Can Full-Duplex Jamming Reduce the Energy-Cost of a Secure Bit?

Authors

O. Taghizadeh, P. Neuhaus, R. Mathar,

Abstract

        In this work we study the secrecy energy efficiency (SEE) of a multiple-input-multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel, in terms of the securely communicated bits-per-Joule, where the legitimate receiver is equipped with full-duplex (FD) capability. In particular, we seek answer to the question: if and how the application of an FD jammer can enhance the system SEE, considering the additional power consumption used for jamming and self-interference cancellation, as well as the degrading effect of residual selfinterference. In this regard, an SEE maximization problem is formulated. Due to the intractable problem structure, an iterative solution is provided with a guaranteed convergence to a local optimum. Moreover, the proposed solution is extended for a system with a bidirectional communication, where both legitimate nodes are equipped with FD capability. Numerical simulations indicate a marginal SEE gain, via the utilization of FD jamming, for a wide range of system conditions. However, the observed gain is significant for the scenarios with a small distance between the FD node and the eavesdropper, a high signal-to-noise ratio (SNR) condition or for a bidirectional FD communication setup, under the condition that the self-interference can be effectively and efficiently mitigated

Keywords

Full-duplex, friendly jamming, secrecy capacity, wiretap channel, energy efficiency, MIMO

BibTEX Reference Entry 

@inproceedings{TaNeMa18,
	author = {Omid Taghizadeh and Peter Neuhaus and Rudolf Mathar},
	title = "Can {Full-Duplex} Jamming Reduce the {Energy-Cost} of a Secure Bit?",
	pages = "1--6",
	booktitle = "2018 {IEEE} Wireless Communications and Networking Conference (WCNC)",
	address = {Barcelona, Spain},
	doi = 10.1109/WCNC.2018.8376994,
	month = Apr,
	year = 2018,
	hsb = RWTH-2018-225795,
	}

Downloads

 Download paper  Download bibtex-file

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights there in are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.