ArticlePDF Available

Abstract and Figures

In this paper, physical-layer security of a cooperative wireless system with multi-antenna full-duplex (FD) destination is examined. More specifically, we consider a cooperative transmission scenario in which a source communicates with a destination through a relay in the presence of an eavesdropper. In order to degrade the wiretap channel, FD destination simultaneously transmits an interference signal towards the eavesdropper, while receiving information from the relay. A joint transmit and receive beamformer design is proposed to maximize the signal-to-interference-plus-noise ratio (SINR) at the destination, while guaranteeing that the SINR at the eavesdropper is below a certain threshold. We reformulate optimization problem as a semidefinite relaxation problem in terms of a transmit beamforming matrix. To balance the performance and system complexity, we investigate suboptimum beamforming designs based on zero-forcing criterion. We derive exact closed-form expressions for the average secrecy rates of the proposed suboptimum designs. Our results reveal that optimum and suboptimum beamforming schemes along with friendly jamming significantly improve the secrecy performance. Moreover, simulation results demonstrate that optimum scheme outperforms suboptimum schemes, especially in high transmit power regimes. Index Terms-Average secrecy rate, full-duplex (FD), beam-forming design, cooperative relaying system, zero-forcing (ZF).
Content may be subject to copyright.
1
Secure Cooperative Network with Multi-Antenna
Full-Duplex Receiver
Fatemeh Jafarian, Student Member, IEEE, Zahra Mobini, Member, IEEE
Mohammadali Mohammadi, Member, IEEE
Abstract—In this paper, physical-layer security of a cooperative
wireless system with multi-antenna full-duplex (FD) destination is
examined. More specifically, we consider a cooperative transmis-
sion scenario in which a source communicates with a destination
through a relay in the presence of an eavesdropper. In order
to degrade the wiretap channel, FD destination simultaneously
transmits an interference signal towards the eavesdropper, while
receiving information from the relay. A joint transmit and
receive beamformer design is proposed to maximize the signal-
to-interference-plus-noise ratio (SINR) at the destination, while
guaranteeing that the SINR at the eavesdropper is below a certain
threshold. We reformulate optimization problem as a semidefinite
relaxation problem in terms of a transmit beamforming matrix.
To balance the performance and system complexity, we inves-
tigate suboptimum beamforming designs based on zero-forcing
criterion. We derive exact closed-form expressions for the average
secrecy rates of the proposed suboptimum designs. Our results
reveal that optimum and suboptimum beamforming schemes
along with friendly jamming significantly improve the secrecy
performance. Moreover, simulation results demonstrate that
optimum scheme outperforms suboptimum schemes, especially
in high transmit power regimes.
Index Terms—Average secrecy rate, full-duplex (FD), beam-
forming design, cooperative relaying system, zero-forcing (ZF).
I. INT ROD UC TI ON
Wireless communication technology has entered almost
every aspect of social life. Smart grids, sensor and cellular
networks, and smart homes are just a few examples of the
wireless systems. Despite their well-known applications and
benefits, the broadcast nature of wireless networks makes
security an ongoing important issue due to the fact that the
information signals can be overheard by both specific users
and eavesdropper nodes [1], [2]. From an information theory
perspective, a secure wireless connection can be realized utiliz-
ing channel features such as fading, noise, and interference [3].
To this end, physical-layer security has been recognized as
a promising approach to enhance the secrecy rate which is
defined as the difference between the instantaneous secrecy
rate of the legitimate channel and that of the eavesdropping
channel [3].
To date, several physical-layer techniques have been intro-
duced such as multiple-input multiple-output (MIMO) trans-
mission, cooperative relaying, and cooperative jamming [1].
It is shown that MIMO transmission can notably improve the
secrecy rate [4], [5] and secrecy outage probability [6]. On one
F. Jafarian, Z. Mobini, and M. Mohammadi are with the Faculty of
Engineering, Shahrekord University, Shahrekord 115, Iran (email: Jafar-
ian@stu.sku.ac.ir and {z.mobini, m.a.mohammadi}@eng.sku.ac.ir).
hand, MIMO technique increases the power of the legitimate
signal due to diversity and on the other hand, it reduces
the amount of overheard signals at the eavesdroppers [7],
[8]. In particular, MIMO transmissions enable beamforming
designs to improve the legitimate channel or degrade the
wiretap channel [9], [10]. There has been a growing body
of research that studies the secure MIMO systems [11]–[14].
In [11] beamforming designs for amplify-and-forward relaying
protocol in two-hop secure communications are provided.
The optimal power allocation strategy that maximizes the
secrecy rate achievable by beamforming in MIMO multiple-
eavesdropper Rayleigh-fading wiretap channels is proposed
in [12]. Many works have also investigated the security of
wireless MIMO cooperative networks in specific application
scenarios such as simultaneous wireless information and power
transfer [13], [14]. Secrecy performance of cooperative relay-
ing with optimal relay selection for different cases of channel
state information (CSI) availability is also investigated in [15].
Another effective way to increase the secrecy rate in
wireless communication systems is to weaken the ability of
eavesdropper nodes to decode the confidential information by
applying controlled interference or an artificial noise [16],
[17], which is known as cooperative jamming. In [18], the
performance of secure wireless communication with different
cooperative schemes including decode-and-forward, amplify-
and-forward, and cooperative jamming has been investigated.
The optimal beamforming scheme with the transmission of
an artificial noise to minimize the secrecy outage probability
has been proposed in [19], [20]. The work in [21] has
studied the cooperative jamming schemes for two-hop relay
networks where inactive nodes in the relay network are used
as cooperative jamming sources to compromise the eaves-
dropper. Physical layer security of a two-way untrusted relay
system, where the two sources exchange information through
an untrusted intermediate relay, using friendly jamming has
been studied in [22]. The secure systems with cooperative
interference signal transmission, however, mainly rely on
external nodes, and hence they may suffer from helpful nodes
mobility, coordination and trust. To overcome this problem, in
some new studies the receiver or destination are considered to
act as a jammer [23], [24].
On a parallel development, recent advances in electronics,
antenna technology, and signal processing provide a full-
duplex (FD) operational mode for nodes, so that they can
transmit and receive information simultaneously [25]. The
potential benefits offered by the application of FD technique
can be exploited in recent wireless networks to satisfy high
security requirements. The authors in [26] have investigated
physical-layer security of a two-tier decentralized wireless
network using FD jamming techniques. The work in [27] has
considered FD communications in a multi-user multiple-input
single-output wireless non-cooperative network with receiver-
based friendly jamming. In [28] jammer selection and FD
users were used in heterogeneous cellular networks and signifi-
cant improvements of the system security was shown. Antenna
selection and power allocation for a wiretap channel with
multiple-antenna FD destination have been studied in [29].
In [30], secrecy rate expressions for a wireless network with
joint wireless-powered FD relay transmission and friendly
jamming have been developed.
Motivated by all above, in this paper, the advantage of using
MIMO FD destination in a cooperative system including a
source and a relay in the presence of an active eavesdropper
is examined. The destination node receives information from
the decode-and-forward relay while simultaneously sends a
jamming signal to the eavesdropper. In an FD wireless sys-
tem, the interference signal also affects the receiver circuits
of an FD node, which is called self-interference (SI) [31].
Accordingly, we suggest transmit and receive beamforming
designs to completely remove SI in the destination node and
hence, our system is not interference limited. We note that
an active eavesdropper plays dual roles in the network, i.e.,
it works as an eavesdropper for some signals and legitimate
user for others [18]. Active eavesdropper exchanges signaling
messages with the nodes in the network and its CSI is
available.
Two potential application scenarios for our proposed secure
wireless relaying system are 1) a secure remote monitoring
system using cooperative relaying where a monitor sends
confidential messages to the FD multiple antenna monitoring
center, and 2) a secure wireless sensor network where sensing
data from the remote sensors are collected by a destination
with the help of a relay node while an eavesdropper tries
to intercept the transmitted sensing information. Using FD
operation and multiple antenna transmission, the destination
can significantly degrade the relay-eavesdropper link by trans-
mitting artificial noise when it receives the information from
the relay.
