ترغب بنشر مسار تعليمي؟ اضغط هنا

Full-Duplex vs. Half-Duplex Secret-Key Generation

186   0   0.0 ( 0 )
 نشر من قبل Hendrik Vogt
 تاريخ النشر 2015
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Full-duplex (FD) communication is regarded as a key technology in future 5G and Internet of Things (IoT) systems. In addition to high data rate constraints, the success of these systems depends on the ability to allow for confidentiality and security. Secret-key agreement from reciprocal wireless channels can be regarded as a valuable supplement for security at the physical layer. In this work, we study the role of FD communication in conjunction with secret-key agreement. We first introduce two complementary key generation models for FD and half-duplex (HD) settings and compare the performance by introducing the key-reconciliation function. Furthermore, we study the impact of the so called probing-reconciliation trade-off, the role of a strong eavesdropper and analyze the system in the high SNR regime. We show that under certain conditions, the FD mode enforces a deteriorating impact on the capabilities of the eavesdropper and offers several advantages in terms of secret-key rate over the conventional HD setups. Our analysis reveals as an interesting insight that perfect self-interference cancellation is not necessary in order to obtain performance gains over the HD mode.



قيم البحث

اقرأ أيضاً

61 - Cheng Li , Bin Xia , Zhiyong Chen 2018
The hybrid half-duplex/full-duplex (HD/FD) relaying scheme is an effective paradigm to overcome the negative effects of the self-interference incurred by the full-duplex (FD) mode. However, traditional hybrid HD/FD scheme does not consider the divers ity gain incurred by the multiple antennas of the FD node when the system works in the HD mode, leading to the waste of the system resources. In this paper, we propose a new hybrid HD/FD relaying scheme, which utilizes both the antennas of the FD relay node for reception and transmission when the system works in the HD mode. With multiple antennas, the maximum ratio combining/maximum ratio transmission is adopted to process the signals at the relay node. Based on this scheme, we derive the exact closed-form system outage probability and conduct various numerical simulations. The results show that the proposed scheme remarkably improves the system outage performance over the traditional scheme, and demonstrate that the proposed scheme can more effectively alleviate the adverse effects of the residual self-interference.
In this paper, the impact of in-band full-duplex (IBFD) wireless communications on secret key generation via physical layer channel state information is investigated. A key generation strategy for IBFD wireless devices to increase the rate of generat ed secret keys over multipath fading channels is proposed. Conventionally, due to the half-duplex (HD) constraint on wireless transmissions, sensing simultaneous reciprocal channel measurements is not possible, which leads to a degraded key generation rate. However, with the advent of IBFD wireless devices, the legitimate nodes can sense the shared wireless link simultaneously at the possible cost of a self-interference (SI) channel estimation and some residual self-interference (RSI). As we demonstrate, with HD correlated observations the key rate is upper bounded by a constant, while with IBFD the key rate is only limited by the SI cancellation performance and is in general greater than that of its HD counterpart. Our analysis shows that with reasonable levels of SI cancellation, in the high SNR regime the key rate of IBFD is much higher, while in low SNRs, the HD system performs better. Finally, the key rate loss due to the overhead imposed by the SI channel estimation phase is discussed.
We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a vulnerability region around each Bob, which can be exploited by a nearby Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ) with Rx-based friendly jamming (RxFJ), generated by each Bob. Specifically, each Bob uses self-interference suppression (SIS) to transmit a friendly jamming signal while simultaneously receiving an information signal over the same channel. We minimize the powers allocated to the information, TxFJ, and RxFJ signals under given guarantees on the individual secrecy rate for each Bob. The problem is solved for the cases when the eavesdroppers channel state information is known/unknown. Simulations show the effectiveness of the proposed solution. Furthermore, we discuss how to schedule transmissions when the rate requirements need to be satisfied on average rather than instantaneously. Under special cases, a scheduling algorithm that serves only the strongest receivers is shown to outperform the one that schedules all receivers.
A secret-key generation scheme based on a layered broadcasting strategy is introduced for slow-fading channels. In the model considered, Alice wants to share a key with Bob while keeping the key secret from Eve, who is a passive eavesdropper. Both Al ice-Bob and Alice-Eve channels are assumed to undergo slow fading, and perfect channel state information (CSI) is assumed to be known only at the receivers during the transmission. In each fading slot, Alice broadcasts a continuum of coded layers and, hence, allows Bob to decode at the rate corresponding to the fading state (unknown to Alice). The index of a reliably decoded layer is sent back from Bob to Alice via a public and error-free channel and used to generate a common secret key. In this paper, the achievable secrecy key rate is first derived for a given power distribution over coded layers. The optimal power distribution is then characterized. It is shown that layered broadcast coding can increase the secrecy key rate significantly compared to single-level coding.
Mobile traffic is projected to increase 1000 times from 2010 to 2020. This poses significant challenges on the 5th generation (5G) wireless communication system design, including network structure, air interface, key transmission schemes, multiple ac cess, and duplexing schemes. In this paper, full duplex networking issues are discussed, aiming to provide some insights on the design and possible future deployment for 5G. Particularly, the interference scenarios in full duplex are analyzed, followed by discussions on several candidate interference mitigation approaches, interference proof frame structures, transceiver structures for channel reciprocity recovery, and super full duplex base station where each sector operates in time division duplex (TDD) mode. The extension of TDD and frequency division duplex (FDD) to full duplex is also examined. It is anticipated that with future standardization and deployment of full duplex systems, TDD and FDD will be harmoniously integrated, supporting all the existing half duplex mobile phones efficiently, and leading to a substantially enhanced 5G system performance.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا