Secure Robust Resource Allocation using Full-Duplex Receivers ICC - - PowerPoint PPT Presentation

โ–ถ
secure robust resource
SMART_READER_LITE
LIVE PREVIEW

Secure Robust Resource Allocation using Full-Duplex Receivers ICC - - PowerPoint PPT Presentation

Secure Robust Resource Allocation using Full-Duplex Receivers ICC Workshop on WPLS, June 2015, London, UK M. R. Abedi, Modares University, Iran N. Mokari, Modares Univrsity, Iran H. Saeedi, Modars University, Iran H. Yanikomeroglu, Carleton


slide-1
SLIDE 1

Secure Robust Resource Allocation using Full-Duplex Receivers

ICC Workshop on WPLS, June 2015, London, UK

  • M. R. Abedi, Modares University, Iran
  • N. Mokari, Modares Univrsity, Iran
  • H. Saeedi, Modars University, Iran
  • H. Yanikomeroglu, Carleton University, Canada

1

slide-2
SLIDE 2

Motivation

  • PHY security
  • Artificial noise: MIMO / Jamming Relay
  • Robustness against CSI uncertainty
  • FD receivers
  • FD receivers used as jammers: no comparison has been ever made

2

slide-3
SLIDE 3

Full-Duplex Receiver

Sender/Receiver Sender/Receiver

3

slide-4
SLIDE 4

Robustness against CSI Uncertainty

Channel Mismatch:

๐‘“๐’‰๐‘ก๐‘“ = ๐’‰๐‘ก๐‘“ โˆ’ ๐’‰ ๐‘ก๐‘“ ๐‘“๐’‰๐‘˜๐‘“ = ๐’‰๐‘˜๐‘“ โˆ’ ๐’‰ ๐‘˜๐‘“ ๐‘“๐’‰๐‘’๐‘“ = ๐’‰๐‘’๐‘“ โˆ’ ๐’‰ ๐‘’๐‘“ โ„ฐ๐กse = e๐กse: e๐กse

2 โ‰ค ฮต๐กse 2

โ„ฐ๐กje = {e๐กje: e๐กje

2

โ‰ค ฮต๐กje

2

โ„ฐ๐กde = {e๐กde: e๐กde

2 โ‰ค ฮต๐กde 2

4

slide-5
SLIDE 5

Literature on Cooperative Jamming (Perfect CSI)

  • L. Dong, Z. Han, A. P

. Petropulu, and H. V. Poor, โ€œImproving wireless physical layer security via cooperating relays,โ€ IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875โ€“1888, March 2010.

  • G. Zheng, L. C. Choo, and K. K. Wong, โ€œOptimal cooperative jamming to enhance physical

layer security using relays,โ€ IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317โ€“ 1322, March 2011.

  • I. Krikidis, J. S. Thompson, and S. McLaughlin, โ€œRelay selection for secure cooperative

networks with jamming,โ€ IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5003โ€“5011, October 2009. J.Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, โ€œWireless secrecy regions with friendly jamming,โ€ IEEE Transactions on Information Theory, Forensics Security, vol. 6, no. 2, pp. 256โ€“ 266, Januray 2011. 5

slide-6
SLIDE 6

Literature on Cooperative Jamming (Perfect CSI)

  • S. Gerbracht, C. Scheunert, and E. A. Jorswieck, โ€œSecrecy outage in MISO systems with partial

channel information,โ€ IEEE Transactions on Information Theory, Forensics Security, vol. 7, no. 2, pp. 704โ€“716, April 2012.

  • S. Luo, J. Li, and A. Petropulu, โ€œOutage constrained secrecy rate maximization using

cooperative jamming,โ€ Statistical Signal Processing Workshop (SSP), Ann Arbor, MI, USA, August 2012.

  • Z. Ding, M. Peng, and H.-H. Chen, โ€œA general relaying transmission protocol for MIMO

secrecy communications,โ€ IEEE Transactions on Communications, vol. 60, no. 11, pp. 3461โ€“ 3471, November 2012.

  • Y. Liu, J. Li, and A. P

. Petropulu, โ€œDestination assisted cooperative jamming for wireless physical-layer security,โ€ IEEE Transactions on Information Forensics and Security, vol. 8, no. 4,

  • pp. 682โ€“694, April 2013.

6

slide-7
SLIDE 7

Literature on Cooperative Jamming (Imperfect CSI)

  • J. Huang and A. L. Swindlehurst, โ€œRobust secure transmission in MISO channels

based on worst-case optimization,โ€ IEEE Transactions on Signal Processing, vol. 60,

  • no. 4, pp. 1696โ€“1707, April 2012.
  • L. Zhang, Y.-C. Liang, Y. Pei, and R. Zhang, โ€œRobust beamforming design: From

cognitive radio MISO channels to secrecy MISO channels,โ€ in Proc. Global Telecommunications Conference, (GLOBECOM), November 2009, pp. 1โ€“5.

  • B. Yang, W. Wang, B. Yao, and Q. Yin, โ€œDestination assisted secret wireless

communication with cooperative helpers,โ€ IEEE Signal Processing Letters, vol. 20, no. 11, pp. 1030โ€“1033, November 2013.

7

slide-8
SLIDE 8

Literature on FD jamming

  • W. Li, M. Ghogho, B. Chen, and C. Xiong, โ€œSecure communication via

sending artificial noise by the receiver: Outage secrecy capacity/region analysis,โ€ IEEE Communications Letters, vol. 16, no. 10, pp. 1628โ€“1631, October 2012.

