Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary

We propose a robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper. In the considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works in the literature concentrate on passive eavesd...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 16; no. 2; pp. 885 - 899
Main Authors Abedi, Mohammad Reza, Mokari, Nader, Saeedi, Hamid, Yanikomeroglu, Halim
Format Journal Article
LanguageEnglish
Published New York IEEE 01.02.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:We propose a robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper. In the considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works in the literature concentrate on passive eavesdroppers and half-duplex (HD) legitimate receivers. In this paper, the adversary intends to optimize its transmit and jamming signal parameters so as to minimize the secrecy data rate of the legitimate transmission. In the literature, assuming that the receiver operates in HD mode, secrecy data rate maximization problems subject to the power transmission constraint have been considered in which cooperating nodes act as jammers to confound the eavesdropper. This paper investigates an alternative solution in which we take advantage of FD capability of the receiver to send jamming signals against the eavesdroppers. The proposed self-protection scheme eliminates the need for external helpers. Moreover, we consider the channel state information uncertainty on the links between the active eavesdropper and other legitimate nodes of the network. Optimal power allocation is then obtained based on the worst-case secrecy data rate maximization, under a legitimate transmitter power constraint in the presence of the active eavesdropper. Numerical results confirm the advantage of the proposed secrecy design and in certain conditions, demonstrate substantial performance gain over the conventional approaches.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1536-1276
1558-2248
DOI:10.1109/TWC.2016.2633336