The main contributions of this paper can be outlined as
follows:
Different suboptimal transmit and receive beamformer
vectors are designed based on zero-forcing (ZF) crite-
rion, namely transmit zero forcing (TZF), and receive
zero forcing (RZF) to maximize the received signal-to-
interference-plus-noise ratio (SINR) at the destination
such that the SI is completely cancelled out. An optimum
receiver and transmit destination beamformer scheme
using semidefinite relaxation (SDR) approach is also
proposed, where the aim is maximizing the SINR at
the destination, while guaranteeing that the SINR at the
eavesdropper is below a certain threshold. We observe
that optimum scheme outperforms suboptimal schemes
especially for high transmit power. Further, the secrecy
performance gap between the optimum and suboptimal
schemes decreases with increasing the antenna numbers.
ŚŚ
ŚŚ
Information signal
Jamming signal
Source Relay
Destination
Eavesdropper
,
EE
^Z
Fig. 1. Considered secure relay system with multi-antenna FD destination.
Average secrecy rates of the system for different subopti-
mal beamforming schemes are derived. For comparison,
the results of maximum ratio combining (MRC) and max-
imal ratio transmission (MRT) beamformer at the desti-
nation input and output are also presented. We observe
that for TZF and RZF schemes, the average secrecy rate
increases significantly with the increase in the number of
transmit and receive antennas. Simulation results suggest
that when the distance between eavesdropper and relay is
low to moderate, MRC/MRT scheme outperforms other
suboptimal schemes. However, as this distance increases,
TZF outperforms MRC/MRT.
Notation: We use bold upper case letters to denote matrices,
bold lower case letters to denote vectors. The superscripts (·)T,
(·),(·), and (·)1stand for transpose, conjugate, conjugate
transpose, and matrix inverse, respectively; the Euclidean norm
of the vector is denoted by ∥ · ∥; the trace and the rank
of a matrix are denoted by tr(·)and rank(·), respectively;
Pr(·)denotes the probability; E{·},fX(·)and FX(·)denote
the expectation, the probability density function (pdf), and
cumulative distribution function (cdf) of the random variable
(RV) X, respectively; and CN(µ, σ2)denotes a circularly
symmetric complex Gaussian RV Xwith mean µand variance
σ2;Γ(a)is the Gamma function; γ(a, x)and Γ(a, x)are
upper incomplete and lower incomplete Gamma function [32,
Eq. (8.350)], and Ei(x)is the exponential integral [32, Eq.
(8.211.1)].
II. SYSTEM MO DE L
Consider a secure relaying system with one source (S),
one decode-and-forward relay (R), one FD destination (D),
and one active eavesdropper (E) as shown in Fig. 1. We
assume a single-antenna relaying system with multiple antenna
destination which is equipped with NRantennas for reception
and NTantennas for transmission. This model with the single
antenna source, relay, and eavesdropper nodes1facilities sys-
tem analysis and the derived expressions are useful to obtain
design insights.
1The performance analysis of various transmission schemes under a multi-
antenna source, relay, and eavesdropper nodes implementation is an interesting
direction for future research.
It is assumed that the Dand Eare located far away from
the S. Due to the long distances between the Sand Dand E,
there is a higher probability that these links suffer from strong
blockage and shadowing, compared to the links between the S
and R, and hence there is no direct link from the Sto the D
or to E[33]. Therefore, Scommunicates with Dwith the aid
of R, while Etries to overhear the transmitted message from
R. On the other hand, the FD destination transmits jamming
signal to create interference at E, while receiving the signals
from the R[29].
All links are modeled as block Rayleigh fading channels,
i.e., the channel remains static for one coherence interval and
changes independently in different intervals. Moreover, we
assume that the links experience both large-scale path loss and
small-scale fading. For the large-scale path loss, we assume
the path loss model dµ
i,j where µ > 2is the path loss exponent
and di,j is the distance between the transmitter iand receiver
j, with i∈ {S, R, D}and j∈ {R, D, E }. The small-scale
fading for S-Rand R-Elink are denoted as hSR and hRE ,
respectively. Moreover, the NR×1small-scale fading vector
of the R-Dlink and the 1×NTsmall-scale fading vector
of the D-Elink are denoted as hRD and hDE , respectively.
Furthermore, similar to [25], [34], [35], we model the elements
of the NR×NTSI channel at the FD destination, HSI, as
independent identically distributed (i.i.d) CN (0, σ 2
SI)RVs. We
also assume that perfect CSI is available at the destination2.
A. Transmission Protocol
We adopt a two-hop cooperative transmission protocol be-
tween Sand Das follows:
During the first hop, Stransmits its signal xswith
E|xs[n]|2= 1 to R, and Rreceives
yR[n] = ps
dµ
SR
hSR [n]xs[n] + nR[n],(1)
where psis the source transmit power, and nRis the additive
white Gaussian noise (AWGN) at Rwith EnRn
R=σ2
R.
The relay first decodes received signal and then, at the second
hop, Rtransmits xR[n] = prˆxs[n], where pris the relay
transmit power and ˆxs[n]is the estimate of the source signal at
the R. At the same time, the FD destination transmits jamming
signal xJ[n], with E|xJ[n]|2= 1 while receiving signal
from R. Therefore, the received signals at Dand Ecan be
expressed as
yD[n]=pr
dµ
RD
w
rhRD ˆxs[n]+pdw
rHSIwtxJ[n]+w
rnD[n],
(2)
and
yE[n] = pr
dµ
RE
hRE ˆxs[n] + pd
dµ
DE
hDE wtxJ[n] + nE[n],
(3)
2It would be interesting to extend the beamforming designs and analytical
results to the practical imperfect CSI case and also under the passive
eavesdropping where the CSI of the eavesdropper’s channel is not available
at the destination node.
respectively, where wrand wtare NR×1receive beamformer
vector and NT×1transmit beamformer vector at D, respec-
tively, pdis the transmit power at D,nD[n]is the NR×1
AWGN vector at Dwith EnDn
D=σ2
DINRand nE[n]is
the AWGN at Ewith EnEn
E=σ2
E. Therefore, the SINR
at Dcan be written as
γD= min
ps|hSR |2
dµ
SR σ2
R
,
pr
dµ
RD |w
rhRD|2
pd|w
rHSIwt|2+σ2
D
.(4)
Moreover, the received SINR at Ecan be expressed as
γE=
pr
dµ
RE |hRE |2
pd
dµ
DE |hDE wt|2+σ2
E
.(5)
III. RECEIVE AND TRANSMIT BEAMFORMER DESIGN
From (4) and (5), it is evident that the received SINRs
at the destination and eavesdropper are dependent on the
beamforming design at the destination. Therefore, in this
section, we study the optimum and suboptimum destination
beamforming designs.
A. Optimum Beamformer Design
With optimum beamformer design, we aim to maximize the
received SINR at the destination, while guaranteeing that the
SINR at the eavesdropper is smaller than a certain threshold.
In this case, the optimization problem can be mathematically
formulated as
max
wr,wt
γD(wr,wt,)
s.t. γE(wt)γth
wr=wt= 1.(6)
By invoking (4) and (5), the optimization problem (6) can be
written as
max
wr,wt
min
ps|hSR |2
dµ
SR σ2
R
,
pr
dµ
RD |wrhRD|2
pd|w
rHSIwt|2+σ2
D
s.t.
pr
dµ
RE |hRE |2
pd
dµ
DE |hDE wt|2+σ2
Eγth
wr=wt= 1.(7)
We observe that only the second term inside the min operator
in (7) depends on wr. Accordingly, for a given wt, the
optimum receive beamformer, wr, is obtained by maximizing
|wrhRD|2
|w
rHSIwt|2pd+σ2
D
. This means that wris the solution of the
generalized Rayleigh quotient
max
wr=1
w
rhRDh
RDwr
w
rAwr
,(8)
where A=pdHSIwtw
tH
SI +σ2
DI. Therefore, the optimum
wrcan be derived as
wr=A1hRD
A1hRD.(9)
By substituting wrinto γDand using Sherman-Morrison
formula, γDcan be written as
γD=pr
dµ
RD
h
RDpdHSI wtw
tH
SI +B1
hRD
=pr
dµ
RD h
RDB1hRD pd|h
RDB1HSI wt|2
(1 + pdw
tH
SIB1HSI wt)
=pr
dµ
RD h
RDB1hRD pd|h
RDB1HSIwt|2
w
t(I+pdH
SIB1HSI )wt,
(10)
where B=σ2
DI. To this end, the optimization problem (7)
can be re-written as
max
wt=1
pr
σ2
Ddµ
RD hRD2
pr
dµ
RD
pd|h
RDB1HSI wt|2
w
t(I+pdH
SIB1HSI )wt
s.t. hDE wtw
th
DE q, (11)
where q=pr|hRE |2dµ
DE
dµ
RE γthpdσ2
Edµ
DE
pd. If we let
pd|h
RDB1HSI wt|2
w
t(I+pdH
SIB1HSI )wt
=pdw
tH
SIB1hRD h
RDB1HSI wt
and define wt,wt=F1
2wt, where F=(I+pdH
SIB1HSI ),
then (11) can be expressed as
min
wt=1 F1
2w
tH
SIB1hRD h
RDB1HSI F1
2wt
s.t. hDE F1
2wtF1
2w
th
DE q. (12)
The optimization problem (12) does not have a closed-form
solution and also it has not convex form. By defining variable
Wt,wtw
tand relaxing the rank-one constraint of Wt, the
problem (12) can be expressed as the following SDR problem
min
wt=1 trWtF1
2H
SIB1hRD h
RDB1HSI F1
2
s.t. trhDE F1
2WtF1
2h
DE q
trWt= 1,
Wt0.(13)
The problem (13) has standard form and also has only
two inequalities which can be efficiently solved using CVX
software [36]. There is a rank-one optimum solution of Wt
in accordance with Shapiro-Barvinok-Pataki rank reduction
proposition [37], and hence the optimum wtof the original
problem is the eigenvector depending on the non-zero eigen-
value of Wt.
