Secure Relaying Communication with Multi-Antenna Full-Duplex Destination

Authors

Faculty of Engineering, Shahrekord University, Shahrekord, Iran

Abstract

In this paper, the physical layer security of a full-duplex secure cooperative wireless system with multiple inputmultiple-output (MIMO) destination node is examined. We assume that a source node communicates  with  a destination node in the presence of an eavesdropper. In addition, a jamming signal is sent via destination to weaken the relay-eavesdropper thanks due to the full-duplex operation at the destination node. We propose different beamforming schemes and accordingly derive the instantaneous and average secrecy rates. We also study the effect of the number of antennas, the position of the eavesdropper, and the transmit power of the source and destination nodes on the average secrecy rate. Our results reveal that beamforming and friendly jamming increase the secrecy of cooperative communication. Moreover, simulation results demonstrate that the choice of the beamforming scheme plays a critical role in determining the FD cooperative communication gains.

Keywords


[1] H. Deng, H. M. Wang, W. Guo and W. Wang, “Secrecy transmission with a helper: To relay or to jam,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293–307, Feb. 2015.
[2] R. Zhang, L. Song, Z. Han and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[3] C. Jeong, I-M. Kim and D. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
[4] J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Trans. Signal Process., vol. 39, no. 10, pp. 4871-4884, Oct. 2011.
[5] مرضیه نظام‌آبادی، ابوالفضل فلاحتی، همسوسازی تداخل فرصت‌طلب در شبکه‌های رادیو شناختگر با ارسال کد فضا-زمان کاربران ثانویه، مجله مهندسی برق دانشگاه تبریز، دوره 46، شماره 2- شماره پیاپی 76، تابستان 1395، صفحه 341-333 .
[6] X. Wang, K. Wang and X. Zhang, “Secure relay beamforming with imperfect channel state information,” IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, June 2013.
[7] H-M. Wang, M. Luo, X-G. Xia and Q. Yin, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Proces. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
[8] L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Sig. Proc., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
[9] G. Zheng, Li-Chia Choo, and K. K. Wong, “Optimal Cooperative Jamming To Enhance Physical Layer Security Using Relays,” IEEE Trans. on Sig. Proc., vol. 59, no. 3, pp. 1317 - 1322, Mar. 2011.
[10] I. Krikidis, J. S. Thompson and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, pp. 5003–5011, Oct. 2009.
[11] J. Vilela, M. Bloch, J. Barros and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Trans. Inf. Forens. Sec., vol. 6, pp. 256–266, June 2011.
[12] S. Gerbracht, C. Scheunert and E. A. Jorswieck, “Secrecy Outage in MISO Systems With Partial Channel Information,” IEEE Trans. Inf. Forens. Sec., vol. 7, no. 2, pp. 704-716, Apr. 2012.
[13] S. Luo, J. Li and A. Petropulu, “Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming,” in Proc. 2012 IEEE Statistical Signal Processing Workshop (SSP2012), Ann Arbor, MI, Aug. 2012.
[14] Z. Ding, M. Peng and H. -H. Chen, “A general relaying transmission protocol for MIMO secrecy communications,” IEEE Trans. Commun., vol. 60, pp. 3461–3471, Nov. 2012.
[15] J. Vilela, M. Bloch, J. Barros and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Trans. Inf. Forens. Sec., vol. 6, pp. 256–266, June 2011.
[16] S. Gerbracht, C. Scheunert and E. A. Jorswieck, “Secrecy Outage in MISO Systems With Partial Channel Information,” IEEE Trans. Inf. Forens. Sec., vol. 7, no. 2, pp. 704-716, Apr. 2012.
[17] S. Luo, J. Li and A. Petropulu, “Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming,” in Proc. 2012 IEEE Statistical Signal Processing Workshop (SSP2012), Ann Arbor, MI, Aug. 2012.
[18] Jing Huang and A. Lee Swindlehurst, “Cooperative Jamming for Secure Communications in MIMO Relay Networks,” IEEE Trans. Sig. Proc., vol. 59, no. 10, Oct. 2011.   
[19] Yupeng Liu, Jiangyuan Li and A. P. Petropulu, “Destination assisted cooperative jamming for wireless physical-layer security,” IEEE Trans. Inform. Forensics Security, vol. 8, no. 4, pp. 682–694, Apr. 2013.  
[20] S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent,” in Proc. IEEE Int. Conf. Comp. Commun., Shanghai, China, April 2011, pp. 1125–1133.
[21] T. Riihonen, S. Werner and R. Wichman, “Hybrid full-duplex/half-duplex relaying with transmit power adaptation,” IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3074-3085, Sept. 2011.
[22] A. Mukherjee and A. L. Swindlehurst, “A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures,” in Proc. Asilomar Conf. Sign. Systems Comp., Pacific Grove, CA, Nov. 2011, pp. 265-269.
[23] W. Li, M. Ghogho, B. Chen and C. Xiong, “Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
[24] محمدعلی محمدی، زهرا مبینی، نرخ قابل حصول ارسال هم‌زمان اطلاعات و توان برای سیستم مخابرات دوطرفه مجهز به آرایه آنتن عظیم، مجله مهندسی برق دانشگاه تبریز، پذیرفته شده، 1396.  
[25] M. Mohammadi, B. K. Chalise, H. A. Suraweera, C. Zhong, G. Zheng and I. Krikidis, “Throughput analysis and optimization of wireless-powered multiple antenna full-duplex relay systems,” IEEE Trans. Commun., vol. 64, no. 4, pp. 1769–1785, Apr 2016.
[26] M. Bloch, J. Barros, M. Rodrigues and S. McLaughlin, Wireless information-theoretic security, IEEE Transactions on Information Theory, 2008, 54(6): 2515–2534.
[27] I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series and Products, 7th ed. New York, NY, USA: Academic, 2007.