DocumentCode
1764533
Title
Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols
Author
Parsaeefard, S. ; Le-Ngoc, T.
Author_Institution
McGill Univ., Montréal, QC, Canada
Volume
10
Issue
10
fYear
2015
fDate
Oct. 2015
Firstpage
2095
Lastpage
2107
Abstract
In this paper, we examine the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and the destination in the presence of residual self-interference (SI) and eavesdropper. In particular, we consider two different protocols based on the FD capability of relay: 1) FD transmission (FDT), in which the FD-Relay receives and sends data concurrently; 2) FD-Relay with jamming (FDJ), where first, the FD-Relay simultaneously receives data and sends jamming to the eavesdropper; then, it forwards the data, while the source jams the eavesdropper. We first develop the secrecy rate expressions for half-duplex transmission (HDT), half-duplex with jamming (HDJ), FDT, and FDJ relaying protocols, and then use them to derive their performance properties in terms of the channel gains between nodes, eavesdropper types, and more importantly, the SI level in FD-Relay. We further investigate the non-convex power allocation problems for the developed FDT and FDJ to maximize the secrecy rate under the power constraints. In particular, we develop an efficient iterative algorithm based on the difference-of-two-concave-functions programming. Analytical and simulation results show the strong influence of SI level on the achieved secrecy rate of the FDT and the FDJ. For sufficiently low SI, FDT achieves a much higher secrecy rate than FDJ, HDJ, and HDT. However, for higher SI, FDJ becomes more effective in enhancing the achieved secrecy rate. The results also indicate that adaptive power allocation can significantly improve the performance and confirm that the proposed FDT and FDJ outperform the HDT and the HDJ.
Keywords
concave programming; fading channels; iterative methods; jamming; protocols; relay networks (telecommunication); FD transmission; FD-Relay with jamming; channel gains; difference-of-two-concave-functions programming; fading channel; full-duplex relay-assisted protocols; half-duplex transmission; half-duplex with jamming; iterative algorithm; non-convex power allocation problems; relaying protocols; wireless secrecy rate; Interference; Jamming; Protocols; Relays; Resource management; Signal to noise ratio; Silicon; Difference-of-two-concave-functions (DC)- Programming; Difference-of-two-concave-functions (DC)-programming; full-duplex relay; physical-layer security;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2446436
Filename
7124460
Link To Document