B. Suboptimum Beamforming Design
The optimal design maximizes the received SINR at desti-
nation while guaranteeing that the SINR at the eavesdropper
is smaller than a certain threshold. However, the optimal
design has a high computational and implementation com-
plexity. To further reduce system complexity, here, we present
different suboptimal beamforming designs based on ZF self-
interference suppression, namely TZF and RZF. Moreover, we
consider the MRC/MRT scheme as a benchmark. MRT/MRC
beamformer is suitable for low complexity FD systems as
it does not need to estimate the SI channel [35]. Moreover,
MRT/MRC beamformer is preferred for half-duplex operation,
and hence it is interesting to characterize its performance in
the FD case.
1) TZF Scheme: We assume destination uses several trans-
mitting antennas to completely remove the SI. Moreover,
MRC is used at the destination input, so that the receive
beamformer vector is equal to wr=hRD
hRD. The optimum
transmit beamforming vector wtis obtained by solving the
following optimization problem
max |hDE wt|2
s.t. h
RDHSIwt= 0.(14)
The transmit beamforming vector for the TZF scheme is ob-
tained as wZF
t=Bh
DE
Bh
DE , where B=IH
SIhRD h
RDHSI
h
RDHSI 2[35].
By replacing wrand wZF
tin (4) and (5), the SINR at
destination and eavesdropper are obtained as
γTZF
D= min ps|hSR |2
dµ
SR σ2
R
,prhRD2
dµ
RDσ2
D,(15)
and
γTZF
E=
pr
dµ
RE |hRE |2
pd
dµ
DE |hDE wZF
t|2+σ2
E
,(16)
respectively.
2) RZF Scheme: As an alternative solution, the transmit
beamforming vector can be set using the MRT principle, i.e.,
wt=h
DE
hDE . Moreover, the optimum receive beamforming
vector wris designed with the ZF criterion w
rHSIh
DE = 0.
To ensure the feasibility of the RZF, destination should be
equipped with NR>1antennas. Substituting wtinto (4) the
optimal receive beamforming vector wris the solution of the
following problem:
max |w
rhRD|2
s.t. w
rHSIh
DE = 0.(17)
The receive beamforming vector can be obtained as wZF
r=
DhRD
DhRD, where DIHSI h
DE hDE H
SI
hDE HSI2. By replacing wt
and wZF
rin (4) and (5), the SINR at the destination and
eavesdropper can be expressed as
γRZF
D= min
ps|hSR |2
dµ
SR σ2
R
,pr|wZF
r
hRD|2
dµ
RDσ2
D
,(18)
and
γRZF
E=
pr
dµ
RE |hRE |2
pd
dµ
DE hDE 2+σ2
E
,(19)
respectively.
3) MRC/MRT Scheme: In the MRC/MRT scheme, wrand
wtare obtained as
wMRC
r=hRD
hRD,wMRT
t=h
DE
hDE .(20)
It is worth mentioning that in the absence of SI, TZF and
RZF schemes have the same performance with the MRC/MRT
scheme. But the MRC/MRT scheme does not have the optimal
¯
RTZF
0=1
ln 2
NR1
m=0
1
(2a1)mm!(1)m1e1
a0+1
2a1Ei 1
a01
2a1+
m
k=1
(k1)!(1)mk1
a0
+1
2a1k
+(1)meϱEi (ϱ)
m
k=1
(k1)!(1)mk(ϱ)
k
NT2
k2=0
B
a2
eϱEi (ϱ) +
NT2
k2=0
k2+1
i=1
Ai
a2
(ϱ)i1a2
a3i
Γi1,a2
a3
ϱ,(28)
performance in the presence of SI, and it is suitable for half-
duplex or FD systems with low SI.
By substituting wMRC
rand wMRT
tinto (4) and (5), the SINR
at the destination and eavesdropper nodes are, respectively,
given by
γMRC
D= min
ps|hSR |2
dµ
SR σ2
R
,
pr
dµ
RD hRD2
pd|w
rHSIwt|2+σ2
D
,(21)
and
γMRC
E=
pr
dµ
RE |hRE |2
pd
dµ
DE hDE 2+σ2
E
.(22)
IV. AVE RAG E SEC RE CY RATE ANALYS IS
In this section, we study the secrecy rate performance
which is a fundamental metric to evaluate the security of
wireless communications under active eavesdropping. For a
given channel realization, the instantaneous secrecy rate of
different beamforming designs is given by [2]
Ri
0=Ci
DCi
E+,(23)
where x+= max(x, 0),i∈ {TZF,RZF,MRC},Ci
D=
log2(1 + γi
D), and Ci
E= log2(1 + γi
E). The instantaneous
secrecy rate is different for various channel realizations and
hence to study the security in a long-term basis, average
secrecy rate can be considered as another performance cri-
terion [2] as
¯
Ri
0=E{⌊Ci
DCi
E+}.(24)
The average secrecy rate in (24) can be written as [30]
¯
Ri
o=1
ln 2
0
Fγi
E(x)
1 + x1Fγi
D(x)dx. (25)
Therefore, the remaining key task is to characterize the exact
cdf of the received SINR at the destination and eavesdropper.
In the sequel, we derive the cdfs Fγi
Dand Fγi
Efor the
considered TZF, RZF, and MRC/MRT schemes. Derivation
of the corresponding cdfs of the optimum scheme is difficult.
Therefore, we have resorted to simulations for evaluating the
average secrecy rate of the optimum scheme in Section V.
The following proposition presents the exact expressions for
the cdfs of the γDand γEfor the TZF scheme.
Proposition 1. The cdfs of γDand γEfor the TZF scheme
can be derived as
FγTZF
D(x) = 1 ex
a0
Γ(NR,x
2a1)
Γ(NR),(26)
and
FγTZF
E(x) = 1 ex
a21a3
a2
x
NT2
k2=0 1 + a3
a2
xk21,
(27)
respectively, where a0,ps
dµ
SR σ2
R
,a1,pr
dµ
RDσ2
D
,a2,pr
dµ
RE σ2
E
,
and a3,pd
dµ
DE σ2
E
.
Proof: See Appendix A.
From (26), it is observed that FγTZF
D(x)decreases with the
increase in the number of received antennas. Also, we see that
FγTZF
E(x)increases with the destination power. It is intuitive
because increasing the destination power improves the jam-
ming signal and reduces the received SINR at eavesdropper.
For the average secrecy rate of the TZF scheme, we have
the following key result:
Proposition 2. The average secrecy rate achieved by the
TZF scheme for NR> NT1is given by (28) at the top
of the page where Ai=a2
a3(k2+1i)!
(k2+1i)
∂x(k2+1i)
xm+1
(1+x)|x=a2
a3
,
B= (1)m+1(1 a3
a2)k21, and ϱ=1
a0+1
2a1+1
a2.
Proof: See Appendix B.
Proposition 3. The cdfs of γDand γEfor the RZF scheme
can be expressed as
FγRZF
D(x) = 1 ex
a0
Γ(NR1,x
2a1)
Γ(NR1) ,(29)
and
FγRZF
E(x) = 1 ex
a21a3
a2
x
NT1
k2=0 1 + a3
a2
xk21,
(30)
respectively.
Proof: The proof is similar to Proposition 1 and thus
omitted.
