Fast Power Allocation for Secure Communication With Full-Duplex Radio

This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network c...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on signal processing Vol. 65; no. 14; pp. 3846 - 3861
Main Authors Chen, Lei, Zhu, Qiping, Meng, Weixiao, Hua, Yingbo
Format Journal Article
LanguageEnglish
Published IEEE 15.07.2017
Subjects
Online AccessGet full text
ISSN1053-587X
1941-0476
DOI10.1109/TSP.2017.2701318

Cover

Abstract This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network consisting of a source, a full-duplex destination, and an eavesdropper. A residual level of radio self-interference channel is considered. The optimal power allocation at the destination is found to be significant especially when its power budget is high. Also studied in this paper are a network with multiple full-duplex destinations and another network with multiple sources. Using the algorithms developed in this paper, we are able to show that a multiuser strategy that optimizes the power distributions among the users (in terms of either the sources or the destinations) can yield a substantial gain of secrecy capacity over a single-user strategy.
AbstractList This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network consisting of a source, a full-duplex destination, and an eavesdropper. A residual level of radio self-interference channel is considered. The optimal power allocation at the destination is found to be significant especially when its power budget is high. Also studied in this paper are a network with multiple full-duplex destinations and another network with multiple sources. Using the algorithms developed in this paper, we are able to show that a multiuser strategy that optimizes the power distributions among the users (in terms of either the sources or the destinations) can yield a substantial gain of secrecy capacity over a single-user strategy.
Author Lei Chen
Qiping Zhu
Weixiao Meng
Yingbo Hua
Author_xml – sequence: 1
  givenname: Lei
  surname: Chen
  fullname: Chen, Lei
– sequence: 2
  givenname: Qiping
  surname: Zhu
  fullname: Zhu, Qiping
– sequence: 3
  givenname: Weixiao
  surname: Meng
  fullname: Meng, Weixiao
– sequence: 4
  givenname: Yingbo
  surname: Hua
  fullname: Hua, Yingbo
BookMark eNp9kE1Lw0AQhhepYFu9C17yB1J3Nvt5LLWtQsFiK3oL22QWV9Js2SSo_97WFg8ePM3AzPPy8gxIrw41EnINdARAze16tRwxCmrEFIUM9Bnpg-GQUq5kb79TkaVCq9cLMmiad0qBcyP7ZDqzTZsswwfGZFxVobCtD3XiQkxWWHQRk0nYbrvanw4vvn1LZl1VpXfdrsLP5MmWPlySc2erBq9Oc0ieZ9P15D5dPM4fJuNFWjCZtSlKhkaWrGSgtUahrdooJZw02hXCMuYyKA3XFCxDrQSIkkuJjqsNonWbbEjkMbeIoWkiurzw7U-xNlpf5UDzg4x8LyM_yMhPMvYg_QPuot_a-PUfcnNEPCL-visDBhTPvgFOV2w7
CODEN ITPRED
CitedBy_id crossref_primary_10_1016_j_phycom_2018_10_008
crossref_primary_10_4218_etrij_2018_0688
crossref_primary_10_1109_TWC_2019_2900038
crossref_primary_10_1002_dac_4763
crossref_primary_10_1109_TCOMM_2019_2903102
crossref_primary_10_1007_s11276_022_02967_1
crossref_primary_10_1109_TVT_2018_2840824
crossref_primary_10_1109_TIFS_2020_3047763
crossref_primary_10_1109_ACCESS_2018_2876446
crossref_primary_10_1109_JSAC_2018_2825560
crossref_primary_10_1109_ACCESS_2017_2767283
crossref_primary_10_1109_TSP_2022_3179209
crossref_primary_10_1109_ACCESS_2017_2769131
crossref_primary_10_1109_TSP_2023_3310252
crossref_primary_10_1109_TSP_2018_2879621
crossref_primary_10_1109_TMC_2019_2940941
crossref_primary_10_1049_iet_com_2019_1369
crossref_primary_10_1007_s11276_019_01956_1
crossref_primary_10_1109_TCOMM_2018_2880216
crossref_primary_10_1109_TSP_2019_2949501
crossref_primary_10_1109_JSEN_2019_2904523
Cites_doi 10.1109/MCOM.2014.6736751
