Fast Power Allocation for Secure Communication With Full-Duplex Radio
This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network c...
Saved in:
| Published in | IEEE transactions on signal processing Vol. 65; no. 14; pp. 3846 - 3861 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
IEEE
15.07.2017
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1053-587X 1941-0476 |
| DOI | 10.1109/TSP.2017.2701318 |
Cover
| Abstract | This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network consisting of a source, a full-duplex destination, and an eavesdropper. A residual level of radio self-interference channel is considered. The optimal power allocation at the destination is found to be significant especially when its power budget is high. Also studied in this paper are a network with multiple full-duplex destinations and another network with multiple sources. Using the algorithms developed in this paper, we are able to show that a multiuser strategy that optimizes the power distributions among the users (in terms of either the sources or the destinations) can yield a substantial gain of secrecy capacity over a single-user strategy. |
|---|---|
| AbstractList | This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed to compute power allocations in subcarriers, subject to power and rate constraints, to maximize the secrecy capacity of a three-node network consisting of a source, a full-duplex destination, and an eavesdropper. A residual level of radio self-interference channel is considered. The optimal power allocation at the destination is found to be significant especially when its power budget is high. Also studied in this paper are a network with multiple full-duplex destinations and another network with multiple sources. Using the algorithms developed in this paper, we are able to show that a multiuser strategy that optimizes the power distributions among the users (in terms of either the sources or the destinations) can yield a substantial gain of secrecy capacity over a single-user strategy. |
| Author | Lei Chen Qiping Zhu Weixiao Meng Yingbo Hua |
| Author_xml | – sequence: 1 givenname: Lei surname: Chen fullname: Chen, Lei – sequence: 2 givenname: Qiping surname: Zhu fullname: Zhu, Qiping – sequence: 3 givenname: Weixiao surname: Meng fullname: Meng, Weixiao – sequence: 4 givenname: Yingbo surname: Hua fullname: Hua, Yingbo |
| BookMark | eNp9kE1Lw0AQhhepYFu9C17yB1J3Nvt5LLWtQsFiK3oL22QWV9Js2SSo_97WFg8ePM3AzPPy8gxIrw41EnINdARAze16tRwxCmrEFIUM9Bnpg-GQUq5kb79TkaVCq9cLMmiad0qBcyP7ZDqzTZsswwfGZFxVobCtD3XiQkxWWHQRk0nYbrvanw4vvn1LZl1VpXfdrsLP5MmWPlySc2erBq9Oc0ieZ9P15D5dPM4fJuNFWjCZtSlKhkaWrGSgtUahrdooJZw02hXCMuYyKA3XFCxDrQSIkkuJjqsNonWbbEjkMbeIoWkiurzw7U-xNlpf5UDzg4x8LyM_yMhPMvYg_QPuot_a-PUfcnNEPCL-visDBhTPvgFOV2w7 |
| CODEN | ITPRED |
| CitedBy_id | crossref_primary_10_1016_j_phycom_2018_10_008 crossref_primary_10_4218_etrij_2018_0688 crossref_primary_10_1109_TWC_2019_2900038 crossref_primary_10_1002_dac_4763 crossref_primary_10_1109_TCOMM_2019_2903102 crossref_primary_10_1007_s11276_022_02967_1 crossref_primary_10_1109_TVT_2018_2840824 crossref_primary_10_1109_TIFS_2020_3047763 crossref_primary_10_1109_ACCESS_2018_2876446 crossref_primary_10_1109_JSAC_2018_2825560 crossref_primary_10_1109_ACCESS_2017_2767283 crossref_primary_10_1109_TSP_2022_3179209 crossref_primary_10_1109_ACCESS_2017_2769131 crossref_primary_10_1109_TSP_2023_3310252 crossref_primary_10_1109_TSP_2018_2879621 crossref_primary_10_1109_TMC_2019_2940941 crossref_primary_10_1049_iet_com_2019_1369 crossref_primary_10_1007_s11276_019_01956_1 crossref_primary_10_1109_TCOMM_2018_2880216 crossref_primary_10_1109_TSP_2019_2949501 crossref_primary_10_1109_JSEN_2019_2904523 |
