik Hong,et al.  Optimal Duplex Mode for DF Relay in Terms of the Outage Probability , 2010, IEEE Transactions on Vehicular Technology.

[5]  Matti Latva-aho,et al.  Performance of Block-Markov Full Duplex Relaying with Self Interference in Nakagami-m Fading , 2013, IEEE Wireless Communications Letters.

[6]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[8]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[11]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[12]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[13]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[14]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[15]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[16]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[17]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[18]  Mohamed-Slim Alouini,et al.  On the Outage Performance of Full-Duplex Selective Decode-and-Forward Relaying , 2013, IEEE Communications Letters.

[19]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[20]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[21]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.