10.1109/LSP.2012.2221710
10.1109/TIT.1978.1055892
10.1137/120887679
10.1109/TIT.2010.2048445
10.1016/j.sigpro.2014.09.025
10.1109/TWC.2015.2472527
10.1109/TSP.2009.2038412
10.1109/TIT.2008.921908
10.1109/TWC.2016.2560815
10.1109/TIT.2011.2121450
10.1561/0100000036
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TIT.2011.2158487
10.1109/TWC.2012.102612.111278
10.1007/978-94-010-9577-8_25
10.1017/CBO9780511804441
10.1109/TIFS.2013.2248730
10.1109/SPAWC.2009.5161804
10.1109/JSAC.2013.130907
10.1109/TSP.2011.2159598
10.1109/MSPEC.2016.7498157
10.1109/TIFS.2015.2446436
10.1109/TSP.2013.2269049
10.1007/978-1-4419-1385-2
10.1109/TVT.2012.2199145
10.1109/TWC.2008.060848
10.1109/LSP.2014.2316999
10.1109/TSP.2011.2164910
10.1109/TIT.2008.928272
10.1109/LCOMM.2012.081612.121344
10.1109/TIT.1978.1055917
10.1109/LSP.2015.2504396
10.1109/TIT.2010.2068852
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TSP.2017.2701318
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1941-0476
EndPage 3861
ExternalDocumentID 10_1109_TSP_2017_2701318
7919174
Genre orig-research
GrantInformation_xml – fundername: Science and Technology Plan Projects of the Ministry of Public Security
  grantid: 2015GABJC37
– fundername: National Natural Science Foundation of China
  grantid: 61471143
  funderid: 10.13039/501100001809
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AJQPL
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
EBS
EJD
F5P
HZ~
IFIPE
IPLJI
JAVBF
LAI
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
AAYXX
CITATION
ID FETCH-LOGICAL-c263t-e62e96d2d21888e58a7b775f698fc5a22f31d94801a2e87515d466ef47beeafb3
IEDL.DBID RIE
ISSN 1053-587X
IngestDate Wed Oct 01 03:34:26 EDT 2025
Thu Apr 24 22:52:04 EDT 2025
Tue Aug 26 17:00:18 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 14
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c263t-e62e96d2d21888e58a7b775f698fc5a22f31d94801a2e87515d466ef47beeafb3
PageCount 16
ParticipantIDs crossref_citationtrail_10_1109_TSP_2017_2701318
crossref_primary_10_1109_TSP_2017_2701318
ieee_primary_7919174
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-July15,-15
2017-7-15
PublicationDateYYYYMMDD 2017-07-15
PublicationDate_xml – month: 07
  year: 2017
  text: 2017-July15,-15
  day: 15
PublicationDecade 2010
PublicationTitle IEEE transactions on signal processing
PublicationTitleAbbrev TSP
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
References ref35
ref13
ref34
ref12
ref15
ref36
ref14
ref31
ref30
ref33
ref11
ref32
ref10
liang (ref7) 2009; 5
ref17
ref16
ref19
ref18
chen (ref1) 2016
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref9
ref4
ref3
ref6
ferguson (ref2) 2010
ref5
References_xml – ident: ref31
  doi: 10.1109/MCOM.2014.6736751
– ident: ref29
  doi: 10.1109/LSP.2012.2221710
– year: 2010
  ident: ref2
  publication-title: Cryptography Engineering
– ident: ref4
  doi: 10.1109/TIT.1978.1055892
– ident: ref34
  doi: 10.1137/120887679
– ident: ref9
  doi: 10.1109/TIT.2010.2048445
– ident: ref32
  doi: 10.1016/j.sigpro.2014.09.025
– ident: ref22
  doi: 10.1109/TWC.2015.2472527
– ident: ref14
  doi: 10.1109/TSP.2009.2038412
– ident: ref6
  doi: 10.1109/TIT.2008.921908
– ident: ref25
  doi: 10.1109/TWC.2016.2560815
– ident: ref17
  doi: 10.1109/TIT.2011.2121450
– volume: 5
  start-page: 355
  year: 2009
  ident: ref7
  article-title: Information theoretic security
  publication-title: Found Trends Commun Inf Theory
  doi: 10.1561/0100000036
– ident: ref3
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref8
  doi: 10.1109/TIT.2011.2158487
– ident: ref30
  doi: 10.1109/TWC.2012.102612.111278
– ident: ref36
