Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver...
Saved in:
Published in | IEEE transactions on signal processing Vol. 61; no. 20; pp. 4962 - 4974 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.10.2013
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination. |
---|---|
AbstractList | This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination. |
Author | Petropulu, Athina P. Ottersten, Bjorn Gan Zheng Jiangyuan Li Krikidis, Ioannis |
Author_xml | – sequence: 1 surname: Gan Zheng fullname: Gan Zheng email: gan.zheng@uni.lu – sequence: 2 givenname: Ioannis surname: Krikidis fullname: Krikidis, Ioannis email: krikidis@ucy.ac.cy – sequence: 3 surname: Jiangyuan Li fullname: Jiangyuan Li email: jiangyli@rci.rutgers.edu – sequence: 4 givenname: Athina P. surname: Petropulu fullname: Petropulu, Athina P. email: athinap@rci.rutgers.edu – sequence: 5 givenname: Bjorn surname: Ottersten fullname: Ottersten, Bjorn email: bjorn.ottersten@uni.lu |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27783923$$DView record in Pascal Francis https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-139016$$DView record from Swedish Publication Index |
BookMark | eNpdkctLJDEQxoMorI-9L3hpEGEvPaY676M464sBZdVlbyGdrda4_ZhNpl3nvzfDDHMQClKkfvVRVd8B2e2HHgn5BnQCQM3Z48P9pKLAJlUlDeVmh-yD4VBSruRuzqlgpdDq9xdykNIrpcC5kftketPN4_AW-ufi_mWZgndtMXNLjMUD-oh-WTylVfFybNtyOs5bfC9uXdet_n6ix_CGMR2Rvca1Cb9u3kPydPnj8eK6nN1d3Vycz0rPhV6UgnFeKylRAkelfU2FV1ob6T1Qzuo_DYdGG-GRa6wdopdeoamFq6TmAtghKde66T_Ox9rOY-hcXNrBBTsNv87tEJ_t38WLBWYoyMx_X_N5xX8jpoXtQvLYtq7HYUw230ArqAzwjJ58Ql-HMfZ5m0wpMDmYyhRdUz4OKUVstiMAtSsbbLbBrmywGxtyy-lG2KV83Ca63oe07auU0sxULHPHay4g4rYsBa9UVvkACeSQ9w |
CODEN | ITPRED |
CitedBy_id | crossref_primary_10_1016_j_phycom_2017_10_017 crossref_primary_10_1016_j_jnca_2016_11_019 crossref_primary_10_3390_s21030856 crossref_primary_10_3390_s23177618 crossref_primary_10_1109_ACCESS_2018_2791638 crossref_primary_10_1109_TCOMM_2016_2641949 crossref_primary_10_1016_j_phycom_2022_101791 crossref_primary_10_1155_2022_4089931 crossref_primary_10_1109_TWC_2021_3098334 crossref_primary_10_1109_ACCESS_2017_2702713 crossref_primary_10_1016_j_comnet_2019_106871 crossref_primary_10_1109_LCOMM_2021_3134258 crossref_primary_10_1109_TCOMM_2018_2880216 crossref_primary_10_1109_JSEN_2015_2446465 crossref_primary_10_1109_LWC_2017_2756885 crossref_primary_10_3390_e25121594 crossref_primary_10_3390_app10207120 crossref_primary_10_1109_TCOMM_2022_3179412 crossref_primary_10_1109_TVT_2018_2889349 crossref_primary_10_3390_electronics9030407 crossref_primary_10_1109_TWC_2017_2689005 crossref_primary_10_1109_TCOMM_2023_3248607 crossref_primary_10_1109_TVT_2016_2639827 crossref_primary_10_1109_ACCESS_2019_2907781 crossref_primary_10_1109_TIFS_2015_2390136 crossref_primary_10_1109_ACCESS_2022_3155498 crossref_primary_10_1109_TVT_2019_2890999 crossref_primary_10_1109_LCOMM_2015_2490138 crossref_primary_10_1007_s10107_018_1235_y crossref_primary_10_1109_LCOMM_2016_2628892 crossref_primary_10_1109_TCOMM_2015_2495353 crossref_primary_10_1109_TVT_2018_2870280 crossref_primary_10_1109_TWC_2015_2472527 crossref_primary_10_1109_ACCESS_2016_2636239 crossref_primary_10_1109_LCOMM_2022_3169513 crossref_primary_10_1109_TVT_2019_2936870 crossref_primary_10_1109_TVT_2020_3007003 