From Proposition 1 and Proposition 3 we observe that
γRZF
Dand γRZF
Ehave the same statistics as γTZF
Dand γTZF
E,
respectively. Therefore, the exact average secrecy rate of the
RZF scheme can be obtained from (28) by replacing (NT2)
and NRwith (NT1) and (NR1), respectively. We omit
the final result for the sake of brevity.
For the MRC/MRT scheme, we have the following key
result:
Proposition 4. The cdfs of γDand γEfor the MRC/MRT
0 5 10 15 20 25 30 35 40
ps = pr = p (dBm)
0
0.5
1
1.5
2
2.5
3
3.5
4
Average Secrecy Rate (bps/HZ)
Simulation, TZF, [NR=3, NT=3]
Simulation, RZF, [NR=3, NT=3]
Simulation ,MRC, [NR=3, NT=3]
Simulation , TZF, [NR=2, NT=3]
Simulation ,RZF, [NR=3, NT=2]
Simulation ,MRC, [NR=3, NT=2]
Simulation, MRC, [NR=2, NT=3]
Simulation ,TZF, [NR=3, NT=2]
Simulation , RZF, [NR=2, NT=3]
Simulation , MRC, [NR=2, NT=2]
Simulation , TZF, [NR=2, NT=2]
Simulation , RZF, [NR=2, NT=2]
Analytical
Fig. 2. Average secrecy rate of different suboptimal beamforming schemes
versus pfor different antenna configurations.
scheme can be expressed as
FγMRC
D(x)=1ex
a0
Γ(NR)
ΓNR,x
a1e1
c2
ΓNR,1
c2+x
a1
1 + a1
c2xNR
,
(31)
and
FγMRC
E(x) = 1 ex
a21a3
a2
x
NT1
k2=0 1 + a3
a2
xk21,
(32)
respectively, where c2,pd
σ2
SI
σ2
D
.
Proof: See Appendix C.
To this end, the average secrecy rate of the MRC/MRT
scheme can be obtained by substituting (31) and (32) into (25).
Remark 1. It is interesting to investigate the secrecy rate
performance of the considered system when the number of
transmitting and receiving antennas is large. Using the law
of large numbers [38], we can represent that when NT
and NR→ ∞, the received SINR at the destination for
TZF, RZF, and MRC/MRT beamforming schemes is given by
γDps|hSR |2
dµ
SR σ2
R
. Also, the received SINR at the eavesdropper
approaches to zero, i.e., γE0. Thus, FγE(x)=1and
FγD(x) = 1 ex
a0. Accordingly, the average secrecy rate
can be written as
¯
Ro=1
ln 2
0
ex
a0
1 + xdx. (33)
With the help of integral identity [32, Eq. (3.354,4)], ¯
Rois
obtained as
¯
Ro=1
ln 2 e1
a0Ei1
a0.(34)
Remark 2. From Propositions 1-4, it is observed that the
average secrecy rate of MRC/MRT scheme depends on the SI
strength, σ2
SI, while ¯
RTZF
oand ¯
RRZF
oare independent of the
σ2
SI.
5 10 15 20 25 30 35 40
pd (dBm)
0
0.5
1
1.5
2
2.5
Average Secrecy Rate (bps/HZ)
Simulation, TZF, [NR=4, NT=2]
Simulation, RZF, [NR=4, NT=2]
Simulation, MRC, [NR=4, NT=2]
Simulation, TZF, [NR=2, NT=4]
Simulation, MRC, [NR=2, NT=4]
Simulation, RZF, [NR=2, NT=4]
Analytical
Fig. 3. Average secrecy rate of different beamforming schemes versus
destination transmit power.
V. NUMERICAL RE SU LTS AND DISCUSSION
In this section, the performance of the proposed secure
cooperative system is evaluated and the accuracy of the
theoretical results is verified. Unless otherwise stated, the noise
variance σ2
D=σ2
E=σ2
R=90 dBm and σ2
SI =60 dBm.
The position of source, destination, relay and eavesdropper are
(0,0),(400m,0),(100m,0), and (120m,50m), respectively.
Moreover, the path-loss coefficient µis set to 3.
In Fig. 2, the average secrecy rate for TZF, RZF, and
MRC/MRT beamforming schemes is plotted versus the trans-
mit power ps=pr=p, where the analytical curves are
based on Propositions 1-4. The solid curves are used to denote
the analytical results, and the markers without line show the
simulation results. As shown, the average secrecy rate for all
schemes increases with increasing power. By comparison, it
can be observed that TZF (NR= 2, NT= 3) and RZF
(NR= 3, NT= 2) have the same performance, which is
in line with the results derived in Section IV. For both TZF
and RZF schemes, average secrecy rate increases by growing
the number of transmit and receive antennas. However, the
effect of increasing the number of receiving antennas is more
prominent.
Fig. 3 depicts the average secrecy rate of TZF, RZF, and
MRC/MRT beamforming schemes versus destination power.
As shown, in the RZF and TZF schemes, the average secrecy
rate improves with increasing the destination power. However,
in the MRC/MRT scheme, the average secrecy rate first
increases and then it remains constant. In other words, the
average secrecy rate for the MRC/MRT scheme shows a
floor at high transmit power. This is intuitive since with high
destination power the SI will be maximal which reduces the
SINR at the destination. As it can be observed from Fig. 2
and Fig. 3, there is a close match between the analytical and
simulation curves which verifies the accuracy of the analytical
results derived in this paper.
In Fig. 4, the average secrecy rate is plotted versus the
eavesdropper location where the y-coordinate of the eaves-
dropper is fixed as 50m and its x-coordinate is within the range
of [150m, 400m]. As expected, as eavesdropper gets closer to
Fig. 4. Average secrecy rate versus x-coordinates of the eavesdropper.
5 10 15 20 25 30 35 40
ps = pr = p (dBm)
0
0.5
1
1.5
2
2.5
3
Average Secrecy Rate (bps/HZ)
Optimum, [ NR=4, NT=2]
TZF, [NR=4, NT=2]
Optimum, [ NR=2, NT=2]
TZF, [NR=2, NT=2]
Fig. 5. Average secrecy rate comparison between the optimum and TZF
beamforming scheme for different antenna numbers at the destination.
the destination, average secrecy rate of all schemes increase. In
addition, when the distance between eavesdropper and relay is
low, MRC/MRT scheme outperforms other schemes. However,
as this distance increases TZF has the best performance.
Fig. 5 compares the average secrecy rate due to optimum
and TZF beamforming schemes. We observe that optimum
scheme outperforms TZF scheme especially for high transmit
power. Further, the secrecy performance gap between optimum
and TZF schemes decreases with increasing the number of
antennas.
In Fig. 6, we examine the effect of SI strength on the average
secrecy rate for the optimum and MRC/MRT schemes. As
expected SI does not affect the optimum scheme, hence its
average secrecy rate remains constant. When the SI strength
is low, MRC/MRT and optimum schemes have the same per-
formance, while as SI strength increases, the average secrecy
rate of the MRC/MRT scheme significantly decreases.
VI. CONCLUSION
We have considered physical-layer security of a cooperative
wireless system with a multi-antenna FD destination which
simultaneously receives information from relay and transmits
a jamming signal to confound the eavesdropper. We designed
-90 -80 -70 -60 -50 -40 -30
2
SI (dBm)
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Average Secrecy Rate(b/s/HZ)
Optimum, [NR=3, NT=4]
MRC, [NR=3, NT=4]
Optimum, [NR=2, NT=4]
MRC, [NR=2, NT=4]
Fig. 6. Average secrecy rate versus σ2
SI for optimum and MRC/MRT
beamforming schemes.
optimum transmit and receive beamformer at the destination
to maximize the SINR at the destination, while guaranteeing
that the SINR at the eavesdropper is below a certain thresh-
old. Moreover, ZF-based beamforming designs have been
proposed to completely cancel the SI, which can balance
the performance and system complexity. We presented exact
closed-form expressions for the average secrecy rate of the
ZF-based beamforming designs. Our results suggest that the
average secrecy rate can be significantly improved via multi-
antenna FD receiver with optimum and ZF-based beamforming
designs. Moreover, when the distance between eavesdropper
and relay is small, MRC/MRT scheme outperforms other ZF-
based beamforming schemes.
