Artificial-noise-aided secure communication with full-duplex active eavesdropper

Author(s):  
Zunning Liu ◽  
Na Li ◽  
Xiaofeng Tao ◽  
Si Li ◽  
Jin Xu ◽  
...  
2021 ◽  
Vol 26 (6) ◽  
pp. 507-512
Author(s):  
Wenjian LU ◽  
Sanjun LIU ◽  
Guohong LAI

This paper presents a design scheme of wire-line telephone system using self-interference (SI) cancellation technology in co-frequency co-time full-duplex (CCFD) system to realize absolute secure communication at the physical layer. This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node, and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain, so that the signal-to-noise ratio (SNR) received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver, so as to realize the absolutely secure communication in the sense of Wyner principle. This paper not only puts forward the specific design scheme of absolutely secure communication telephone, but also analyzes the calculation of security capacity under different eavesdropping positions, different SI cancellation capability and different system parameters according to Shannon theory.


2017 ◽  
Vol 65 (14) ◽  
pp. 3846-3861 ◽  
Author(s):  
Lei Chen ◽  
Qiping Zhu ◽  
Weixiao Meng ◽  
Yingbo Hua

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Quanzhong Li ◽  
Sai Zhao

By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary transmitter under the quality-of-service at the primary user and the transmit power constraint at the secondary transmitter. We consider the practical case that the channel state information (CSI) of the eavesdropper is imperfect, and we model the imperfect CSI by the worst-case model. We show that the robust secrecy rate maximization problem can be transformed to a series of semidefinite programmings based on S-procedure and rank-one relaxation. We also propose an effective method to recover the optimal rank-one solution. Simulations are provided to show the effectiveness of our proposed robust secure algorithm with comparison to the nonrobust secure design and traditional orthogonal multiple access schemes.


2020 ◽  
Vol 12 (10) ◽  
pp. 175
Author(s):  
Xin Song ◽  
Lin Xia ◽  
Siyang Xu ◽  
Yue Wang

In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Tao Hong ◽  
Geng-xin Zhang

The research of improving the secrecy capacity (SC) of wireless communication system using artificial noise (AN) is one of the classic models in the field of physical layer security communication. In this paper, we consider the peak-to-average power ratio (PAPR) problem in this AN-aided model. A power allocation algorithm for AN subspaces is proposed to solve the nonconvex optimization problem of PAPR. This algorithm utilizes a series of convex optimization problems to relax the nonconvex optimization problem in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation. Furthermore, we also derive the SC of the proposed signal under the condition of the AN-aided model with a finite alphabet and the nonlinear high-power amplifiers (HPAs). Simulation results show that the proposed algorithm reduces the PAPR value of transmit signal to improve the efficiency of HPA compared with benchmark AN-aided secure communication signals in the multiple-input single-output (MISO) model.


2019 ◽  
Vol 8 (2) ◽  
pp. 480-483 ◽  
Author(s):  
Xinyue Hu ◽  
Caihong Kai ◽  
Shengli Zhang ◽  
Zhongyi Guo ◽  
Jun Gao

2018 ◽  
Vol 36 (7) ◽  
pp. 1426-1440 ◽  
Author(s):  
Beixiong Zheng ◽  
Miaowen Wen ◽  
Cheng-Xiang Wang ◽  
Xiaodong Wang ◽  
Fangjiong Chen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document