crossref_primary_10_1109_JSAC_2018_2825158 crossref_primary_10_1109_TMC_2023_3276930 crossref_primary_10_1109_TWC_2017_2700379 crossref_primary_10_1109_TWC_2020_3028857 crossref_primary_10_1109_TWC_2019_2941944 crossref_primary_10_1109_TSP_2018_2883008 crossref_primary_10_1109_TWC_2019_2906177 crossref_primary_10_1109_TCOMM_2022_3208621 crossref_primary_10_1109_TIFS_2016_2516970 crossref_primary_10_1049_iet_com_2019_1042 crossref_primary_10_1109_COMST_2018_2878035 crossref_primary_10_1109_JSTSP_2016_2603970 crossref_primary_10_1049_iet_com_2017_0719 crossref_primary_10_1109_ACCESS_2019_2904734 crossref_primary_10_1109_TVT_2019_2901282 crossref_primary_10_1109_TWC_2023_3239384 crossref_primary_10_1109_TIFS_2017_2746001 crossref_primary_10_1109_JSTSP_2016_2600518 crossref_primary_10_1109_JSTSP_2016_2600516 crossref_primary_10_1109_TIFS_2017_2705618 crossref_primary_10_3390_s22145257 crossref_primary_10_1109_TWC_2016_2633336 crossref_primary_10_1109_ACCESS_2018_2875118 crossref_primary_10_1109_TVT_2017_2744982 crossref_primary_10_1016_j_phycom_2020_101075 crossref_primary_10_1109_ACCESS_2018_2876446 crossref_primary_10_1109_TSP_2016_2601281 crossref_primary_10_3390_s19051126 crossref_primary_10_1109_TSUSC_2017_2729515 crossref_primary_10_1109_LCOMM_2014_2321152 crossref_primary_10_1109_LSP_2015_2504396 crossref_primary_10_1109_TWC_2016_2622689 crossref_primary_10_1109_COMST_2015_2403614 crossref_primary_10_1109_TVT_2016_2609396 crossref_primary_10_1109_TCCN_2021_3070582 crossref_primary_10_1109_JSAC_2018_2824379 crossref_primary_10_1109_TWC_2022_3170308 crossref_primary_10_1109_JSTSP_2016_2607684 crossref_primary_10_1109_LWC_2017_2748591 crossref_primary_10_1109_TWC_2022_3166865 crossref_primary_10_1109_ACCESS_2022_3215975 crossref_primary_10_54939_1859_1043_j_mst_CAPITI_2024_89_96 crossref_primary_10_1109_TCOMM_2014_2359878 crossref_primary_10_1109_TSP_2018_2879621 crossref_primary_10_1186_s13638_016_0621_5 crossref_primary_10_1109_TWC_2019_2910072 crossref_primary_10_1109_TGCN_2019_2949802 crossref_primary_10_1109_TWC_2016_2613860 crossref_primary_10_1109_TWC_2015_2482494 crossref_primary_10_1109_TVT_2022_3175971 crossref_primary_10_1049_iet_com_2017_0877 crossref_primary_10_1109_JIOT_2021_3050755 crossref_primary_10_1109_JSEN_2019_2904523 crossref_primary_10_1109_JSYST_2018_2889947 crossref_primary_10_1109_TIFS_2017_2756350 crossref_primary_10_1109_TVT_2018_2799900 crossref_primary_10_1109_TWC_2016_2560815 crossref_primary_10_1109_TIFS_2016_2584006 crossref_primary_10_1109_TVT_2021_3057830 crossref_primary_10_1109_TSP_2019_2910490 crossref_primary_10_1109_TSP_2020_2993165 crossref_primary_10_1109_TSP_2023_3310252 crossref_primary_10_1109_SURV_2014_012314_00178 crossref_primary_10_1109_TCOMM_2019_2945324 crossref_primary_10_1109_TIFS_2017_2765500 crossref_primary_10_1016_j_ijin_2023_11_004 crossref_primary_10_1002_dac_5399 crossref_primary_10_1186_s13638_015_0350_1 crossref_primary_10_1109_TCOMM_2017_2713816 crossref_primary_10_1109_TWC_2020_3017537 crossref_primary_10_1002_dac_4008 crossref_primary_10_1109_TVT_2017_2703159 crossref_primary_10_1109_MCOM_2014_6957156 crossref_primary_10_1109_TCCN_2017_2748132 crossref_primary_10_1109_TCOMM_2021_3111617 crossref_primary_10_1049_iet_com_2018_5502 crossref_primary_10_1049_iet_com_2018_0059 