scholarly journals Beamforming Design and Covert Performance Analysis for Full-Duplex Multiantenna System

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ling Yang ◽  
Weiwei Yang ◽  
Liang Tang ◽  
Jia Tu ◽  
Xingbo Lu ◽  
...  

In this work, a wireless covert communication system with full-duplex (FD) multiantenna receiver is considered. In order to improve the convert performance of the wireless communication system in the FD mode, a scheme based on selection combining/zero forcing beamforming (SC/ZFB) is proposed. More specifically, a covert message receiver with a FD multiantenna uses the zero forcing beamforming method to transmit randomly varying noise power to the adversary while receiving covert information from the sender. Firstly, we derive the optimal detection threshold and the corresponding closed expression of the minimum detection error rate of the warden. Secondly, the transmission interruption probability is explored to measure the communication reliability between the sender and the receiver of the covert message. Finally, the throughput performance of the covert communication system is analyzed under random geometry. Our analysis shows that the proposed SC/ZFB scheme can achieve the positive effective convert rate while interfering with the detection of the warden as much as possible. It is worth noting that the increase of the number of antennas and the power of covert message transmission can improve the convert performance of the system.

Author(s):  
Ling Yang ◽  
Weiwei Yang ◽  
Jia Tu ◽  
Xingbo Lu ◽  
Liang Tang ◽  
...  

In this paper, we consider a covert communication system with a multi-antenna full-duplex (FD) receiver to enhance covert performance. More precisely, the receiver Bob (i.e., multiple antennas) selects the best antenna to receive the covert message, and then it sends artificial noise (AN) to the warden Willie causing uncertainty by utilizing an antenna among the remaining antennas. In order to take full advantage of multi-antenna technology, we consider two cases: (1) Willie does not know which antenna Bob chooses to send AN, and Willie knows only part of the channel information. (2) Willie knows which antenna Bob chooses to send AN, and Willie knows all the channel information. Based on the analysis of the optimal detection threshold, we derive the minimum detection error probability of the two cases. Furthermore, given the pre-determined convert constraints, the closed-form expression of the maximum effective convert rate is derived. When the power of AN sent by Bob is greater than that of covert message sent by the sender Alice, surprised research results are shown: (1) the detection error rate of case 1 is higher than that of case 2. (2) the effective covert rate of case 1 is always lower than that of case 2. The simulation results show that the proposed scheme is more conducive to sending covert messages for Alice; in addition, the numerical results imply that the maximum effective covert rate of the system using the multi-antenna FD receiver is significantly higher than that of the traditional dual-antenna FD receiver system.


2020 ◽  
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Hao Wu ◽  
Xiaoqiang Qiao ◽  
Liwei Tao

Abstract In this paper, we investigate the effects of the outdated channel state information (CSI) on the secrecy performance of an underlay spectrum sharing cognitive radio networks (CRNs) with full-duplex (FD) receivers. Legitimate destination node (Bob) acts as a FD node, transmitting interference signals to a passive eavesdropping node (Eve) while receiving signals. To exploit the benefits of collaborative zero-forcing beamforming and FD technologies, transmit antenna selection-maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (TAS-MRC-ZFB/MRT-SC-ZFB) scheme is considered at the secondary user transmission link with the outdated CSI and collaborative ZFB is adopted at FD destination node, which tries to improve the transmission efficiency of our considered CRNs. Specifically, in order to evaluate the proposed scheme, the derivation of analytical expression in exact and the high asymptotic closed-form expressions of secrecy outage probability (SOP) are provided of the considered network with and without feedback delay of the CSI. Furthermore, the impact of delay on the second user transmission and interference links of the primary user (PU) node is investigated. The results reveal that outdated CSI of secondary user transmission and collaborative ZFB channels deteriorates the SOP, and the outdated CSI between PU and SU will affect the power margin factors for the secondary transmitter. Furthermore, we also study the effects of different system parameters on the secrecy diversity order and secrecy array gain. The proposed scheme is compared with the existing TAS-MRC/TAS-MRC scheme to verify the improvement of system performance. Finally, Monte Carlo simulations verify the correctness of our theoretical analysis.


2020 ◽  
Vol 10 (5) ◽  
pp. 1840 ◽  
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Yueming Cai ◽  
Weiwei Yang ◽  
Hao Wu ◽  
...  

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.


Complexity ◽  
2022 ◽  
Vol 2022 ◽  
pp. 1-24
Author(s):  
Ling Yang ◽  
Weiwei Yang ◽  
Liang Tang ◽  
Liwei Tao ◽  
Xingbo Lu ◽  
...  

In this work, we investigated a covert communication method in wireless networks, which is realized by multiantenna full-duplex single relay. In the first stage, the source node sends covert messages to the relay, and the relay uses a single antenna to send interference signals to the adversary node to protect the covert information being transmitted. In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. The detection error rate, transmission outage probability, maximum effective covert rate, and other performance indicators are derived in two stages, and the total performance of the system is derived and analyzed. Then, the performance indicators are verified and analyzed by simulation. Our analysis shows that the maximum effective covert rate of using the characteristics of multiantenna to interfere with Willie in the second stage is taken as the total covert performance of the system, and the transmission interruption probability is significantly less than that of the first stage, so the corresponding maximum effective concealment efficiency will be greater.


Sign in / Sign up

Export Citation Format

Share Document