Skip to main content
Log in

Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this paper, we consider the problem of multiple active and full-duplex (FD) attackers in physical-layer security of wireless communications. The attackers can eavesdrop the legitimate signal from a transmitter to a receiver and jam it at the same time with a high power. The channel realizations, pilot signals, and jamming signals of the attackers are not known at the legitimate nodes. This gives a difficulty because there are not enough degrees of freedom in the received signal space. However, we propose a novel scheme to opportunistically remove the jamming signals out of the received signals to reliably decode the legitimate signal. The numerical results show that there is a significant improvement in the secrecy rate (SR) compared to the conventional scheme. Especially, the higher the transmit power of the attackers, the better the performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. A more general coherence time can be assumed by considering two cases of its length but is out of scope of this paper.

  2. We do not need to know the channel realizations between the jammers and A and B in order to get this ergodic rate; instead, we need to know their distribution and the channel realizations between A and B, which are presupposed in section System Model.

  3. We will use a different simulation later to show that the higher the transmit power of the attackers, the better the performance of the proposed scheme.

References

  1. Mukherjee, A., Fakoorian, S., Huang, J., & Swindlehurst, A. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 1–24. https://doi.org/10.1109/SURV.2014.012314.00178.

    Article  Google Scholar 

  2. Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K., & Gao, X. (2018). A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679–695. https://doi.org/10.1109/JSAC.2018.2825560.

    Article  Google Scholar 

  3. Lv, T., Gao, H., & Yang, S. (2015). Secrecy transmit beamforming for heterogeneous networks. IEEE Journal on Selected Areas in Communications, 33(6), 1154–1170. https://doi.org/10.1109/JSAC.2015.2416984.

    Article  Google Scholar 

  4. Thai, C. D. T., Lee, J., & Quek, T. Q. S. (2016). Physical-layer secret key generation with colluding untrusted relays. IEEE Transactions on Wireless Communications, 15(2), 1517–1530. https://doi.org/10.1109/TWC.2015.2491935.

    Article  Google Scholar 

  5. Li, L., Petropulu, A. P., & Chen, Z. (2017). MIMO secret communications against an active eavesdropper. IEEE Transactions on Information Forensics and Security, 12(10), 2387–2401. https://doi.org/10.1109/TIFS.2017.2705618.

    Article  Google Scholar 

  6. Huang, K.-W., Wang, H.-M., Wu, Y., & Schober, R. (2018). Pilot spoofing attack by multiple eavesdroppers. IEEE Transactions on Wireless Communications, 17(10), 6433–6447. https://doi.org/10.1109/TWC.2018.2859949.

    Article  Google Scholar 

  7. Lichtman, M., Jover, R. P., Labib, M., Rao, R., Marojevic, V., & Reed, J. H. (2016). Lte/lte-a jamming, spoofing, and sniffing: Threat assessment and mitigation. IEEE Communications Magazine, 54(4), 54–61. https://doi.org/10.1109/MCOM.2016.7452266.

    Article  Google Scholar 

  8. Lv, T., Yin, Y., Lu, Y., Yang, S., Liu, E., & Clapworthy, G. (2018). Physical detection of misbehavior in relay systems with unreliable channel state information. IEEE Journal on Selected Areas in Communications, 36(7), 1517–1530. https://doi.org/10.1109/JSAC.2018.2824728.

    Article  Google Scholar 

  9. Wu, Y., Schober, R., Ng, D. W. K., Xiao, C., & Caire, G. (2016). Secure massive MIMO transmission with an active eavesdropper. IEEE Transactions on Information Theory, 62(7), 3880–3900. https://doi.org/10.1109/TIT.2016.2569118.

    Article  MathSciNet  MATH  Google Scholar 

  10. Hoang, T. M., Duong, T. Q., Tuan, H. D., Lambotharan, S., & Hanzo, L. (2021). Physical layer security: Detection of active eavesdropping attacks by support vector machines. IEEE Access, 9, 31595–31607. https://doi.org/10.1109/ACCESS.2021.3059648.

    Article  Google Scholar 

  11. Karlsson, M., Björnson, E., & Larsson, E. G. (2017). Jamming a TDD point-to-point link using reciprocity-based MIMO. IEEE Transactions on Information Forensics and Security, 12(12), 2957–2970. https://doi.org/10.1109/TIFS.2017.2725823.

    Article  Google Scholar 

  12. Xiao, L., Lu, X., Xu, D., Tang, Y., Wang, L., & Zhuang, W. (2018). UAV relay in VANETs against smart jamming with reinforcement learning. The IEEE Transactions on Vehicular Technology, 67(5), 4087–4097. https://doi.org/10.1109/TVT.2018.2789466.

    Article  Google Scholar 

  13. Pu, C. (2018). Jamming-resilient multipath routing protocol for flying Ad Hoc networks. IEEE Access, 6, 68472–68486. https://doi.org/10.1109/ACCESS.2018.2879758.

    Article  Google Scholar 

  14. Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission Stackelberg game with observation errors. IEEE Communications Letters, 19(6), 949–952. https://doi.org/10.1109/LCOMM.2015.2418776.