  doi: 10.1007/978-94-010-9577-8_25
– ident: ref35
  doi: 10.1017/CBO9780511804441
– ident: ref18
  doi: 10.1109/TIFS.2013.2248730
– ident: ref12
  doi: 10.1109/SPAWC.2009.5161804
– ident: ref13
  doi: 10.1109/JSAC.2013.130907
– ident: ref15
  doi: 10.1109/TSP.2011.2159598
– ident: ref27
  doi: 10.1109/MSPEC.2016.7498157
– ident: ref24
  doi: 10.1109/TIFS.2015.2446436
– ident: ref20
  doi: 10.1109/TSP.2013.2269049
– ident: ref33
  doi: 10.1007/978-1-4419-1385-2
– ident: ref26
  doi: 10.1109/TVT.2012.2199145
– ident: ref11
  doi: 10.1109/TWC.2008.060848
– ident: ref23
  doi: 10.1109/LSP.2014.2316999
– ident: ref28
  doi: 10.1109/TSP.2011.2164910
– ident: ref16
  doi: 10.1109/TIT.2008.928272
– start-page: 1
  year: 2016
  ident: ref1
  article-title: Fast computation for secure communication with full-duplex radio
  publication-title: Proc IEEE 17th Int Workshop Signal Process Adv in Wireless Commun
– ident: ref19
  doi: 10.1109/LCOMM.2012.081612.121344
– ident: ref5
  doi: 10.1109/TIT.1978.1055917
– ident: ref21
  doi: 10.1109/LSP.2015.2504396
– ident: ref10
  doi: 10.1109/TIT.2010.2068852
SSID ssj0014496
Score 2.394455
Snippet This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 3846
SubjectTerms Full-duplex
Interference
multicarrier
OFDM
Physical layer
physical layer security
power allocation
Resource management
secure communication
Security
Signal processing algorithms
Signal to noise ratio
Wireless networks
Title Fast Power Allocation for Secure Communication With Full-Duplex Radio
URI https://ieeexplore.ieee.org/document/7919174
Volume 65
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0476
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014496
  issn: 1053-587X
  databaseCode: RIE
  dateStart: 19910101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7anvTgq4r1xR68CCZtNvvKsWhLESpFW-wtZJMJFktbNAXx17uTpqEVEW_LsgvLzMLMN49vCLn20oS1QAGGlyxAEdo4WkvuxFJxYzxhgpxtv_8oeyP-MBbjCrkte2EAIC8-AxeXeS4_mcdLDJU1VYDogldJVWm56tUqMwac57O4rLvgO0Kr8Tol2Qqaw-cB1nAplylkl9FbJmhjpkpuUrr7pL9-zKqS5M1dZsaNv37wNP73tQdkr_AtaXv1GQ5JBWZHZHeDcbBOOt3oI6MDHI1G21M0ZKgYaj1XmkfegW51jNCXSfZKEaY698vFFD7pU5RM5sdk1O0M73pOMUnBiZn0Mwckg0AmLLEGXWsQOlJGKZHKQKexiBhLfS8JkEkmYmARjCcSLiWkXBmAKDX-CanN5jM4JZTFmNgU0vo1nCcpt_iNI2kdeODFqdEN0lwLN4wLmnGcdjENc7jRCkKrjhDVERbqaJCb8sZiRbHxx9k6Cro8V8j47Pftc7KDlzEU64kLUsvel3BpfYjMXOWf5xtdsMEc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB58HNSDb_HtHrwIpm22-8pR1FIfFdGKvYVsMsFiaUVTEH-9O9u0qIh4W5ZNWGYWZr55fANwGOYZr6FGCi85gCKNDYxRIkiVFtaG0kaebb91o5oP4rIjO1NwPOmFQURffIYVWvpcfjZIhxQqq-qI0IWYhlkphJCjbq1JzkAIP43LOQz1QBrdGScla1G1fX9LVVy6wjXxy5hvRujLVBVvVBpL0BpfZ1RL8lwZFraSfvxgavzvfZdhsfQu2cnoOazAFPZXYeEL5-AanDeSt4Ld0nA0dtIjU0aqYc53ZT72juxbzwh77BZPjIBqcDZ86eE7u0uy7mAdHhrn7dNmUM5SCFKu6kWAimOkMp45k24MSpNoq7XMVWTyVCac5_Uwi4hLJuHoMEwoM6EU5kJbxCS39Q2Y6Q_6uAmMp5TalMp5NkJkuXAIThBtHYYYprk1W1AdCzdOS6JxmnfRiz3gqEWxU0dM6ohLdWzB0eSLlxHJxh9n10jQk3OljLd_3z6AuWa7dR1fX9xc7cA8_cjX2spdmCleh7jnPIrC7vuH9AmpScRo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+Power+Allocation+for+Secure+Communication+With+Full-Duplex+Radio&rft.jtitle=IEEE+transactions+on+signal+processing&rft.au=Chen%2C+Lei&rft.au=Zhu%2C+Qiping&rft.au=Meng%2C+Weixiao&rft.au=Hua%2C+Yingbo&rft.date=2017-07-15&rft.issn=1053-587X&rft.eissn=1941-0476&rft.volume=65&rft.issue=14&rft.spage=3846&rft.epage=3861&rft_id=info:doi/10.1109%2FTSP.2017.2701318&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSP_2017_2701318
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1053-587X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1053-587X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1053-587X&client=summon