2019
DOI: 10.1109/tifs.2019.2908481
|View full text |Cite
|
Sign up to set email alerts
|

Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios

Abstract: In this paper, we investigate the physical layer security of a full-duplex base station (BS) aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver (DR) are both equipped with a single antenna, while a powerful eavesdropper is equipped with multiple antennas. For securing the confidentiality of signals transmitted from the BS and UT, an artificial noise (AN) aided secrecy beamforming scheme is proposed, which is robust to the realistic imperfect state information of both the e… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…Wyner's seminal work has inspired significant research efforts, dedicated to ensuring that the quality of the legitimate channel remains better than that of the eavesdropping channel (see [15]- [20] and references therein). This can be achieved for example by using artificial noise [21]- [24], beamforming [25]- [28] and on-off secure transmission [29]. However, keyless secure transmission usually requires complex code design and accurate channel state information (CSI) that may not be available.…”
Section: B Wireless Security 1) a Brief History Of Information Securitymentioning
confidence: 99%
“…Wyner's seminal work has inspired significant research efforts, dedicated to ensuring that the quality of the legitimate channel remains better than that of the eavesdropping channel (see [15]- [20] and references therein). This can be achieved for example by using artificial noise [21]- [24], beamforming [25]- [28] and on-off secure transmission [29]. However, keyless secure transmission usually requires complex code design and accurate channel state information (CSI) that may not be available.…”
Section: B Wireless Security 1) a Brief History Of Information Securitymentioning
confidence: 99%
“…By substituting (11) and (14) into (10), the instantaneous data rate for the transmission of confidential SM messages in the l th hop over the legitimate link, i.e. from Node l − 1 to Node l, is accomplished.…”
Section: A Gaussian-distributed Inputmentioning
confidence: 99%
“…Therefore, robust beamforming optimization (based on the worstcase scenario) in different systems of communications has been widely studied in the past two decades (see e.g. [5], [6], [7], [8], [9], [10], [11], [12], [13], [14]). In the references, an uncertainty set of the actual channel is modeled as a ball or an ellipsoid around the channel estimate at the transmitter, and common robust optimization tools, like traditional S-lemmas [15], are employed to solve the robust beamforming design problems.…”
Section: Introductionmentioning
confidence: 99%