Browse > Article
http://dx.doi.org/10.4218/etrij.2018-0688

Information leakage in bi-directional IFD communication system with simultaneously transmitted jamming sequence  

Ju, Hyungsik (Hyper-connected Communication Research Laboratory, Electronics and Telecommunications Research Institute)
Gwak, Donghyuk (Hyper-connected Communication Research Laboratory, Electronics and Telecommunications Research Institute)
Kim, Tae-Joong (Hyper-connected Communication Research Laboratory, Electronics and Telecommunications Research Institute)
Publication Information
ETRI Journal / v.42, no.1, 2020 , pp. 138-149 More about this Journal
Abstract
In this paper, we describe a simultaneously transmitted jamming (ST-jamming) for bi-directional in-band full-duplex (IFD) system to improve information security at the physical layer. By exploiting ST-jamming, each legitimate user transmits data samples and jamming samples together in one orthogonal frequency division multiplexing symbol according to given traffic asymmetry. Regardless of the traffic difference in both directions in IFD communication, eavesdropping of confidential information is prevented in both directions simultaneously without the loss of data rate. We first propose an encoding scheme and the corresponding decoding scheme for ST-jamming to be used by the legitimate users. In addition, we study a transceiver structure of the legitimate users including a baseband modem uniquely designed for the use of ST-jamming. The leakage of confidential information at an eavesdropper is then quantified by studying the mutual information between the confidential transmit signals and the received signals of the eavesdropper. Simulation results show that the proposed ST-jamming significantly reduces the leakage of legitimate information at the eavesdropper.
Keywords
in-band full-duplex; jamming; mutual information; physical layer security; traffic asymmetry;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 D. Wulich et al., Level clipped high-order OFDM, IEEE Trans. Commun. 48 (2000), no. 6, 928-930.   DOI
2 H. Ju et al., Novel digital cancelation method in presence of harmonic self-interference, ETRI J. 39 (2017), no. 2, 245-254.   DOI
3 D. Bharadia et al., Full duplex radios, in Proc. ACM SIGCOMM, Hong Kong, China, Aug. 2013. pp. 375-386.
4 K.E. Kolodziej, J.G. McMichael, and B.T. Perry, Multitap RF canceller for in-band full-duplex wireless communications, IEEE Trans. Wireless Commun. 15 (2016), no. 6, 4321-4334.   DOI
5 M. Sakai et al., Self-interference cancellation in full-duplex wireless with IQ imbalance, Phy. Commun. 18 (2016), no. 1, 2-14.   DOI
6 H. Ju et al., Capacity enhancement of uni-directional in-band full-duplex cellular networks through co-channel interference cancellation, ETRI J. 40 (2018), no. 2, 207-217.   DOI
7 L. Zhang et al., 3-D drone-base-station placement with in-band full-duplex communications, IEEE Commun. Lett. 22 (2018), no. 9, 1902-1905.   DOI
8 L. Chen et al., Fast power allocation for secure communication with full-duplex radio, IEEE Trans. Signal Process. 65 (2015), no. 14, 3846-3861.   DOI
9 C. Liu et al., Secure spatial modulation with a full-duplex receiver, IEEE Wireless Commun. Lett. 6 (2017), no. 6, 838-841.   DOI
10 T. Guo et al., Secrecy-oriented antenna assignment optimization at full-duplex receiver with self-interference, IEEE Wireless Commun. Lett. 7 (2018), no. 4, 562-565.   DOI
11 L. Li et al., Linear precoder design for an MIMO Gaussian wiretap channel with full-duplex source and destination nodes, IEEE Trans. Inform. Forensics and Security 13 (2018), no. 2, 421-436.   DOI
12 X. Tang, P. Ren, and Z. Han, Iterative power optimization towards secure multi-channel full-duplex communication, in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, USA, Dec. 2016, pp. 1-6.
13 Q. Li et al., Full-duplex bidirectional secure communications under perfect and distributionally ambiguous eavesdropper's CSI, IEEE Trans. Signal Process. 65 (2017), no. 17, 4684-4697.   DOI
14 N. Mahmood and P. Mogensen, On the secrecy degrees of freedom with full-duplex communication, in Proc. IEEE Int. Commun. Conf. (ICC) Workshops, Paris, France, May 2017, pp. 1310-1315.
15 M.K. Hanawal, D.N. Nguyen, and M. Krunz, Jamming attack on in-band full-duplex communications: Detection and countermeasures, in Proc. IEEE INFOCOM, San Francisco, CA, USA, Apr. 2016, pp. 1-9.
16 W. Tang et al., Physical layer security in heterogeneous networks with jammer selection and full-duplex users, IEEE Trans. Wireless Commun. 16 (2017), no. 12, 7982-7995.   DOI
17 T.-X. Zheng et al., Physical layer security in wireless ad hoc networks under a hybrid full-/half-duplex receiver deployment strategy, IEEE Trans. Wireless Commun. 16 (2017), no. 6, 3827-3839.   DOI
18 T.-X. Zheng et al., Safeguarding decentralized wireless networks using full-duplex jamming receivers, IEEE Trans. Wireless Commun. 16 (2017), no. 1, 278-292.   DOI
19 A. Babaei et al., Full-duplex small-cell networks: a physical-layer security perspective, IEEE Trans. Commun. 66 (2018), no. 7, 3006-3021.   DOI
20 M. R. Abedi et al., Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: active adversary, IEEE Trans. Wireless Commun. 16 (2017), no. 2, 885-899.   DOI
21 Report ITU-R, IMT Traffic Estimates for the Years of 2020 to 2030, Radiocommunication Sector of ITU (2015), M.2370, 1-49.
22 J. Liu et al., Performance gain of full duplex over half duplex under bidirectional traffic asymmetry, in Proc. IEEE Int. Commun. Conf. (ICC) Workshop, Kuala Lumpur, Malaysia, May 2016, pp. 90-103.
23 H. Malik et al., Cross-layer approach for asymmetric traffic accommodation in full-duplex wireless networks, in Proc. IEEE Eur. Conf. Netw. Commun. (EuCNC), Oulu, Finland, June 2015, pp. 265-269.
24 Y. Sun et al., Optimal joint power and subcarrier allocation for full-duplex multicarrier non-orthogonal multiple access systems, IEEE Trans. Commun. 65 (2017), no. 3, 1077-1091.   DOI