APPENDIX A
PROO F OF PROPOSITION 1
By invoking γTZF
Din (15), FγTZF
D(x)can be expressed as
FγTZF
D(x) = Prmin ps|hSR |2
dµ
SR σ2
R
,prhRD2
dµ
RDσ2
D< x.(35)
For the notational convenience, let us denote Z1,|hSR|2,
and Y1,hRD2. Hence, The cdf of γTZF
Din (35) can be
written as
FγTZF
D(x) = Pr (min(a0Z1, a1Y1)< x)
= 1 1PrZ1<x
a01PrY1<x
a1
= 1 1FZ1x
a01FY1x
a1.(36)
We note that Z1is an exponential distributed RV and
Y1is a Chi-square distributed RV with 2NRdegrees-of-
freedom. Therefore, by substituting FZ1(x
a0)=1ex
a0and
FY1(x
a1)=Γ(NR,x
2a1)
Γ(NR)into (36), FγTZF
D(x)can be obtained as
in (26).
Furthermore, by invoking (16), FγTZF
E(x)can be expressed
¯
RT ZF
o=1
ln 2
0
ex
a0
Γ(NR,x
2a1)
Γ(NR)(1 + x)dx
  
I1
1
ln 2
0
ex(1
a0+1
a2)Γ(NR,x
2a1)
Γ(NR)(1 + x)dx
  
I2
+1
ln 2
a3
a2
0xex
a2NT2
k2=0 (1 + a3
a2x)k21
1 + xex
a0
Γ(NR,x
2a1)
Γ(NR)dx
  
I3
.(39)
as
FγTZF
E(x) = Pr(γTZF
E< x)
= 1
x
a2
FY2a2z2x
a3xfZ2(z2)dz2,(37)
where Y2,|hDE wZF
t|2, and Z2,|hRE |2. Note that
Z2is exponentially distributed RV and Y2has Chi-square
distribution with 2(NT1) degrees-of-freedom. Therefore,
by substituting fZ2(z2)=1
σ2
R
ez2
σ2
Rand FY2(a2z2x
a3x)=1
ea2z2x
a32
ENT2
k2=0 (1
k2!)(a2z2x
a32
E
)k2into (37), FγTZF
Ecan be ex-
pressed as
FγTZF
E(x)= 1ex
σ2
Ra2+
NT2
k2=0
1
k2!σ2
R
e
1
a3σ2
Ea2
a3σ2
Exk2
×
x
a2
ez2a2
a32
E
+1
σ2
Rz2x
a2k2
dz2.(38)
To this end, with the help of integral identity [32, Eq.
(3.382,2)], the desired result in (27) is obtained, which com-
pletes the proof.
APPENDIX B
PROO F OF PROPOSITION 2
By substituting FγTZF
D(x)and FγTZF
E(x)into (25), the aver-
age secrecy rate of the TZF can be expressed as (39) at the
top of the page.
For the integral terms in (39) we can obtain closed-
form solutions as follows. Applying the series expansion of
Γ(a, x)[32, Eq. (8.352.4)] we have
I1=1
ln 2
NR1
m=0
1
(2a1)mm!
0
xmex(1
a0+1
2a1)
(1 + x)dx
=1
ln 2
NR1
m=0
1
(2a1)mm!(1)m1e1
a0+1
2a1Ei
1
a01
2a1
+
m
k=1
(k1)!(1)mk1
a0
+1
2a1k,(40)
where we have used the relationship [32, Eq. (3.353.5)].
Similarly, I2can be evaluated as
I2=
NR1
m=0
1
(2a1)mm! ln 2 (1)m1eϱEi (ϱ)
+
m
k=1
(k1)!(1)mkϱk,(41)
where ϱ=1
a0+1
2a1+1
a2. Now, we turn our attention to I3.
By applying the series expansion of Γ(a, x)[32, Eq. (8.352.4)]
and then using partial fractions, we can write
I3=1
ln 2
NR1
m=0
NT2
k2=0
1
a2
1
(2a1)mm!
×
0
eϱxk2+1
i=1
Ai
(1 + a3
a2x)i+B
1 + xdx. (42)
To this end, with the help of the integral identities [32, Eq.
(3.352.4) and Eq. (8.352.4)] we have
I3=1
ln 2
NR1
m=0
NT2
k2=0
1
a2(2a1)mm!k2+1
i=1
Aiϱi1
a2
a3i
×Γi1,ϱ
a3
a2BeϱEi (ϱ).(43)
Finally, substituting (40), (41) and (43) into (39), after some
manipulations, average secrecy rate of the TZF scheme is
derived as (28).
APPENDIX C
PROO F OF PROPOSITION 4
With the help of γMRC
Din (21), FγMRC
D(x)can be written
as
FγMRC
D(x)=Pr
min
ps|hSR |2
dµ
SR σ2
R
,
pr
dµ
RD hRD2
pd|w
rHSIwt|2+σ2
D
< x
.
(44)
For the notation convenience, let us define U,|w
rHSIwt|2.
FγMRC
D(x)can be expressed as
FγMRC
D(x) = Prmin a0Z1,a1Y1
c2U+ 1< x
= 11FZ1x
a01FUa1y1x
c2x,(45)
where Ufollows exponential distribution [39]. Therefore, by
substituting FU(a1y1x
c2x)=1
0(1 ea1y1x
c2x)fY1(y1)dy1
and FZ1(x
a0)=1ex
a0into (45), FγMRC
D(x)can be written as
FγMRC
D(x) = 1 ex
a0
x
a1
yNR1
1ey1
Γ(NR)dy1
+ex
a0e1
c2
x
a1
yNR1
1ey1(1+ a1
c2x)
Γ(NR)dy1.(46)
Now, with the help of integral identity [32, Eq. (3.381.3)],
FγMRC
D(x)can be obtained as (31). Moreover, since γMRC
E=
γRZF
E,FγMRC
E(x)can be readily obtained by using the similar
steps as in Proposition 1.
REF ER EN CE S
[1] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security:
Technical challenges, recent advances, and future trends,” Proc. IEEE,
vol. 104, no. 9, pp. 1727–1765, Sept. 2016.
[2] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A survey on
multiple-antenna techniques for physical layer security,IEEE Commun.
Surveys &Tuts., vol. 19, no. 2, pp. 1027–1053, Secondquarter 2017.
[3] X. Chen, J. Chen, and T. Liu, “Secure transmission in wireless powered
massive MIMO relaying systems: Performance analysis and optimiza-
tion,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8025–8035, Oct.
2016.
[4] Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Y. L. Goff, “Secrecy
rate optimizations for a mimo secrecy channel with a cooperative
jammer,IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833–1847,
May 2015.
[5] X. Gong, H. Yin, F. Dong, H. Li, and H. Long, “Robust beamforming
design for secrecy in multiuser peer-to-peer wireless relay networks,
IEEE Syst. J., vol. PP, no. 99, pp. 1–9, 2017.
[6] X. Tang, Y. Cai, Y. Huang, T. Q. Duong, W. Yang, and W. Yang,
“Secrecy outage analysis of buffer-aided cooperative MIMO relaying
systems,” IEEE Trans. Veh. Technol., vol. PP, no. 99, pp. 1–1, 2017.
[7] J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO
two-way communications with an untrusted relay,IEEE Trans. Signal
Process., vol. 62, no. 9, pp. 2185–2199, May 2014.
[8] X. Chen, C. Zhong, C. Yuen, and H. H. Chen, “Multi-antenna relay
aided wireless physical layer security,IEEE Commun. Mag., vol. 53,
no. 12, pp. 40–46, Dec. 2015.
[9] M. Li, M. Lin, Q. Yu, W. Zhu, and L. Dong, “Optimal beamformer
design for dual-hop MIMO AF relay networks over Rayleigh fading
channels,” IEEE J. Sel. Areas Commun., vol. 30, pp. 1402–1414, Sep.
2012.
[10] H. Guo, Z. Yang, L. Zhang, J. Zhu, and Y. Zou, “Joint cooperative
beamforming and jamming for physical-layer security of decode-and-
forward relay networks,” IEEE Access, vol. 5, pp. 19 620–19 630, Sept.
2017.
[11] C. Jeong, I. M. Kim, and D. I. Kim, “Joint secure beamforming design
at the source and the relay for an amplify-and-forward MIMO untrusted
relay system,” IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310–325,
Jan. 2012.
[12] T. V. Nguyen and H. Shin, “Power allocation and achievable secrecy
rates in MISOME wiretap channels,” IEEE Commun. Lett., vol. 15,
no. 11, pp. 1196–1198, Nov. 2011.
[13] B. Li, Z. Fei, Z. Chu, and Y. Zhang, “Secure transmission for heteroge-
neous cellular networks with wireless information and power transfer,
IEEE Syst. J., vol. PP, no. 99, pp. 1–12, 2017.