| Cites_doi | 10.1109/MCOM.2014.6736751 10.1109/LSP.2012.2221710 10.1109/TIT.1978.1055892 10.1137/120887679 10.1109/TIT.2010.2048445 10.1016/j.sigpro.2014.09.025 10.1109/TWC.2015.2472527 10.1109/TSP.2009.2038412 10.1109/TIT.2008.921908 10.1109/TWC.2016.2560815 10.1109/TIT.2011.2121450 10.1561/0100000036 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TIT.2011.2158487 10.1109/TWC.2012.102612.111278 10.1007/978-94-010-9577-8_25 10.1017/CBO9780511804441 10.1109/TIFS.2013.2248730 10.1109/SPAWC.2009.5161804 10.1109/JSAC.2013.130907 10.1109/TSP.2011.2159598 10.1109/MSPEC.2016.7498157 10.1109/TIFS.2015.2446436 10.1109/TSP.2013.2269049 10.1007/978-1-4419-1385-2 10.1109/TVT.2012.2199145 10.1109/TWC.2008.060848 10.1109/LSP.2014.2316999 10.1109/TSP.2011.2164910 10.1109/TIT.2008.928272 10.1109/LCOMM.2012.081612.121344 10.1109/TIT.1978.1055917 10.1109/LSP.2015.2504396 10.1109/TIT.2010.2068852 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TSP.2017.2701318 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1941-0476 |
| EndPage | 3861 |
| ExternalDocumentID | 10_1109_TSP_2017_2701318 7919174 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Science and Technology Plan Projects of the Ministry of Public Security grantid: 2015GABJC37 – fundername: National Natural Science Foundation of China grantid: 61471143 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK ACNCT AENEX AGQYO AHBIQ AJQPL AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD F5P HZ~ IFIPE IPLJI JAVBF LAI MS~ O9- OCL P2P RIA RIE RNS TAE TN5 AAYXX CITATION |
| ID | FETCH-LOGICAL-c263t-e62e96d2d21888e58a7b775f698fc5a22f31d94801a2e87515d466ef47beeafb3 |
| IEDL.DBID | RIE |
| ISSN | 1053-587X |
| IngestDate | Wed Oct 01 03:34:26 EDT 2025 Thu Apr 24 22:52:04 EDT 2025 Tue Aug 26 17:00:18 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 14 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c263t-e62e96d2d21888e58a7b775f698fc5a22f31d94801a2e87515d466ef47beeafb3 |
| PageCount | 16 |
| ParticipantIDs | crossref_citationtrail_10_1109_TSP_2017_2701318 crossref_primary_10_1109_TSP_2017_2701318 ieee_primary_7919174 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2017-July15,-15 2017-7-15 |
| PublicationDateYYYYMMDD | 2017-07-15 |
| PublicationDate_xml | – month: 07 year: 2017 text: 2017-July15,-15 day: 15 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on signal processing |
| PublicationTitleAbbrev | TSP |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref35 ref13 ref34 ref12 ref15 ref36 ref14 ref31 ref30 ref33 ref11 ref32 ref10 liang (ref7) 2009; 5 ref17 ref16 ref19 ref18 chen (ref1) 2016 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref9 ref4 ref3 ref6 ferguson (ref2) 2010 ref5 |
| References_xml | – ident: ref31 doi: 10.1109/MCOM.2014.6736751 – ident: ref29 doi: 10.1109/LSP.2012.2221710 – year: 2010 ident: ref2 publication-title: Cryptography Engineering – ident: ref4 doi: 10.1109/TIT.1978.1055892 – ident: ref34 doi: 10.1137/120887679 – ident: ref9 doi: 10.1109/TIT.2010.2048445 – ident: ref32 doi: 10.1016/j.sigpro.2014.09.025 – ident: ref22 doi: 10.1109/TWC.2015.2472527 – ident: ref14 doi: 10.1109/TSP.2009.2038412 – ident: ref6 doi: 10.1109/TIT.2008.921908 – ident: ref25 doi: 10.1109/TWC.2016.2560815 – ident: ref17 doi: 10.1109/TIT.2011.2121450 – volume: 5 start-page: 355 year: 2009 ident: ref7 article-title: Information theoretic security publication-title: Found Trends Commun Inf Theory doi: 10.1561/0100000036 – ident: ref3 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref8 doi: 10.1109/TIT.2011.2158487 – ident: ref30 doi: 10.1109/TWC.2012.102612.111278 – ident: ref36 doi: 10.1007/978-94-010-9577-8_25 – ident: ref35 doi: 10.1017/CBO9780511804441 – ident: ref18 doi: 10.1109/TIFS.2013.2248730 – ident: ref12 doi: 10.1109/SPAWC.2009.5161804 – ident: ref13 doi: 10.1109/JSAC.2013.130907 – ident: ref15 doi: 10.1109/TSP.2011.2159598 – ident: ref27 doi: 10.1109/MSPEC.2016.7498157 – ident: ref24 doi: 10.1109/TIFS.2015.2446436 – ident: ref20 doi: 10.1109/TSP.2013.2269049 – ident: ref33 doi: 10.1007/978-1-4419-1385-2 – ident: ref26 doi: 10.1109/TVT.2012.2199145 – ident: ref11 doi: 10.1109/TWC.2008.060848 – ident: ref23 doi: 10.1109/LSP.2014.2316999 – ident: ref28 doi: 10.1109/TSP.2011.2164910 – ident: ref16 doi: 10.1109/TIT.2008.928272 – start-page: 1 year: 2016 ident: ref1 article-title: Fast computation for secure communication with full-duplex radio publication-title: Proc IEEE 17th Int Workshop Signal Process Adv in Wireless Commun – ident: ref19 doi: 10.1109/LCOMM.2012.081612.121344 – ident: ref5 doi: 10.1109/TIT.1978.1055917 – ident: ref21 doi: 10.1109/LSP.2015.2504396 – ident: ref10 doi: 10.1109/TIT.2010.2068852 |
| SSID | ssj0014496 |
| Score | 2.394455 |
| Snippet | This paper considers a method for improving physical layer security of wireless networks with full-duplex radio. In particular, fast algorithms are developed... |
| SourceID | crossref ieee |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 3846 |
| SubjectTerms | Full-duplex Interference multicarrier OFDM Physical layer physical layer security power allocation Resource management secure communication Security Signal processing algorithms Signal to noise ratio Wireless networks |
| Title | Fast Power Allocation for Secure Communication With Full-Duplex Radio |
| URI | https://ieeexplore.ieee.org/document/7919174 |
| Volume | 65 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0476 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014496 issn: 1053-587X databaseCode: RIE dateStart: 19910101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7anvTgq4r1xR68CCZtNvvKsWhLESpFW-wtZJMJFktbNAXx17uTpqEVEW_LsgvLzMLMN49vCLn20oS1QAGGlyxAEdo4WkvuxFJxYzxhgpxtv_8oeyP-MBbjCrkte2EAIC8-AxeXeS4_mcdLDJU1VYDogldJVWm56tUqMwac57O4rLvgO0Kr8Tol2Qqaw-cB1nAplylkl9FbJmhjpkpuUrr7pL9-zKqS5M1dZsaNv37wNP73tQdkr_AtaXv1GQ5JBWZHZHeDcbBOOt3oI6MDHI1G21M0ZKgYaj1XmkfegW51jNCXSfZKEaY698vFFD7pU5RM5sdk1O0M73pOMUnBiZn0Mwckg0AmLLEGXWsQOlJGKZHKQKexiBhLfS8JkEkmYmARjCcSLiWkXBmAKDX-CanN5jM4JZTFmNgU0vo1nCcpt_iNI2kdeODFqdEN0lwLN4wLmnGcdjENc7jRCkKrjhDVERbqaJCb8sZiRbHxx9k6Cro8V8j47Pftc7KDlzEU64kLUsvel3BpfYjMXOWf5xtdsMEc |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB58HNSDb_HtHrwIpm22-8pR1FIfFdGKvYVsMsFiaUVTEH-9O9u0qIh4W5ZNWGYWZr55fANwGOYZr6FGCi85gCKNDYxRIkiVFtaG0kaebb91o5oP4rIjO1NwPOmFQURffIYVWvpcfjZIhxQqq-qI0IWYhlkphJCjbq1JzkAIP43LOQz1QBrdGScla1G1fX9LVVy6wjXxy5hvRujLVBVvVBpL0BpfZ1RL8lwZFraSfvxgavzvfZdhsfQu2cnoOazAFPZXYeEL5-AanDeSt4Ld0nA0dtIjU0aqYc53ZT72juxbzwh77BZPjIBqcDZ86eE7u0uy7mAdHhrn7dNmUM5SCFKu6kWAimOkMp45k24MSpNoq7XMVWTyVCac5_Uwi4hLJuHoMEwoM6EU5kJbxCS39Q2Y6Q_6uAmMp5TalMp5NkJkuXAIThBtHYYYprk1W1AdCzdOS6JxmnfRiz3gqEWxU0dM6ohLdWzB0eSLlxHJxh9n10jQk3OljLd_3z6AuWa7dR1fX9xc7cA8_cjX2spdmCleh7jnPIrC7vuH9AmpScRo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+Power+Allocation+for+Secure+Communication+With+Full-Duplex+Radio&rft.jtitle=IEEE+transactions+on+signal+processing&rft.au=Chen%2C+Lei&rft.au=Zhu%2C+Qiping&rft.au=Meng%2C+Weixiao&rft.au=Hua%2C+Yingbo&rft.date=2017-07-15&rft.issn=1053-587X&rft.eissn=1941-0476&rft.volume=65&rft.issue=14&rft.spage=3846&rft.epage=3861&rft_id=info:doi/10.1109%2FTSP.2017.2701318&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSP_2017_2701318 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1053-587X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1053-587X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1053-587X&client=summon |