Abstract

Full-duplex communication enables simultaneous transmission from both ends of a communication link, thereby promising significant performance gains. Generally, it has been shown that the throughput and delay gains of full-duplex communication are somewhat limited in realistic network settings, leading researchers to study other possible applications that can accord higher gains. The potential of full-duplex communication in improving the physical-layer security of a communication link is investigated in this contribution. We specifically present a thorough analysis of the achievable ergodic secrecy rate and the secrecy degrees of freedom with full-duplex communication in the presence of a half-duplex eavesdropper node, with both single-user decoding and multi-user decoding capabilities. For the latter case, an eavesdropper with successive interference cancellation and joint decoding capabilities is assumed. Irrespective of the eavesdropper capabilities and channel strengths, the ergodic secrecy rate with full-duplex communication is found to grow linearly with the log of the direct channel signal-to-noise-ratio (SNR) as opposed to the flattened out secrecy rate with conventional half-duplex communication. Consequently, the secrecy degrees of freedom with full-duplex is shown to be two as opposed to that of zero in half-duplex mode.

Highlights

  • H ISTORICALLY, full-duplex communication, i.e. simultaneous transmission and reception on the same radio resource, had been considered impractical due to the overwhelming loopback interference from the transmission-end at the co-located receiver

  • The findings presented in this work demonstrate that a very high degree of physical-layer security can be achieved by enabling FD communication between the D2D nodes

  • An intermediate proposal is to enable the base stations with FD capabilities, and is known as the base station full-duplex (BS-FD) architecture [1]. The investigations in this contribution have revealed that the simultaneous transmission from both end of a FD communication link is the main contributor to the enhanced physical-layer security

Read more

Summary

INTRODUCTION

H ISTORICALLY, full-duplex communication, i.e. simultaneous transmission and reception on the same radio resource, had been considered impractical due to the overwhelming loopback interference from the transmission-end at the co-located receiver. The authors in [22] have investigated the secrecy performance of FD relay networks demonstrating it to have a better secrecy performance than HD relay networks in scenarios where self-interference can be well suppressed They further proposed a FD jamming relay network wherein the relay nodes transmit jamming signals simultaneously as it receives the data from the source. On the other hand, [24] investigates the potential of using FD jamming receivers to improve physical-layer secrecy and robustness without the aid of external relays Both of these contributions focus on developing a transmission scheme to optimize the secrecy rate with simplistic assumptions limiting the applicability in realistic scenarios (e.g., strict achievability of positive secrecy rate as in [19]). The work in [29] assumes a FD wiretap channel in the presence of an eavesdropper and imperfect channel state information, and proposes techniques to maximize the achievable sum secrecy rate

Key Contributions
Paper Organization
SYSTEM MODEL
Signal Model
Achievable Secrecy Rate
Secrecy Degrees of Freedom
ACHIEVABLE SECRECY RATE ANALYSIS
Achievable Secrecy Rate Analysis With Single-User Decoding Eve
Achievable Secrecy Rate Analysis With Multi-User Decoding Eve
SECRECY DEGREES OF FREEDOM ANALYSIS
Secrecy Degrees of Freedom Analysis of Half-Duplex Communication
Secrecy Degrees of Freedom Analysis of Full-Duplex Communication With SU-Eve
Secrecy Degrees of Freedom Analysis of Full-Duplex Communication With MU-Eve
Applications in Device to Device Communication
Applications in Cellular Networks With BS FD
Applications in Conventional HD Cellular Networks
NUMERICAL RESULTS
Ergodic Secrecy Rate as a Function of μ and φ
Ergodic Secrecy Rate as a Function of Fading Parameter m
Ergodic Secrecy Rate as a Function of the Residual Self Interference Power I
Ergodic Secrecy Rate With Advanced Receiver at Eve
Secrecy Degrees of Freedom Results
CONCLUSIONS AND OUTLOOK
Evaluating J2
Evaluating K2

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.