[14] J. Huang, C. C. Xing, and C. Wang, “Simultaneous wireless information
and power transfer: Technologies, applications, and research challenges,”
IEEE Commun. Mag, vol. 55, no. 11, pp. 26–32, Nov. 2017.
[15] L. Yang, J. Chen, H. Jiang, S. A. Vorobyov, and H. Zhang, “Optimal
relay selection for secure cooperative communications with an adaptive
eavesdropper,IEEE Trans. Wireless Commun., vol. 16, pp. 26–42, Jan.
2017.
[16] G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving
physical layer secrecy using full-duplex jamming receivers,IEEE Trans
Signal Process, vol. 61, no. 20, pp. 4962–4974, Oct. 2013.
[17] Z. Mobini, M. Mohammadi, and C. Tellambura, “Wireless-powered
full-duplex relay and friendly jamming for secure cooperative commu-
nications,” IEEE Transactions on Information Forensics and Security,
vol. 14, pp. 621–634, Mar. 2019.
[18] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless
physical layer security via cooperating relays,” IEEE Trans. Signal
Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
[19] G. Zheng, L. C. Choo, and K. K. Wong, “Optimal cooperative jamming
to enhance physical layer security using relays,” IEEE Trans. Signal
Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
[20] I. Krikidis, J. S. Thompson, and S. Mclaughlin, “Relay selection
for secure cooperative networks with jamming,IEEE Trans Wireless
Commun, vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
[21] J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure
communications in MIMO relay networks,” IEEE Trans. Signal Process.,
vol. 59, no. 10, pp. 4871–4884, Oct. 2011.
[22] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for
two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh.
Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[23] J. Xiong, L. Cheng, D. Ma, and J. Wei, “Destination-aided cooperative
jamming for dual-hop amplify-and-forward mimo untrusted relay sys-
tems,” IEEE Trans. Veh. Technol., vol. 65, no. 9, pp. 7274–7284, Sept.
2016.
[24] A. Kuhestani, A. Mohammadi, and M. Mohammadi, “Joint relay selec-
tion and power allocation in large-scale MIMO systems with untrusted
relays and passive eavesdroppers,IEEE Trans. Inf. Forensics Security,
vol. 13, no. 2, pp. 341–355, Feb. 2018.
[25] T. Riihonen, S. Werner, and R. Wichman, “Hybrid full-duplex/half-
duplex relaying with transmit power adaptation,IEEE Trans. Wireless
Commun., vol. 10, pp. 3074–3085, Sep. 2011.
[26] T. X. Zheng, H. M. Wang, Q. Yang, and M. H. Lee, “Safeguarding
decentralized wireless networks using full-duplex jamming receivers,
IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 278–292, Jan. 2017.
[27] B. Akgun, O. O. Koyluoglu, and M. Krunz, “Exploiting full-duplex
receivers for achieving secret communications in multiuser MISO net-
works,” IEEE Trans. Commun., vol. 65, no. 2, pp. 956–968, Feb 2017.
[28] W. Tang, S. Feng, Y. Ding, and Y. Liu, “Physical layer security in
heterogeneous networks with jammer selection and full-duplex users,”
IEEE Trans. Wireless Commun., vol. 16, no. 12, pp. 7982–7995, Dec
2017.
[29] Y. Li, R. Zhao, L. Fan, and A. Liu, “Antenna mode switching for full-
duplex destination-based jamming secure transmission,” IEEE Access,
vol. PP, no. 99, pp. 1–1, Jan. 2018.
[30] Z. Mobini, M. Mohammadi, and C. Tellambura, “Security enhance-
ment of wireless networks with wireless-powered full-duplex relay
and friendly jammer nodes,” in Proc. IEEE Intl. Conf. on Commun.
Workshops (ICCW’2017), Paris, France, May 2017, pp. 1329–1334.
[31] T. Guo, B. Wang, W. Wu, and P. Deng, “Secrecy-oriented antenna
assignment optimization at full-duplex receiver with self-interference,
IEEE Wireless Commun. Lett., vol. PP, no. 99, pp. 1–1, 2018.
[32] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and
Products, 7th ed. San Diego, CA: Academic Press, 2007.
[33] H. Xing, K. Wong, Z. Chu, and A. Nallanathan, “To harvest and jam: A
paradigm of self-sustaining friendly jammers for secure AF relaying,”
IEEE Trans. Signal Process., vol. 63, no. 24, pp. 6616–6631, Dec. 2015.
[34] T. Riihonen, S. Werner, and R. Wichman, “Mitigation of loopback self-
interference in full-duplex MIMO relays,” IEEE Trans. Signal Process.,
vol. 59, pp. 5983–5993, Dec. 2011.
[35] M. Mohammadi, B. K. Chalise, H. A. Suraweera, C. Zhong, G. Zheng,
and I. Krikidis, “Throughput analysis and optimization of wireless-
powered multiple antenna full-duplex relay systems,IEEE Trans.
Commun., vol. 64, pp. 1769–1785, Apr. 2016.
[36] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined Convex
Programming [Online]. Available: http://stanford.edu/ boyd/cvx.
[37] B. K. Chalise and L. Vandendorpe, “MIMO relay design for multipoint-
to-multipoint communications with imperfect channel state information,”
IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2785–2796, July 2009.
[38] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral effi-
ciency of very large multiuser MIMO systems,IEEE Trans. Commun.,
vol. 61, no. 4, pp. 1436–1449, Apr. 2013.
[39] M. Mohammadi, H. A. Suraweera, and C. Tellambura, “Uplink/downlink
rate analysis and impact of power allocation for full-duplex cloud-
RANs,” IEEE Trans. Wireless Commun., vol. 17, pp. 5774–5788, Sep.
2018.
... In [5], the authors extended the beamforming design from single-input multi-output (SIMO) transmission to multi-input multi-output (MIMO) transmission. As a step further, in [6], a cooperative transmission scenario with a relay is considered. Furthermore, in [7], the effect of the FD transceiver's in-phase and quadrature imbalance was analysed. ...
... This solution provides a practical and effective way for joint receive beamforming vector and transmit waveform design for BS. • Simulation results show that with the aid of sensing ability, the secrecy performance can be significantly improved compared with the conventional full-duplex receiver [6]. Notations: a, a, A denote complex scalar value, vector, matrix, respectively; C denotes the set of complex numbers; [·] * , [·] T , and [·] H denote the conjugate, transpose and conjugatetranspose operations, respectively. ...
... We assume that the AE in the air is in the line of sight (LOS) of the BS [2], and the user is in the more general non line of sight (NLOS), whose channel model includes the LOS one as a special case. We assume the BS is equipped with half-wavelength spaced uniform linear array (ULA), in which N R antennas are used for reception and N T antennas are used for transmission [6]. The radiation pattern of each antenna element is assumed to be omni-directional. ...
Article
Full-text available
This letter proposes a sensing-assisted uplink communications framework between a single-antenna user and a full-duplex (FD) base station (BS) against an aerial eavesdropper (AE). To protect the information from being overheard, the BS transmits radar signals to localize and jam AE while receiving uplink signals. The radar signal transmission is divided into detection phase and tracking phase. In detection phase, the BS synthesizes a wide beam to localize the AE under the secrecy rate constraint; while in tracking phase, the BS maximizes the signal-to-interference-plus-noise ratio (SINR) of its received signals under the AE’s SINR constraint while guaranteeing a predefined radar echo signal signal-to-noise ratio (SNR) level. To deal with the self interference, we jointly optimize the radar waveform and receive beamforming vector. An alternating optimization algorithm and a successive convex approximation (SCA) based algorithm are proposed to solve the two formulated problems, respectively. Simulation results verify the effectiveness of the proposed algorithms. They also show that the secrecy rate can be significantly improved with the assistance of BS sensing.
... where s k denotes the uplink signal of Alice k, H SI ∈ C NxNy×NxNy denotes the self interference (SI) caused by full-duplex operation, with its elements following independent and identical complex Gaussian distribution, i.e., h SI ∼ CN (0, σ 2 SI ) [13], x is the radar signal transmitted by BS, n b ∼ CN (0, σ b 2 I) represents the additive white Gaussian noise (AWGN) at BS, ξ can be expressed as [14] ...