    Article  Google Scholar 

  15. Yan, Q., Zeng, H., Jiang, T., Li, M., Lou, W., & Hou, Y. T. (2016). Jamming resilient communication using MIMO interference cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486–1499.

    Article  Google Scholar 

  16. Kim, J., Kim, J., Lee, J., & Choi, J. P. (2018). Physical-layer security against smart eavesdroppers: Exploiting full-duplex receivers. IEEE Access, 6, 32945–32957. https://doi.org/10.1109/ACCESS.2018.2844558.

    Article  Google Scholar 

  17. Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 61(1), 82–91. https://doi.org/10.1109/TSP.2012.2222386.

    Article  MathSciNet  MATH  Google Scholar 

  18. Van Nguyen, B., Jung, H., & Kim, K. (2018). Physical layer security schemes for full-duplex cooperative systems: State of the art and beyond. IEEE Communications Magazine, 56(11), 131–137.

    Article  Google Scholar 

  19. Zhao, B.-Q., Wang, H.-M., & Liu, P. (2020). Safeguarding RFID wireless communication against proactive eavesdropping. IEEE Internet of Things Journal, 7(12), 11587–11600. https://doi.org/10.1109/JIOT.2020.2998789.

    Article  Google Scholar 

  20. Bi, Y., & Chen, H. (2016). Accumulate and jam towards secure communication via a wireless-powered full-duplex jammer. IEEE Journal of Selected Topics in Signal Processing., 10(8), 1538–1550. https://doi.org/10.1109/JSTSP.2016.2600523.

    Article  Google Scholar 

  21. Mobini, Z., Mohammadi, M., & Tellambura, C. (2019). Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications. The IEEE Transactions on Information Forensics and Security, 14(3), 621–634. https://doi.org/10.1109/TIFS.2018.2859593.

    Article  Google Scholar 

  22. Lu, X., Yang, W., Cai, Y., & Guan, X. (2019). Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems. IEEE Access, 7, 151295–151306. https://doi.org/10.1109/ACCESS.2019.2948078.

    Article  Google Scholar 

  23. Lv, L., Ding, Z., Chen, J., & Al-Dhahir, N. (2019). Design of secure NOMA against full-duplex proactive eavesdropping. IEEE Wireless Communications, 8(4), 1090–1094.

    Article  Google Scholar 

  24. Vahidian, S., Hatamnia, S., & Champagne, B. (2019). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Access, 7, 181812–181828. https://doi.org/10.1109/ACCESS.2019.2944543.

    Article  Google Scholar 

  25. Pirayesh, H., Sangdeh, P. K., & Zeng, H. (2020). Securing ZigBee communications against constant jamming attack using neural network. The IEEE IoT Journal. https://doi.org/10.1109/JIOT.2020.3034128.

    Article  Google Scholar 

  26. Thai, C. D. T., Bao, V. N. Q., & Huynh, D. T. (2021). Security for two-way untrusted relay against constant and reactive jamming with fixed signals. REV Journal on Electronics and Communications, 10(3–4), 85–92.

    Google Scholar 

  27. Panyim, K., Hayajneh, T., Krishnamurthy, P., & Tipper, D. (2009). On limited-range strategic/random jamming attacks in wireless ad hoc networks. In 2009 IEEE 34th conference on local computer networks (pp. 922–929). https://doi.org/10.1109/LCN.2009.5355041

  28. Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., & Schmitt, J. B. (2014). Detection of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless Communications, 13(3), 1593–1603. https://doi.org/10.1109/TWC.2013.013014.131037.

    Article  Google Scholar 

  29. Tang, X., Ren, P., & Han, Z. (2017). Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework. IEEE Access, 5, 24632–24645.

    Article  Google Scholar 

  30. Jiang, X., Liu, X., Chen, R., Wang, Y., Shu, F., & Wang, J. (2021). Efficient receive beamformers for secure spatial modulation against a malicious full-duplex attacker with eavesdropping ability. The IEEE Transactions on Vehicular Technology, 70(2), 1962–1966. https://doi.org/10.1109/TVT.2021.3051974.

    Article  Google Scholar 

  31. Abedi, M. R., Mokari, N., Saeedi, H., & Yanikomeroglu, H. (2017). Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary. IEEE Transactions on Wireless Communications, 16(2), 885–899. https://doi.org/10.1109/TWC.2016.2633336.

    Article  Google Scholar 

  32. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communications. Cambridge Univ. Press.

    Book  MATH  Google Scholar 

  33. Petersen, K. B., & Pedersen, M. S. (2006). The matrix cookbook (Kgs). Lyngby: Tech. Univ. Denmark.

    Google Scholar 

Download references

Acknowledgements

This work was supported by NAFOSTED Grant 102.02-2018.318.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chan Dai Truyen Thai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thai, C.D.T., Tran, T.T. & Huynh, DT. Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. Wireless Netw 29, 403–412 (2023). https://doi.org/10.1007/s11276-022-03144-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03144-0

Keywords

Navigation