  • G. Zheng, I. Krikidis, J. Li, A. P

. Petropulu, and B. Ottersten, โ€œImproving physical layer secrecy using full-duplex jamming receivers,โ€ IEEE Transactions on Signal

8

slide-9
SLIDE 9

The he HD HD Sc Scen enario ario

๐‘ธ๐’”๐’‘๐’„๐’Ž๐’‡๐’ ๐“Ÿ๐‘ฐ๐‘ฌ: max

๐‘น๐‘กโˆˆ๐“ก๐‘ก

min

๐‘“๐’‰๐‘ก๐‘“ โˆˆโ„ฐ๐’‰๐‘ก๐‘“

๐‘†๐‘ก, ๐‘‡. ๐‘ข. ๐‘ข๐‘  ๐‘น๐‘ก โ‰ค ๐‘„

๐‘ก,

๐‘“๐’‰๐‘ก๐‘“

2 โ‰ค โ„ฐ๐’‰๐‘ก๐‘“ 2 ,

๐‘น๐‘ก โ‰ฝ ๐Ÿ.

9

slide-10
SLIDE 10

The he HD HDJ J Sc Scen enario ario

๐‘ธ๐’”๐’‘๐’„๐’Ž๐’‡๐’ ๐“Ÿ๐‘ฐ๐‘ฌ๐‘ฒ: max

๐‘น๐‘กโˆˆ๐“ก๐‘ก,๐‘น๐‘˜โˆˆ๐“ก๐‘˜

min

๐‘“๐’‰๐‘ก๐‘“ โˆˆโ„ฐ๐’‰๐‘ก๐‘“ ,๐‘“๐’‰๐‘˜๐‘“ โˆˆโ„ฐ๐’‰๐‘˜๐‘“

๐‘†๐‘ก, ๐‘‡. ๐‘ข. ๐‘ข๐‘  ๐‘น๐‘ก โ‰ค ๐‘„

๐‘ก,

๐‘“๐’‰๐‘ก๐‘“

2 โ‰ค โ„ฐ๐’‰๐‘ก๐‘“ 2 ,

๐‘น๐‘ก โ‰ฝ ๐Ÿ, ๐‘ข๐‘  ๐‘น๐‘˜ โ‰ค ๐‘„

๐‘˜,

๐‘“๐’‰๐‘˜๐‘“

2

โ‰ค โ„ฐ๐’‰๐‘˜๐‘“

2 ,

๐‘น๐‘˜ โ‰ฝ ๐Ÿ.

10

slide-11
SLIDE 11

The he FD Sc D Scen enario ario

๐‘ธ๐’”๐’‘๐’„๐’Ž๐’‡๐’ ๐“Ÿ๐‘ฎ๐‘ฌ: max

๐‘น๐‘กโˆˆ๐“ก๐‘ก,๐‘น๐‘’โˆˆ๐“ก๐‘’

min

๐‘“๐’‰๐‘ก๐‘“ โˆˆโ„ฐ๐’‰๐‘ก๐‘“ ,๐‘“๐’‰๐‘’๐‘“ โˆˆโ„ฐ๐’‰๐‘’๐‘“

๐‘†๐‘ก, ๐‘‡. ๐‘ข. ๐‘ข๐‘  ๐‘น๐‘ก โ‰ค ๐‘„

๐‘ก,

๐‘“๐’‰๐‘ก๐‘“

2 โ‰ค โ„ฐ๐’‰๐‘ก๐‘“ 2 ,

๐‘น๐‘ก โ‰ฝ ๐Ÿ, ๐‘ข๐‘ (๐‘น๐‘’) โ‰ค ๐‘„๐‘’, ๐‘“๐’‰๐‘’๐‘“

2 โ‰ค โ„ฐ๐’‰๐‘’๐‘“ 2

, ๐‘น๐‘’ โ‰ฝ ๐Ÿ,

11

slide-12
SLIDE 12

Simulation Setup

Parameter Value ๐‘‚๐‘ก = ๐‘‚๐‘’ = ๐‘‚

๐‘˜

4 ๐œ๐‘’

2 = ๐œ๐‘“ 2

0 ๐‘’๐ถ

โ„ฐ

๐’‰๐‘ก๐‘“ 2 = โ„ฐ ๐’‰๐‘’๐‘“ 2

= โ„ฐ

๐’‰๐‘˜๐‘“ 2

0.5

12

slide-13
SLIDE 13

Simulation Results: Effect of Source-Eavesdropper Distance on the

performance

13

slide-14
SLIDE 14

Simulation Results: Effect of Source-Jammer Distance on the performance

Eavesdropper location is fixed at (30,0)

14

slide-15
SLIDE 15

Simulation Results: Effect of Source-Jammer Distance on the performance

Eavesdropper location is fixed at (70,0)

15

slide-16
SLIDE 16

Conclusion

๏ฑ Preference of deploying the FD scenario over CJ, or vice versa, highly depends on where the jammer and eavesdropper are located. ๏ฑ If the jammer can be placed close enough to the eavesdropper, a better performance is achieved compared to the FD system. ๏ฑ Otherwise, the FD scenario can generally take over which is very favorable from practical point of view as we can remove the need for an extra network node.

16