• DocumentCode
    1764533
  • Title

    Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols

  • Author

    Parsaeefard, S. ; Le-Ngoc, T.

  • Author_Institution
    McGill Univ., Montréal, QC, Canada
  • Volume
    10
  • Issue
    10
  • fYear
    2015
  • fDate
    Oct. 2015
  • Firstpage
    2095
  • Lastpage
    2107
  • Abstract
    In this paper, we examine the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and the destination in the presence of residual self-interference (SI) and eavesdropper. In particular, we consider two different protocols based on the FD capability of relay: 1) FD transmission (FDT), in which the FD-Relay receives and sends data concurrently; 2) FD-Relay with jamming (FDJ), where first, the FD-Relay simultaneously receives data and sends jamming to the eavesdropper; then, it forwards the data, while the source jams the eavesdropper. We first develop the secrecy rate expressions for half-duplex transmission (HDT), half-duplex with jamming (HDJ), FDT, and FDJ relaying protocols, and then use them to derive their performance properties in terms of the channel gains between nodes, eavesdropper types, and more importantly, the SI level in FD-Relay. We further investigate the non-convex power allocation problems for the developed FDT and FDJ to maximize the secrecy rate under the power constraints. In particular, we develop an efficient iterative algorithm based on the difference-of-two-concave-functions programming. Analytical and simulation results show the strong influence of SI level on the achieved secrecy rate of the FDT and the FDJ. For sufficiently low SI, FDT achieves a much higher secrecy rate than FDJ, HDJ, and HDT. However, for higher SI, FDJ becomes more effective in enhancing the achieved secrecy rate. The results also indicate that adaptive power allocation can significantly improve the performance and confirm that the proposed FDT and FDJ outperform the HDT and the HDJ.
  • Keywords
    concave programming; fading channels; iterative methods; jamming; protocols; relay networks (telecommunication); FD transmission; FD-Relay with jamming; channel gains; difference-of-two-concave-functions programming; fading channel; full-duplex relay-assisted protocols; half-duplex transmission; half-duplex with jamming; iterative algorithm; non-convex power allocation problems; relaying protocols; wireless secrecy rate; Interference; Jamming; Protocols; Relays; Resource management; Signal to noise ratio; Silicon; Difference-of-two-concave-functions (DC)- Programming; Difference-of-two-concave-functions (DC)-programming; full-duplex relay; physical-layer security;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2015.2446436
  • Filename
    7124460