... For comparision, we consider the estimation method only based on echo signals. We also compare the performance of our scheme with that of two other benchmark schemes, i.e., maximal ratio tansmission (MRT)/maximum ratio combining (MRC) beamformer [13] and successive convex approximation (SCA)-based algorithm [11]. We show the average secrecy capacity and minimum secrecy capacity for K Alices in Fig. 3(b), respectively. ...
Article
Full-text available
In this paper, we propose a secure multi-user uplink communicaion scheme against a mobile aerial eavesdropper (AE) in Integrated Sensing and Communication (ISAC) systems, where the ISAC base station transmits radar signals to track and jam the AE. For tracking mobile AE, we adopt an extended Kalman filter technique to predict AE's motion state. Based on the tracking information we formulate an optimization problem to jointly design radar signal and receiver beamformer for improving the secrecy performance. To deal with the non-convex constraints and the coupled variables, we propose an alternating optimization based algorithm via iteratively solving a Fractional Programming (FP) problem and a Semidefinite Program (SDP) problem. Numerical results show that the proposed algorithm can achieve higher secrecy capacity and better fairness, compared to the state-of-the-art techniques.
... useful signals and increases the eavesdropper's uncertainty. [7] proposes a joint transmit and receive beamformer design that uses the transmit beamforming matrix to reformulate the optimization problem as a semidefinite relaxation problem, maximizing the signal-to-noise ratio at the destination node. A decision tree-based secure relay selection scheme was proposed in [8], which transformed the relay selection problem into a multiclassification problem. ...
Article
Full-text available
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent characteristics of the channel. As a nonsystematic code, Luby transform (LT) code has the characteristics of random coding and rateless, therefore, eavesdroppers cannot directly obtain useful information from leaked code symbols. As a shifted LT (SLT) code, the SLT codes can efficiently recover information, with a smaller decoding overhead. Therefore, we propose an SLT-LT joint code anti-eavesdropping scheme based on random symbol sets. Based on the environment of the main channel, the sender selects a set of random symbols to send to legitimate receivers as known symbols and uses these random symbols and message symbols to form source symbols for the SLT-LT concatenated coding to increase the bit error rate (BER) of the eavesdroppers. The experimental results show that, compared with other anti-eavesdropping LT schemes, our proposed scheme only adds a small amount of decoding overhead but has a better security performance.
Article
Full-text available
Full-duplex (FD) communication is a potential game changer for future wireless networks. It allows for simultaneous transmit and receive operations over the same frequency band, a doubling of the spectral efficiency. FD can also be a catalyst for supercharging other existing/emerging wireless technologies , including cooperative and cognitive communications, cellular networks, multiple-input multiple-output (MIMO), massive MIMO, non-orthogonal multiple access (NOMA), millimeter-wave (mmWave) communications, unmanned aerial vehicle (UAV)-aided communication, backscatter communication (Back-Com), and reconfigurable intelligent surfaces (RISs). These integrated technologies can further improve spectral efficiency, enhance security, reduce latency, and boost the energy efficiency of future wireless networks. A comprehensive survey of such integration has thus far been lacking. This paper fills that need. Specifically, we first discuss the fundamentals, highlighting the FD transceiver structure and the self-interference (SI) cancellation techniques. Next, we discuss the coexistence of FD with the above-mentioned wireless technologies. We also provide case studies for some of the integration scenarios mentioned above and future research directions for each case. We further address the potential research directions, open challenges, and applications for future FD-assisted wireless, including cell-free massive MIMO, mmWave communications, UAV, BackCom, and RISs. Finally, potential applications and developments of other miscellaneous technologies, such as mixed radio-frequency/free-space optical, visible light communication, dual-functional radar-communication, underwater wireless communication, multiuser ultra-reliable low-latency communications, vehicle-to-everything communications, rate splitting multiple access, integrated sensing and communication, and age of information, are also highlighted.
Article
In this article, we raise the concern on secure energy efficiency (SEE) over the wireless-powered untrusted relay networks with nonlinear energy harvesting (EH). To achieve data confidentiality and secrecy performance enhancement concurrently, the untrusted relay can enable simultaneous energy signal reception and confidential information forwarding during the second phase, where no dedicated energy transmission phase or relaying signal splitting is needed for the energy supply. In particular, with the help of destination jamming, the relay can also harvest energy from source signal and jamming signal during the first phase, which is different from conventional relaying protocol that only harvests energy from source and recycled energy. Considering the nonlinear EH efficiency, our objective is to maximize the SEE through piecewise region selection and power allocation. To address this intractable nonconvex problem, a two-layer algorithm based on optimization decoupling, fractional programming, Lagrange dual decomposition and difference of convex functions (DC) programming is proposed. The core idea of the proposed algorithm is to convert the primary problem into simple subproblems by sequentially exploiting the above-mentioned optimization methods. Simulation results reveal the superior secrecy performance of the proposed scheme. The proposed algorithm achieves near-optimal solutions with faster convergence rate.
Article
In this letter, we consider a non-orthogonal multiple access (NOMA) network with a half-duplex (HD) decode-and-forward (DF) relay to improve physical layer security (PLS) of two users. Two legitimate users of U1 and U2 are far from the multi-antenna base station (BS). Thus, a relay with multi-antenna is used to enhance communication and obtain diversity gain. In the first stage, the BS transmits the superimposed signal to the relay via NOMA. Meanwhile, U1 generates the jamming signal to the eavesdropper (Eve). In the second stage, the relay forwards the signal to two users while the BS transmits the jamming signal to disrupt the eavesdropping. It is assumed that the Eve has strong eavesdropping ability. Thus, we need to introduce jamming to guarantee security. Furthermore, we use U1 instead of a full-duplex (FD) relay to send the jamming signal in the first stage to avoid self-interference. To measure the secrecy performance, a closed-form expression of secrecy outage probability (SOP) is derived for the two users. Simulation results are provided to verify the correctness of the proposed scheme.
Article
This article investigates legitimate eavesdropping and secure communication in a multicarrier interference network, where a suspicious link coexists with an unsuspicious link, in the presence of a full-duplex monitor. It is assumed that the unsuspicious users (UUs) are under illegal eavesdropping threat from the suspicious users (SUs), and the monitor can send jamming signals to interfere with the SUs. The UUs are required to cooperate with the monitor for reducing the secrecy outage probability of the UUs to be lower than that without the monitor’s jamming. Under this secrecy outage constraint along with the transmit power constraints, the problem for maximizing the successful eavesdropping probability of the monitor by jointly allocating the transmit powers of the monitor and the UUs is investigated. The problem is solved with the Lagrange duality method by proving the time-sharing property holds, where two algorithms are proposed for obtaining the dual function based on the block coordinate descent method and the successive convex approximation method. Simulation results verify that the proposed algorithms are superior to the noncooperative strategy and the passive eavesdropping strategy, and achieve high successful eavesdropping probability and low secrecy outage probability simultaneously.
Article
Full-text available
We consider a secure overlay cognitive radio network with an eavesdropper wherein a multi-antenna secondary transmitter performs transmission in primary spectrum, on the condition that it helps primary system to perform secure and reliable transmission via cooperative relaying and jamming. To improve secrecy performance of primary network, we propose full-duplex jammer protocol and zero-forcing based beamforming design, which completely cancels the interferences at the primary and secondary users and simultaneously avoids the leakage of confidential information to eavesdropper. Moreover, we present new expressions for the average secrecy rate and a lower bound for the secrecy outage probability. Furthermore, an asymptotic analysis in the high signal-to-noise ratio regime is carried out to obtain closed-form average secrecy rate. Our analytical findings reveal that by exploiting beamforming and full-duplex at the secondary transmitter secrecy outage probability can be significantly reduced and a diversity order of min (N R −1, N T −2) can be achieved where N R and N T are the number of received and transmit antennas at secondary transmitter. Simulation results also demonstrate that as compared to the half-duplex scenario without jamming, the proposed cooperative FD overlay CR scheme with jamming can improve the average secrecy rate up to 224%. Index Terms Average secrecy rate, secrecy outage probability, jamming, full-duplex (FD), beamforming. Z. Mobini is with the Faculty
Article
We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system’s security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.