crossref_primary_10_1109_TWC_2018_2878014 crossref_primary_10_1109_TSP_2017_2709270 crossref_primary_10_1109_MCOM_2017_1700220 crossref_primary_10_1007_s11432_017_9110_x crossref_primary_10_1109_TIFS_2015_2446436 crossref_primary_10_1109_ACCESS_2017_2702663 crossref_primary_10_1109_TSP_2014_2364786 crossref_primary_10_1109_TCOMM_2017_2715176 crossref_primary_10_1109_COMST_2023_3318198 crossref_primary_10_1109_TWC_2023_3290257 crossref_primary_10_1109_TCOMM_2018_2811495 crossref_primary_10_1109_TCCN_2019_2933816 crossref_primary_10_1587_transcom_2018EBP3351 crossref_primary_10_1049_cmu2_12337 crossref_primary_10_1109_TWC_2018_2860960 crossref_primary_10_1109_TVT_2015_2394370 crossref_primary_10_1049_iet_com_2016_1384 crossref_primary_10_1109_TII_2018_2841033 crossref_primary_10_1155_2021_5565213 crossref_primary_10_1016_j_comcom_2019_06_007 crossref_primary_10_1109_JSAC_2018_2825558 crossref_primary_10_1109_TVT_2017_2729561 crossref_primary_10_1109_TVT_2018_2866977 crossref_primary_10_1109_ACCESS_2019_2899776 crossref_primary_10_1109_ACCESS_2018_2856627 crossref_primary_10_1109_TIFS_2016_2613846 crossref_primary_10_1109_LWC_2015_2445822 crossref_primary_10_1109_TWC_2020_2979456 crossref_primary_10_1109_ACCESS_2021_3060799 crossref_primary_10_1002_dac_2992 crossref_primary_10_1109_TCOMM_2019_2915623 crossref_primary_10_1109_JSAC_2018_2825560 crossref_primary_10_1049_iet_com_2019_0916 crossref_primary_10_1109_TWC_2015_2396066 crossref_primary_10_1109_TWC_2018_2890609 crossref_primary_10_1109_ACCESS_2016_2582486 crossref_primary_10_1109_TVT_2019_2949304 crossref_primary_10_1109_JSYST_2019_2900996 crossref_primary_10_1016_j_aeue_2018_11_031 crossref_primary_10_1109_JSAC_2018_2824760 crossref_primary_10_1109_TIFS_2018_2819132 crossref_primary_10_1109_TIFS_2014_2384392 crossref_primary_10_1109_TCOMM_2016_2625257 crossref_primary_10_1515_freq_2014_0235 crossref_primary_10_1109_TWC_2018_2849698 crossref_primary_10_1145_3453186 crossref_primary_10_1016_j_cose_2018_08_001 crossref_primary_10_1049_cmu2_12144 crossref_primary_10_1109_ACCESS_2017_2754585 crossref_primary_10_1109_LWC_2018_2796087 crossref_primary_10_1109_LSP_2015_2511821 crossref_primary_10_1109_TCCN_2021_3063525 crossref_primary_10_1109_TCOMM_2018_2884721 crossref_primary_10_1109_TWC_2018_2889768 crossref_primary_10_1109_LSP_2016_2553171 crossref_primary_10_1109_TSP_2019_2949501 crossref_primary_10_1109_LSP_2014_2316999 crossref_primary_10_1109_ACCESS_2018_2844558 crossref_primary_10_1109_JIOT_2019_2927379 crossref_primary_10_1109_COMST_2018_2865607 crossref_primary_10_1109_TCOMM_2020_3022349 crossref_primary_10_1109_MWC_2018_1700236 crossref_primary_10_1109_TVT_2018_2865968 crossref_primary_10_3390_electronics9020294 crossref_primary_10_1007_s11277_016_3865_9 crossref_primary_10_1007_s11277_015_2311_8 crossref_primary_10_1109_ACCESS_2021_3073543 crossref_primary_10_1587_transfun_E102_A_1560 crossref_primary_10_1109_ACCESS_2019_2929549 crossref_primary_10_1109_TIFS_2018_2834301 crossref_primary_10_1109_TWC_2016_2515090 crossref_primary_10_3390_drones7060364 crossref_primary_10_1109_OJCOMS_2024_3398511 crossref_primary_10_1016_j_dcan_2020_07_004 crossref_primary_10_3390_s16101726 crossref_primary_10_1109_ACCESS_2018_2842826 crossref_primary_10_1109_ACCESS_2017_2684542 crossref_primary_10_1109_TNET_2021_3069125 crossref_primary_10_1109_TVT_2016_2616679 crossref_primary_10_1109_TVT_2019_2961965 crossref_primary_10_1109_TCOMM_2016_2645679 crossref_primary_10_1109_TVT_2020_2995603 crossref_primary_10_1016_j_phycom_2019_100730 crossref_primary_10_1109_OJVT_2022_3189612 crossref_primary_10_1109_ACCESS_2017_2779607 crossref_primary_10_1109_TIFS_2018_2818076 crossref_primary_10_1109_TSP_2017_2701318 crossref_primary_10_1109_TVT_2018_2877718 crossref_primary_10_1109_ACCESS_2024_3353680 crossref_primary_10_1109_COMST_2017_2783901 crossref_primary_10_1109_JSAC_2023_3274037 |
Cites_doi | 10.1109/ISIT.2007.4557589 10.1007/s10479-004-5022-1 10.1109/ACSSC.2011.6189986 10.1109/TSP.2009.2038412 10.1109/ICASSP.2009.4960114 10.1109/TWC.2012.102612.120254 10.1109/TWC.2011.071411.102266 10.1109/SSP.2012.6319712 10.1109/TCOMM.2012.081012.110236 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TSP.2010.2092774 10.1109/TWC.2009.080542 10.1109/TIT.2011.2111750 10.1109/TIFS.2011.2111370 10.1109/18.490565 10.1109/TIT.2008.921678 10.1287/moor.1070.0268 10.1109/JSAC.2012.120921 10.1109/TIT.2003.820010 10.1109/TSP.2011.2164910 10.1109/TSP.2011.2159598 10.1109/ACSSC.2011.6189999 10.1109/LCOMM.2012.081612.121344 10.1109/INFCOM.2011.5934889 10.1109/TIFS.2011.2181946 10.1109/TWC.2008.060848 10.1109/TIFS.2013.2248730 10.1109/TSP.2011.2161295 10.1109/TWC.2009.090323 |
ContentType | Journal Article |
Copyright | 2014 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2013 |
Copyright_xml | – notice: 2014 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2013 |
DBID | 97E RIA RIE IQODW AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 ADTPV AOWAS D8V |
DOI | 10.1109/TSP.2013.2269049 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online Pascal-Francis CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database SwePub SwePub Articles SWEPUB Kungliga Tekniska Högskolan |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EISSN | 1941-0476 |
EndPage | 4974 |
ExternalDocumentID | oai_DiVA_org_kth_139016 3169624141 10_1109_TSP_2013_2269049 27783923 6542749 |
Genre | orig-research |
GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 85S 97E AAJGR AASAJ ABQJQ ABVLG ACGFO ACIWK ACNCT AENEX AJQPL ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 E.L EBS EJD F5P HZ~ IFIPE IPLJI JAVBF LAI MS~ O9- OCL P2P RIA RIE RIG RNS TAE TN5 3EH 53G 5VS 8W4 AAYOK ABFSI ABPTK ACKIV AETIX AI. AIBXA AKJIK ALLEH H~9 ICLAB IFJZH IPNFZ IQODW VH1 XFK AAYXX AGSQL CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 ADTPV AOWAS D8V |
ID | FETCH-LOGICAL-c458t-5344b766e614e78cb05c78896cc1043bdf41f895ce48ebaeec6c7e9b5a2684513 |
IEDL.DBID | RIE |
ISSN | 1053-587X 1941-0476 |
IngestDate | Sat Aug 24 00:27:01 EDT 2024 Wed Dec 04 05:20:59 EST 2024 Thu Oct 10 17:42:39 EDT 2024 Fri Dec 06 03:18:47 EST 2024 Fri Nov 25 16:33:44 EST 2022 Wed Jun 26 19:28:02 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 20 |
Keywords | Performance evaluation Parameter estimation Wireless telecommunication Power allocation Jamming Beam forming Optimization Optimal design Duplex process Optimal allocation Channel estimation Robustness MIMO Antenna Availability Outage Protective device Ergodicity Covariance matrix physical-layer security full-duplex Interference suppression Beamforming Simulation Signal processing Wireless network convex optimization Secrecy |
Language | English |
License | CC BY 4.0 https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c458t-5344b766e614e78cb05c78896cc1043bdf41f895ce48ebaeec6c7e9b5a2684513 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 1471971937 |
PQPubID | 85478 |
PageCount | 13 |
ParticipantIDs | pascalfrancis_primary_27783923 crossref_primary_10_1109_TSP_2013_2269049 proquest_journals_1471971937 ieee_primary_6542749 swepub_primary_oai_DiVA_org_kth_139016 proquest_miscellaneous_1448712914 |
PublicationCentury | 2000 |
PublicationDate | 2013-10-01 |
PublicationDateYYYYMMDD | 2013-10-01 |
PublicationDate_xml | – month: 10 year: 2013 text: 2013-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on signal processing |
PublicationTitleAbbrev | TSP |
PublicationYear | 2013 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ling (ref5) 2012 knox (ref28) 2013 ref26 ref25 ref20 ref22 ref21 ref27 ref29 ref8 ref7 ref9 ref4 ref3 duarte (ref23) 2012 ref6 lioliou (ref24) 2007 |
References_xml | – ident: ref31 doi: 10.1109/ISIT.2007.4557589 – ident: ref33 doi: 10.1007/s10479-004-5022-1 – ident: ref8 doi: 10.1109/ACSSC.2011.6189986 – ident: ref9 doi: 10.1109/TSP.2009.2038412 – ident: ref7 doi: 10.1109/ICASSP.2009.4960114 – ident: ref20 doi: 10.1109/TWC.2012.102612.120254 – year: 2012 ident: ref23 article-title: Design and characterization of a full-duplex multi-antenna system for WiFi networks publication-title: IEEE Trans Veh Technol contributor: fullname: duarte – ident: ref25 doi: 10.1109/TWC.2011.071411.102266 – ident: ref14 doi: 10.1109/SSP.2012.6319712 – ident: ref15 doi: 10.1109/TCOMM.2012.081012.110236 – ident: ref1 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref10 doi: 10.1109/TSP.2010.2092774 – ident: ref19 doi: 10.1109/TWC.2009.080542 – ident: ref4 doi: 10.1109/TIT.2011.2111750 – ident: ref12 doi: 10.1109/TIFS.2011.2111370 – ident: ref32 doi: 10.1109/18.490565 – start-page: 2306 year: 2012 ident: ref5 article-title: Lattice codes achieving strong secrecy over mod-<formula formulatype="inline"><tex Notation="TeX">$\Lambda$</tex></formula> Gaussian channel publication-title: Proc IEEE Int Symp Inf Theory (ISIT) contributor: fullname: ling – ident: ref3 doi: 10.1109/TIT.2008.921678 – ident: ref29 doi: 10.1287/moor.1070.0268 – ident: ref22 doi: 10.1109/JSAC.2012.120921 – start-page: 1 year: 2013 ident: ref28 article-title: Single antenna full duplex communications using a common carrier publication-title: IEEE Proc 11th Annu Wireless Microw Technol Conf (WAMICON'10) contributor: fullname: knox – ident: ref2 doi: 10.1109/TIT.2003.820010 – ident: ref21 doi: 10.1109/TSP.2011.2164910 – ident: ref30 doi: 10.1109/TSP.2011.2159598 – ident: ref26 doi: 10.1109/ACSSC.2011.6189999 – ident: ref27 doi: 10.1109/LCOMM.2012.081612.121344 – ident: ref18 doi: 10.1109/INFCOM.2011.5934889 – ident: ref13 doi: 10.1109/TIFS.2011.2181946 – start-page: 658 year: 2007 ident: ref24 article-title: Self-interference suppression in full-duplex MIMO relays publication-title: Proc Asilomar Conf Sign Syst Computers contributor: fullname: lioliou – ident: ref6 doi: 10.1109/TWC.2008.060848 – ident: ref17 doi: 10.1109/TIFS.2013.2248730 – ident: ref16 doi: 10.1109/TSP.2011.2161295 – ident: ref11 doi: 10.1109/TWC.2009.090323 |
