Physical Layer Network Security in the Full-Duplex Relay System
This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, i...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2015-03, Vol.10 (3), p.574-583 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 583 |
---|---|
container_issue | 3 |
container_start_page | 574 |
container_title | IEEE transactions on information forensics and security |
container_volume | 10 |
creator | Gaojie Chen Yu Gong Pei Xiao Chambers, Jonathon A. |
description | This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis. |
doi_str_mv | 10.1109/TIFS.2015.2390136 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2015_2390136</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7004893</ieee_id><sourcerecordid>10_1109_TIFS_2015_2390136</sourcerecordid><originalsourceid>FETCH-LOGICAL-c374t-2a707c24bfdb85230fd314a42a9e5c97b20a5a8d64ab0b7d63128a39404628843</originalsourceid><addsrcrecordid>eNo9kEFLw0AUhBdRsFZ_gHjZP5D43u5mszmJVKOFomLqOWySFxpNbdlNsPn3NrT0NHOYGZiPsVuEEBGS--U8zUIBGIVCJoBSn7EJRpEONAg8P3mUl-zK-28ApVCbCXv4WA2-KW3LF3Ygx9-o-9u4H55R2bumG3jzy7sV8bRv2-Cp37a045_U2oFng-9ofc0uatt6ujnqlH2lz8vZa7B4f5nPHhdBKWPVBcLGEJdCFXVVmEhIqCuJyiphE4rKJC4E2MiaSitbQBFXWqIwViYKlBbGKDlleNgt3cZ7R3W-dc3auiFHyEcC-UggHwnkRwL7zt2h0xDRKR_vv5tEyn9rq1Zo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Physical Layer Network Security in the Full-Duplex Relay System</title><source>IEEE Electronic Library (IEL)</source><creator>Gaojie Chen ; Yu Gong ; Pei Xiao ; Chambers, Jonathon A.</creator><creatorcontrib>Gaojie Chen ; Yu Gong ; Pei Xiao ; Chambers, Jonathon A.</creatorcontrib><description>This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2015.2390136</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Approximation methods ; cooperative relay networks ; Data communication ; Jamming ; Physical layer ; Physical layer secrecy ; Relay networks (telecommunications) ; Security</subject><ispartof>IEEE transactions on information forensics and security, 2015-03, Vol.10 (3), p.574-583</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c374t-2a707c24bfdb85230fd314a42a9e5c97b20a5a8d64ab0b7d63128a39404628843</citedby><cites>FETCH-LOGICAL-c374t-2a707c24bfdb85230fd314a42a9e5c97b20a5a8d64ab0b7d63128a39404628843</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7004893$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7004893$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gaojie Chen</creatorcontrib><creatorcontrib>Yu Gong</creatorcontrib><creatorcontrib>Pei Xiao</creatorcontrib><creatorcontrib>Chambers, Jonathon A.</creatorcontrib><title>Physical Layer Network Security in the Full-Duplex Relay System</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis.</description><subject>Approximation methods</subject><subject>cooperative relay networks</subject><subject>Data communication</subject><subject>Jamming</subject><subject>Physical layer</subject><subject>Physical layer secrecy</subject><subject>Relay networks (telecommunications)</subject><subject>Security</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEFLw0AUhBdRsFZ_gHjZP5D43u5mszmJVKOFomLqOWySFxpNbdlNsPn3NrT0NHOYGZiPsVuEEBGS--U8zUIBGIVCJoBSn7EJRpEONAg8P3mUl-zK-28ApVCbCXv4WA2-KW3LF3Ygx9-o-9u4H55R2bumG3jzy7sV8bRv2-Cp37a045_U2oFng-9ofc0uatt6ujnqlH2lz8vZa7B4f5nPHhdBKWPVBcLGEJdCFXVVmEhIqCuJyiphE4rKJC4E2MiaSitbQBFXWqIwViYKlBbGKDlleNgt3cZ7R3W-dc3auiFHyEcC-UggHwnkRwL7zt2h0xDRKR_vv5tEyn9rq1Zo</recordid><startdate>201503</startdate><enddate>201503</enddate><creator>Gaojie Chen</creator><creator>Yu Gong</creator><creator>Pei Xiao</creator><creator>Chambers, Jonathon A.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201503</creationdate><title>Physical Layer Network Security in the Full-Duplex Relay System</title><author>Gaojie Chen ; Yu Gong ; Pei Xiao ; Chambers, Jonathon A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c374t-2a707c24bfdb85230fd314a42a9e5c97b20a5a8d64ab0b7d63128a39404628843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Approximation methods</topic><topic>cooperative relay networks</topic><topic>Data communication</topic><topic>Jamming</topic><topic>Physical layer</topic><topic>Physical layer secrecy</topic><topic>Relay networks (telecommunications)</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gaojie Chen</creatorcontrib><creatorcontrib>Yu Gong</creatorcontrib><creatorcontrib>Pei Xiao</creatorcontrib><creatorcontrib>Chambers, Jonathon A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gaojie Chen</au><au>Yu Gong</au><au>Pei Xiao</au><au>Chambers, Jonathon A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Physical Layer Network Security in the Full-Duplex Relay System</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2015-03</date><risdate>2015</risdate><volume>10</volume><issue>3</issue><spage>574</spage><epage>583</epage><pages>574-583</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis.</abstract><pub>IEEE</pub><doi>10.1109/TIFS.2015.2390136</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2015-03, Vol.10 (3), p.574-583 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIFS_2015_2390136 |
source | IEEE Electronic Library (IEL) |
subjects | Approximation methods cooperative relay networks Data communication Jamming Physical layer Physical layer secrecy Relay networks (telecommunications) Security |
title | Physical Layer Network Security in the Full-Duplex Relay System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T18%3A01%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Physical%20Layer%20Network%20Security%20in%20the%20Full-Duplex%20Relay%20System&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Gaojie%20Chen&rft.date=2015-03&rft.volume=10&rft.issue=3&rft.spage=574&rft.epage=583&rft.pages=574-583&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2015.2390136&rft_dat=%3Ccrossref_RIE%3E10_1109_TIFS_2015_2390136%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7004893&rfr_iscdi=true |