4.7 Article

Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2019.2908481

Keywords

Physical layer security; full-duplex; artificial noise; secrecy beamforming; secrecy rate

Funding

  1. National Natural Science Foundation of China (NSFC) [61801518]
  2. Hubei Provincial Natural Science Foundation of China [2017CFB661]
  3. Engineering and Physical Sciences Research Council [EP/Noo4558/1, EP/PO34284/1]
  4. Project COALESCE by Royal Society's Global Challenges Research Fund Grant
  5. Project COALESCE by European Research Council's Advanced Fellow Grant QuantCom
  6. EPSRC [EP/P003990/1, EP/N004558/1, EP/J015520/1, EP/L010550/1] Funding Source: UKRI

Ask authors/readers for more resources

In this paper, we investigate the physical layer security of a full-duplex base station (BS)-aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver (DR) are equipped with a single antenna, while a powerful eavesdropper is equipped with multiple antennas. For securing the confidentiality of signals transmitted from the BS and UT, an artificial noise (AN)-aided secrecy beamforming scheme is proposed, which is robust to the realistic imperfect state information of both the eavesdropping channel and the residual self-interference channel. Our objective function is that of maximizing the worst-case sum secrecy rate achieved by the BS and UT, through jointly optimizing the beamforming vector of the confidential signals and the transmit covariance matrix of the AN. However, the resulting optimization problem is non-convex and non-linear. In order to efficiently obtain the solution, we transform the non-convex problem into a sequence of convex problems by adopting the block coordinate descent algorithm. We invoke a linear matrix inequality for finding its Karush- Kuhn-Tucker (KKT) solution. In order to evaluate the achievable performance, the worst-case secrecy rate is analytically derived. Furthermore, we construct another secrecy transmission scheme using the projection matrix theory for performance comparison. Our simulation results show that the proposed robust secrecy transmission scheme achieves substantial secrecy performance gains, which verifies the efficiency of the proposed method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available