z-logo
open-access-imgOpen Access
Improving physical layer security jointly using full‐duplex jamming receiver and multi‐antenna jammer in wireless networks
Author(s) -
Ma Rui,
Yang Shizhong,
Du Min,
Wu Haowei,
Ou Jinglan
Publication year - 2019
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2018.5502
Subject(s) - jamming , physical layer , artificial noise , computer science , secrecy , beamforming , transmitter , secure transmission , computer network , channel state information , channel (broadcasting) , antenna (radio) , wireless , duplex (building) , transmitter power output , transmission (telecommunications) , telecommunications , computer security , dna , physics , genetics , biology , thermodynamics
The issues of the physical layer security are studied, where one transmitter (Alice), one full‐duplex (FD) legitimate receiver (Bob) and one multi‐antenna jammer (Charlie) are considered to defend against multiple passive and non‐colluding eavesdroppers (Eves), for multiple‐input multiple‐output wiretap channels. With the assumption that the complete channel state information (CSI) for main channels and the statistical CSI for Eves' channels are available, an improved secrecy transmission design is proposed to minimise the secrecy outage probability (SOP), under the minimum secrecy rate requirement. In addition to integrating artificial noise aided transmit beamforming and multi‐antenna cooperative jammer to impair Eves' channels, which is widely used in many existing works, a FD legitimate receiver is applied together to further enhance physical layer security. Based on the basic probability theory and convex optimisation, the accurate closed‐form expression of the SOP is derived, and the impacts on secrecy performance are described, including the qualities of main channels, the Alice's transmit power and the number of Eves. Numerical results show that the proposed scheme using the FD Bob can significantly enhance the system security, as compared with that employing the half‐duplex Bob.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here