SSID | ssj0014496 |
Score | 2.6216335 |
Snippet | This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper.... |
SourceID | swepub proquest crossref pascalfrancis ieee |
SourceType | Open Access Repository Aggregation Database Index Database Publisher |
StartPage | 4962 |
SubjectTerms | Applied sciences Beamforming Channels Communication channels convex optimization Covariance matrix Design engineering Detection, estimation, filtering, equalization, prediction Exact sciences and technology full-duplex Information, signal and communications theory Jamming MIMO Optimization physical-layer security Receivers Receivers & amplifiers Receiving Searching Signal and communications theory Signal, noise Telecommunications and information theory Wireless networks |
Title | Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers |
URI | https://ieeexplore.ieee.org/document/6542749 https://www.proquest.com/docview/1471971937 https://search.proquest.com/docview/1448712914 https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-139016 |
Volume | 61 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La9wwEB6SnNpDX0mp2zS4EAKBaGNbsmUdQ7chhCYE8mBvQpbHtKTZDY0NbX99Z2Sv2YQeCj4YS9jSfDLzjWY0A7BLSsPLRmaiNo0RSmImnK9TgY3XWa3Ry4LPO5-dFyfX6nSWz9bgYDwLg4gh-AwnfBt8-fXCd7xVdsjFlbQy67Cuje7Pao0eA6VCLS6iC1LkpZ4tXZKJOby6vOAYLjkhqmESzpq5ooJCTRWOiHQPJJSmr2bxmG6uphANauf4JZwtB9xHm9xOuraa-D9Pcjn-74xewYuBf8ZH_YJ5DWs4fwPPV7ISbsJ03GiILwYU46-OqHl8yRzT_45DnEHM1quYdvc_8Fd86u7u-BmxUAyRHltwffzl6vOJGIotCK_yshW5VKrSRYGkr1GXvkpyT-axKbwni01WdaPSpjS5R1Vi5RB94TWaKnecLyZP5VvYmC_m-A7ixqGqjHeJr6UqiOK4LKG10qAmrlBLGcH-Uv72vs-pYYMtkhhLWFnGyg5YRbDJUhv7DQKLYOcRYGN7pjVTPvrG9hJBO_yVD2Tm6NTQJXUEn8Zm-p_YSeLmuOi4D5lwRIJSFcFej_z4ck7FPf1-c2QJQ3vbfrMp7xgV7_89xg_wjGfSR_5tw0b7s8OPxGDaaics3b8HHO5- |
link.rule.ids | 230,315,781,785,797,886,27929,27930,54763 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fa9RAEB5qfdA--KuK0VojiCCYa5LdZLOPxbOc9a4UepV7WzabCUrbu2ITUP96Zza5cBUfhDyEbEh259tlvtmZnQF4S0rDiVqkUaVrHUmBaWRdlURYO5VWCp3I-bzz7CSfnMvjRbbYgg_DWRhE9MFnOOJb78uvVq7lrbIDLq6kpL4DdzNJ66I7rTX4DKT01biIMIgoK9Ri7ZSM9cH87JSjuMSIyIaOOW_mhhLyVVU4JtLekFjqrp7FbcK5mUTUK56jhzBbd7mLN7kYtU05cr__yub4v2N6BA96BhoedlPmMWzh8gnsbOQl3IXxsNUQnvY4hlNL5Dw8Y5bpfoU-0iBk-zUat9eX-DM8tldX_Ix4KPpYj6dwfvRp_nES9eUWIiezookyIWWp8hxJY6MqXBlnjgxknTtHNpsoq1omdaEzh7LA0iK63CnUZWY5Y0yWiGewvVwt8TmEtUVZamdjVwmZE8mxaUyzpUZFbKESIoD3a_mb6y6rhvHWSKwNYWUYK9NjFcAuS214rxdYAPu3ABvaU6WY9NE_9tYImn5d3pChoxJNl1ABvBmaaUWxm8QucdXyO2TEEQ1KZADvOuSHj3My7vH3r4eGMDQXzTeT8J5R_uLffXwN9ybz2dRMP598eQn3eVRdHOAebDc_WnxFfKYp9_00_gOp-_HM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Improving+Physical+Layer+Secrecy+Using+Full-Duplex+Jamming+Receivers&rft.jtitle=IEEE+transactions+on+signal+processing&rft.au=Zheng%2C+Gan&rft.au=Krikidis%2C+I.&rft.au=Li%2C+Jiangyuan&rft.au=Petropulu%2C+A.+P.&rft.date=2013-10-01&rft.issn=1053-587X&rft.volume=61&rft.issue=20&rft.spage=4962&rft_id=info:doi/10.1109%2FTSP.2013.2269049&rft.externalDocID=oai_DiVA_org_kth_139016 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1053-587X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1053-587X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1053-587X&client=summon |