Hybrid Transmit Antenna Selection and Full-duplex Artificial-noise-added Receiver Scheme for Physical Layer Security Enhancement
Zhang Ya-jun① Liang Tao② Liu Yong-xiang② Sun Ai-wei①
①(Institute of Communications Engineering, PLA University of Science and Technology, Nanjing 210007, China) ②(Nanjing Telecommunication Technology Institute, Nanjing 210007, China)
With the fast development of full-duplex technology in the same band, a novel hybrid scheme called Transmit Antenna Selection-receivever Artifical Noise (TAS-rAN), is proposed for lower complexity of beam- forming scheme and higher security of TAS in MISO wiretap channels. In this scheme, by using TAS protocol, the transmitter first selects a single antenna that maximizes the instantaneous Signal-to-Noise Ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver sends Artificial Noise (AN) to confuse the potential eavesdropper. For the proposed protocol, Nakagami-m fading channels with different parameters for the main channel and the eavesdropper,s channel is considered, and a new closed-form expression for the exact secrecy outage probability is derived. The numerical simulation results demonstrate that the proposed TAS-rAN protocol is a robust secure system, and can offer higher secure performances than both existed single TAS-single and TAS-Alamouti schemes.
Shiu Y S, Chang S Y, Wu H C, et al.. Physical layer security in wireless networks: A tutorial[J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
[2]
Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
[3]
Mukherjee A, Fakoorian S A, Huang J, et al.. Principles of physical layer security in multiuser wireless networks: a survey[J]. IEEE Communications Surveys & Tutorials, 2014, 16(3): 1550-1573.
[4]
Oggier F and Hassibi B. The secrecy capacity of the MIMO wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(8): 4961-4972.
[5]
Hong Y W P, Lan P-C, and Kuo C C J. Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches[J]. IEEE Signal Processing Magazine, 2013, 30(5): 29-40.
[6]
Yang N, Elkashlan M, Yeoh P L, et al.. An introduction to transmit antenna selection in MIMO wiretap channels[J]. ZTE Communications, 2013, 11(3): 26-32.
[7]
Goel S and Negi R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.
[8]
Alves H, Souza R D, and Debbah M. Enhanced physical layer security through transmit antenna selection[C]. Proceedings of the IEEE GlobeCOM Workshops, Houston, TX, USA, 2011: 879-883.
[9]
Alves H, Souza R D, Debbah M, et al.. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012, 19(6): 372-375.
[10]
Yang N, Yeoh P L, Elkashlan M, et al.. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transactions on Communications, 2013, 61(1): 144-154.
[11]
Yang N, Suraweera H A, Collings I B, et al.. Physical layer security of TAS/MRC with antenna correlation[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 254-259.
[12]
Yeoh P L, Elkashlan M, Yang N, et al.. Unified analysis of transmit antenna selection in MIMO multirelay networks[J]. IEEE Transactions on Vehicular Technology, 2013, 62(2): 933-939.
[13]
Yang N, Yeoh P L, Elkashlan M, et al.. MIMO wiretap channels: secure transmission using transmit antenna selection and receive generalized selection combining[J]. IEEE Communications Letters, 2013, 17(9): 1754-1757.
[14]
Yan S, Yang N, Malaney R, et al.. Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2014, 13(3): 1656-1667.
[15]
Liang T, Zhang Y J, Yuan G B, et al.. Joint transmit antenna selection and artificial noise for security in MIMO wiretap channels[C]. Applied Mechanicas and Materials, 2014, Vols. 541-542: 1452-1457.
[16]
Bharadia D, McMilin E, and Katti S. Full duplex radios[C]. Preceedings of the ACM SigCom, Hong Kong, China, 2013: 1-12.
[17]
Li W, Ghogho M, Chen B, et al.. Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis[J]. IEEE Communications Letters, 2012, 16(10): 1628-1631.
[18]
Zheng G, Krikidis I, Li J, et al.. Improving physical layer secrecy using full-duplex jamming receivers[J]. IEEE Transactions on Signal Processing, 2013, 61(20): 4962-4974.
[19]
Zhou X, McKay M, Maham B, et al.. Rethinking the secrecy outage formulation: a secure transmission design perspective [J]. IEEE Communications Letters, 2011, 15(3): 302-304.
[20]
Gradshteyn I S and Ryzhik I M. Table of Integrals, Series, and Products[M]. San Diego, CA, USA, Elsevier, Inc., 2007: 25, 337, 340-341.