Article
Full-text available
Wireless energy harvesting, physical-layer security and full-duplex wireless are important, emerging fifth generation (5G) technologies. In this paper, we thus investigate a sourcedestination link with an energy-harvesting full-duplex relay and a jammer (to degrade the eavesdropper channel) in the presence of an eavesdropper. Thus, to exploit energy harvesting and to improve security, we propose a full-duplex jammer (FDJ) protocol and its half-duplex version (HDJ). Two cases for availability of the eavesdropper channel state information (ECSI) are considered: complete ECSI and incomplete ECSI. For both FDJ and HDJ protocols and for complete ECSI, we derive the instantaneous and average secrecy rates and compute optimal time-split for energy harvesting. To gain more insights, we consider a practical interference-limited scenario and derive closed-form cumulative distribution function (cdf) of the SINR (signal-to-interference plus noise ratio) at the destination and eavesdropper nodes. Comparatively, we show that FDJ improves instantaneous secrecy rate over HDJ. However, the degree of improvement is highly dependent on time-split for energy harvesting, amount of selfinterference (SI), the channel gains and locations of the nodes. For incomplete ECSI scenario, we derive asymptotic secrecy outage and show that FDJ performs better for small-to-medium values of source powers; otherwise, HDJ yields a higher gain. Moreover, we derive asymptotic secrecy outage.We show that FDJ increases the average secrecy rate 150% over HDJ and 260% over half-duplex relaying without jammer. In terms of secrecy outage probability, FDJ performs better for the small to medium values of source powers, while HDJ achieves a higher gain at high source power values. IEEE
Article
Full-text available
This paper considers a cloud radio access network (C-RAN) where full-duplex (FD) users communicate with remote radio heads (RRHs) that are spatially distributed. We consider all participate RRH association (ARA) and single nearest RRH association (SRA) policies with optimal, maximum ratio combining/maximal ratio transmission (MRC/MRT) and zeroforcing/MRT (ZF/MRT) processing schemes and derive analytical expressions useful to compare the average UL/DL sum rate among association schemes as a function of the number of RRHs antennas and UL/DL RRH density. We also study a dense network setting with multiple FD users and derive exact expressions for the average UL/DL rates, where a user-centric clustering technique is adopted and each user is served by its nearest UL and DL RRHs. Furthermore, by maximizing the instantaneous sum rate, we develop an optimum power allocation scheme for the single-user case. We observe that ARA results in a rate region that is strongly biased towards the UL or DL, but using SRA results in a more balanced rate region. Moreover, SRA policy with ZF/MRT processing achieves up to 32% and 42% average sum rate gains as compared to the HD SRA and FD ARA counterparts, respectively.
Article
Full-text available
We investigate the secrecy rate optimization problem in a wiretap channel with a single-antenna source, a singleantenna eavesdropper, and a multiple-antenna full-duplex (FD) destination. To fully utilize the spatial degrees of freedom of multiple antennas, the function of antennas at the destination is not predefined, i.e., each antenna can operate in a transmit or receive mode. We propose a low-complexity near-optimal joint optimization scheme by jointly applying the dynamic antenna mode switching (AMS) and optimal power allocation (OPA) techniques, to maximize the secrecy rate of FD destinationbased jamming (DBJ) system. The proposed joint optimization scheme is valid for two different eavesdropping channel state information (ECSI) availability cases, i.e., instantaneous ECSIs and statistical ECSIs. Specifically, closed-form expressions of OPA factors are first derived, and then the optimal transmit and receive antennas sets at the destination are determined by combining the OPA factor and applying a greedy-searchbased AMS approach for both ECSIs availabilities respectively. Moreover, through complexity analysis, the search complexity of the proposed scheme is proven to be significantly reduced compared with the exhaustive searching method. Simulation results verify the secrecy performance superiority of the proposed scheme over the traditional FD-DBJ method.
Article
Full-text available
In this paper, we enhance physical layer security for downlink heterogeneous networks (HetNets) by using friendly jammers and full-duplex users. The jammers are selected to transmit jamming signal if their interfering power on the scheduled users is below a threshold, meanwhile the scheduled users confound the eavesdroppers using artificial noise by full-duplexing. Using the tools of stochastic geometry, we derive the expressions of connection probability and secrecy probability. In particular, the locations of active jammers are modeled by a modified Poisson hole process (PHP). Determining the jammer selection threshold is further investigated for connection probability maximization subject to the security constraints. A greedy algorithm is proposed to efficiently solve this problem. The accuracy of the theoretical analysis and the efficiency of the proposed algorithm are evaluated by numerical simulations.
Article
Full-text available
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate nodes in the presence of an eavesdropper. In the proposed JCBJ scheme, we select the intermediate nodes succeeding in source decoding as the relays to forward the source transmission simultaneously by employing a beamforming weight vector, and meanwhile, use the remaining ones as the friendly jammers to disturb the eavesdropper by sending artificial noise. In order to achieve the secrecy rate maximum, we further study on the power allocation among the source, relays and jammers under two assumptions of the wiretap link’s channel state information (CSI). We derive the closed-form optimal solutions by first allocating the transmit power at the source within different ranges to take into account all the possible relay selection schemes in which different numbers of relays are employed, and then transforming the multivariable power allocation problem to a set of single-variable optimization sub-problems. Our numerical results show the superiority of the proposed JCBJ scheme and the proposed power allocation strategies.
Article
Full-text available
In this paper, we investigate an artificial-noise-aided secure beamforming design for simultaneous wireless information and power transfer in a two-tier downlink heterogeneous cellular network, in which each energy receiver in a femtocell is seen as a potential eavesdropper to wiretap the confidential message intended for the information receiver. Our design objective is to maximize the secrecy rate at the information receiver, while satisfying the signal-to-interference-plus-noise ratio requirement of each macrouser and the energy harvesting and transmit power constraints. Both the scenarios of perfect and imperfect channel state information (CSI) are considered. With perfect CSI, the formulated optimization problem constitutes a difference of a convex function programming problem, which is hard to directly solve. To tackle this challenge, we transform it into a series of semidefinite programs by using successive convex approximation, and an iterative algorithm is proposed to arrive at a provably convergent solution. With imperfect CSI, we address robust secure beamforming relying on the worst-case design philosophy. To circumvent this predicament, we resort to the $\mathcal {S}$ -procedure to reformulate the robust quadratic matrix inequality (QMI) constraints and then obtain the linear matrix inequality representations for these QMIs. Numerical results are finally presented to demonstrate the performance of our proposed schemes in improving the secrecy rate of heterogeneous cellular networks.
Article
This letter investigates a secure MIMO system, in which a full-duplex receiver (Bob) assigns part of his antennas to emit jamming signals to confound the passive eavesdropper (Eve). Unlike previous antenna assignment schemes based on the idealized assumption that the self-interference (SI) can be canceled perfectly, we consider and quantify the contradicting effects of jamming signals acting as SI signals for Bob and confusing signals for Eve, and then formulate the antenna assignment optimization as an integer programming problem. By balancing the contradicting effects, we derive a closed-form solution and further reveal the general design guidelines, i.e., the feasibility and optimality conditions, for the considered system. Numerical results verify our theoretical analysis and demonstrate the superior performance of the proposed scheme.
Article
Energy efficiency will play a crucial role in future communication systems and has become a main design target for all 5G radio access networks. The high operational costs and impossibility of replacing or recharging wireless device batteries in multiple scenarios, such as wireless medical sensors inside the human body, call for a new technology by which wireless devices can harvest energy from the environment via capturing ambient RF signals. SWIPT has emerged as a powerful means to address this issue. In this article, we survey the current architectures and enabling technologies for SWIPT and identify technical challenges to implement SWIPT. Following an overview of enabling technologies for SWIPT and SWIPT-assisted wireless systems, we showcase a novel SWIPT-supported power allocation mechanism for D2D communications to illustrate the importance of the application of SWIPT. As an ending note, we point out some future research directions to encourage and motivate more research efforts on SWIPT.
Article
In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays as potential Eves to improve both the security and reliability of the network. To realize this objective, we consider cooperative jamming performed by the destination while JRP scheme is implemented. With the aim of maximizing the instantaneous secrecy rate, we derive a new closed-form solution for the optimal power allocation and propose a simple relay selection criterion under two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the proposed scheme, a new closed-form expression is derived for the ergodic secrecy rate (ESR) and the secrecy outage probability as security metrics, and a new closed-form expression is presented for the average symbol error rate (SER) as a reliability measure over Rayleigh fading channels. We further explicitly characterize the high signal-to-noise ratio slope and power offset of the ESR to highlight the impacts of system parameters on the ESR. In addition, we examine the diversity order of the proposed scheme to reveal the achievable secrecy performance advantage. Finally, the secrecy and reliability diversity-multiplexing tradeoff of the optimized network are provided. Numerical results highlight that the ESR performance of the proposed JRP scheme for NCE and CE cases is increased with respect to the number of untrustworthy relays.