Artificial-Noise-Aided Secure Channel with a Full-duplex Source

نویسندگان

  • Xinyue Hu
  • Caihong Kai
  • Shengli Zhang
  • Zhongyi Guo
  • Jun Gao
چکیده

This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidential information. For realizing secure communication between Alan and Bob, a novel two phases communication scheme is proposed: in Phase 1, Alan and Bob send artificial noises (AN) simultaneously, while in Phase 2, Alan superimposes the AN received in Phase 1 with its confidential signal and sends the mixed signal to Bob. Since the mixed AN could degrade the SINR (Signal to Interference and Noise Ratio) of Eve, but does not affect the SINR of Bob, a secrecy capacity can be achieved. We also derive the conditions that the secrecy capacity of the proposed scheme exists, and analyze the secrecy outage probability under Rayleigh fading channel. Numerical results show that the secrecy capacity is about two times higher than without AN, even though in the proposed scheme half of the time is used to transmit ANs, and the outage probability is about five times lower than that without AN.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers

This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clus...

متن کامل

Buffer-Aided Relaying with Adaptive Link Selection - Fixed and Mixed Rate Transmission

We consider a simple network consisting of a source, a half-duplex decode-and-forward relay with a buffer, and a destination. We assume that the direct source-destination link is not available and all links undergo fading. We propose two new buffer-aided relaying schemes with different requirements regarding the availability of channel state information at the transmitter (CSIT). In the first s...

متن کامل

ar X iv : 1 70 9 . 02 34 0 v 1 [ c s . IT ] 7 S ep 2 01 7 Secure Full - Duplex Device - to - Device Communication Muhammad

This paper considers full-duplex (FD) device-todevice (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to ...

متن کامل

Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems

In this paper, we study the resource allocation algorithm design for multiple-input single-output (MISO) multicarrier non-orthogonal multiple access (MC-NOMA) systems, in which a full-duplex base station serves multiple half-duplex uplink and downlink users on the same subcarrier simultaneously. The resource allocation is optimized for maximization of the weighted system throughput while the in...

متن کامل

Data-Aided Secure Massive MIMO Transmission with Active Eavesdropping

In this paper, we study the design of secure communication for time division duplexing multi-cell multi-user massive multiple-input multiple-output (MIMO) systems with active eavesdropping. We assume that the eavesdropper actively attacks the uplink pilot transmission and the uplink data transmission before eavesdropping the downlink data transmission phase of the desired users. We exploit both...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1710.06985  شماره 

صفحات  -

تاریخ انتشار 2017