Abstract
In this paper, we consider the problem of multiple active and full-duplex (FD) attackers in physical-layer security of wireless communications. The attackers can eavesdrop the legitimate signal from a transmitter to a receiver and jam it at the same time with a high power. The channel realizations, pilot signals, and jamming signals of the attackers are not known at the legitimate nodes. This gives a difficulty because there are not enough degrees of freedom in the received signal space. However, we propose a novel scheme to opportunistically remove the jamming signals out of the received signals to reliably decode the legitimate signal. The numerical results show that there is a significant improvement in the secrecy rate (SR) compared to the conventional scheme. Especially, the higher the transmit power of the attackers, the better the performance of the proposed scheme.
Similar content being viewed by others
Notes
A more general coherence time can be assumed by considering two cases of its length but is out of scope of this paper.
We do not need to know the channel realizations between the jammers and A and B in order to get this ergodic rate; instead, we need to know their distribution and the channel realizations between A and B, which are presupposed in section System Model.
We will use a different simulation later to show that the higher the transmit power of the attackers, the better the performance of the proposed scheme.
References
Mukherjee, A., Fakoorian, S., Huang, J., & Swindlehurst, A. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 1–24. https://doi.org/10.1109/SURV.2014.012314.00178.
Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K., & Gao, X. (2018). A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679–695. https://doi.org/10.1109/JSAC.2018.2825560.
Lv, T., Gao, H., & Yang, S. (2015). Secrecy transmit beamforming for heterogeneous networks. IEEE Journal on Selected Areas in Communications, 33(6), 1154–1170. https://doi.org/10.1109/JSAC.2015.2416984.
Thai, C. D. T., Lee, J., & Quek, T. Q. S. (2016). Physical-layer secret key generation with colluding untrusted relays. IEEE Transactions on Wireless Communications, 15(2), 1517–1530. https://doi.org/10.1109/TWC.2015.2491935.
Li, L., Petropulu, A. P., & Chen, Z. (2017). MIMO secret communications against an active eavesdropper. IEEE Transactions on Information Forensics and Security, 12(10), 2387–2401. https://doi.org/10.1109/TIFS.2017.2705618.
Huang, K.-W., Wang, H.-M., Wu, Y., & Schober, R. (2018). Pilot spoofing attack by multiple eavesdroppers. IEEE Transactions on Wireless Communications, 17(10), 6433–6447. https://doi.org/10.1109/TWC.2018.2859949.
Lichtman, M., Jover, R. P., Labib, M., Rao, R., Marojevic, V., & Reed, J. H. (2016). Lte/lte-a jamming, spoofing, and sniffing: Threat assessment and mitigation. IEEE Communications Magazine, 54(4), 54–61. https://doi.org/10.1109/MCOM.2016.7452266.
Lv, T., Yin, Y., Lu, Y., Yang, S., Liu, E., & Clapworthy, G. (2018). Physical detection of misbehavior in relay systems with unreliable channel state information. IEEE Journal on Selected Areas in Communications, 36(7), 1517–1530. https://doi.org/10.1109/JSAC.2018.2824728.
Wu, Y., Schober, R., Ng, D. W. K., Xiao, C., & Caire, G. (2016). Secure massive MIMO transmission with an active eavesdropper. IEEE Transactions on Information Theory, 62(7), 3880–3900. https://doi.org/10.1109/TIT.2016.2569118.
Hoang, T. M., Duong, T. Q., Tuan, H. D., Lambotharan, S., & Hanzo, L. (2021). Physical layer security: Detection of active eavesdropping attacks by support vector machines. IEEE Access, 9, 31595–31607. https://doi.org/10.1109/ACCESS.2021.3059648.
Karlsson, M., Björnson, E., & Larsson, E. G. (2017). Jamming a TDD point-to-point link using reciprocity-based MIMO. IEEE Transactions on Information Forensics and Security, 12(12), 2957–2970. https://doi.org/10.1109/TIFS.2017.2725823.
Xiao, L., Lu, X., Xu, D., Tang, Y., Wang, L., & Zhuang, W. (2018). UAV relay in VANETs against smart jamming with reinforcement learning. The IEEE Transactions on Vehicular Technology, 67(5), 4087–4097. https://doi.org/10.1109/TVT.2018.2789466.
Pu, C. (2018). Jamming-resilient multipath routing protocol for flying Ad Hoc networks. IEEE Access, 6, 68472–68486. https://doi.org/10.1109/ACCESS.2018.2879758.
Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission Stackelberg game with observation errors. IEEE Communications Letters, 19(6), 949–952. https://doi.org/10.1109/LCOMM.2015.2418776.
Yan, Q., Zeng, H., Jiang, T., Li, M., Lou, W., & Hou, Y. T. (2016). Jamming resilient communication using MIMO interference cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486–1499.
Kim, J., Kim, J., Lee, J., & Choi, J. P. (2018). Physical-layer security against smart eavesdroppers: Exploiting full-duplex receivers. IEEE Access, 6, 32945–32957. https://doi.org/10.1109/ACCESS.2018.2844558.
Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91. https://doi.org/10.1109/TSP.2012.2222386.
Van Nguyen, B., Jung, H., & Kim, K. (2018). Physical layer security schemes for full-duplex cooperative systems: State of the art and beyond. IEEE Communications Magazine, 56(11), 131–137.
Zhao, B.-Q., Wang, H.-M., & Liu, P. (2020). Safeguarding RFID wireless communication against proactive eavesdropping. IEEE Internet of Things Journal, 7(12), 11587–11600. https://doi.org/10.1109/JIOT.2020.2998789.
Bi, Y., & Chen, H. (2016). Accumulate and jam towards secure communication via a wireless-powered full-duplex jammer. IEEE Journal of Selected Topics in Signal Processing., 10(8), 1538–1550. https://doi.org/10.1109/JSTSP.2016.2600523.
Mobini, Z., Mohammadi, M., & Tellambura, C. (2019). Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications. The IEEE Transactions on Information Forensics and Security, 14(3), 621–634. https://doi.org/10.1109/TIFS.2018.2859593.
Lu, X., Yang, W., Cai, Y., & Guan, X. (2019). Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems. IEEE Access, 7, 151295–151306. https://doi.org/10.1109/ACCESS.2019.2948078.
Lv, L., Ding, Z., Chen, J., & Al-Dhahir, N. (2019). Design of secure NOMA against full-duplex proactive eavesdropping. IEEE Wireless Communications, 8(4), 1090–1094.
Vahidian, S., Hatamnia, S., & Champagne, B. (2019). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Access, 7, 181812–181828. https://doi.org/10.1109/ACCESS.2019.2944543.
Pirayesh, H., Sangdeh, P. K., & Zeng, H. (2020). Securing ZigBee communications against constant jamming attack using neural network. The IEEE IoT Journal. https://doi.org/10.1109/JIOT.2020.3034128.
Thai, C. D. T., Bao, V. N. Q., & Huynh, D. T. (2021). Security for two-way untrusted relay against constant and reactive jamming with fixed signals. REV Journal on Electronics and Communications, 10(3–4), 85–92.
Panyim, K., Hayajneh, T., Krishnamurthy, P., & Tipper, D. (2009). On limited-range strategic/random jamming attacks in wireless ad hoc networks. In 2009 IEEE 34th conference on local computer networks (pp. 922–929). https://doi.org/10.1109/LCN.2009.5355041
Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., & Schmitt, J. B. (2014). Detection of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless Communications, 13(3), 1593–1603. https://doi.org/10.1109/TWC.2013.013014.131037.
Tang, X., Ren, P., & Han, Z. (2017). Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework. IEEE Access, 5, 24632–24645.
Jiang, X., Liu, X., Chen, R., Wang, Y., Shu, F., & Wang, J. (2021). Efficient receive beamformers for secure spatial modulation against a malicious full-duplex attacker with eavesdropping ability. The IEEE Transactions on Vehicular Technology, 70(2), 1962–1966. https://doi.org/10.1109/TVT.2021.3051974.
Abedi, M. R., Mokari, N., Saeedi, H., & Yanikomeroglu, H. (2017). Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary. IEEE Transactions on Wireless Communications, 16(2), 885–899. https://doi.org/10.1109/TWC.2016.2633336.
Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communications. Cambridge Univ. Press.
Petersen, K. B., & Pedersen, M. S. (2006). The matrix cookbook (Kgs). Lyngby: Tech. Univ. Denmark.
Acknowledgements
This work was supported by NAFOSTED Grant 102.02-2018.318.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Thai, C.D.T., Tran, T.T. & Huynh, DT. Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. Wireless Netw 29, 403–412 (2023). https://doi.org/10.1007/s11276-022-03144-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03144-0