DocumentCode :
1764533
Title :
Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols
Author :
Parsaeefard, S. ; Le-Ngoc, T.
Author_Institution :
McGill Univ., Montréal, QC, Canada
Volume :
10
Issue :
10
fYear :
2015
fDate :
Oct. 2015
Firstpage :
2095
Lastpage :
2107
Abstract :
In this paper, we examine the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and the destination in the presence of residual self-interference (SI) and eavesdropper. In particular, we consider two different protocols based on the FD capability of relay: 1) FD transmission (FDT), in which the FD-Relay receives and sends data concurrently; 2) FD-Relay with jamming (FDJ), where first, the FD-Relay simultaneously receives data and sends jamming to the eavesdropper; then, it forwards the data, while the source jams the eavesdropper. We first develop the secrecy rate expressions for half-duplex transmission (HDT), half-duplex with jamming (HDJ), FDT, and FDJ relaying protocols, and then use them to derive their performance properties in terms of the channel gains between nodes, eavesdropper types, and more importantly, the SI level in FD-Relay. We further investigate the non-convex power allocation problems for the developed FDT and FDJ to maximize the secrecy rate under the power constraints. In particular, we develop an efficient iterative algorithm based on the difference-of-two-concave-functions programming. Analytical and simulation results show the strong influence of SI level on the achieved secrecy rate of the FDT and the FDJ. For sufficiently low SI, FDT achieves a much higher secrecy rate than FDJ, HDJ, and HDT. However, for higher SI, FDJ becomes more effective in enhancing the achieved secrecy rate. The results also indicate that adaptive power allocation can significantly improve the performance and confirm that the proposed FDT and FDJ outperform the HDT and the HDJ.
Keywords :
concave programming; fading channels; iterative methods; jamming; protocols; relay networks (telecommunication); FD transmission; FD-Relay with jamming; channel gains; difference-of-two-concave-functions programming; fading channel; full-duplex relay-assisted protocols; half-duplex transmission; half-duplex with jamming; iterative algorithm; non-convex power allocation problems; relaying protocols; wireless secrecy rate; Interference; Jamming; Protocols; Relays; Resource management; Signal to noise ratio; Silicon; Difference-of-two-concave-functions (DC)- Programming; Difference-of-two-concave-functions (DC)-programming; full-duplex relay; physical-layer security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2446436
Filename :
7124460
Link To Document :
بازگشت