Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 2 of 2
  • Item
    Thumbnail Image
    Source-Based Jamming for Physical-Layer Security on Untrusted Full-Duplex Relay
    Atapattu, S ; Ross, N ; Jing, Y ; Preniaratne, M (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019-05)
    We address the problem of secure wireless communications over an untrusted full-duplex (FD) relay based on the source jamming scheme. The optimal power allocation between the confidential signal and the jamming signal is derived to maximize the secrecy rate. Then, the corresponding secrecy outage probability (SOP) and the average secrecy rate (ASR) are analyzed. A tight approximation and an asymptotic result are further obtained for the single-antenna destination case both in simple forms. The large-antenna destination case is also analyzed rigorously. Further discussion reveals that transmit-power dependent self-interference has significant negative impact on the secrecy performance.
  • Item
    No Preview Available
    Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection
    Atapattu, S ; Ross, N ; Jing, Y ; He, Y ; Evans, JS (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019-02)
    This paper investigates the relay selection (RS) problem for multi-hop full-duplex relay networks where multiple source-destination (SD) pairs compete for the same pool of relays, under the attack of multiple eavesdroppers. To enhance the physical-layer security, within a given coherence time, our objective is to jointly assign the available relays at each hop to different SD pairs to maximize the minimum secrecy rate among all pairs. Two RS schemes, optimal RS and suboptimal RS (SRS), are proposed for two-hop networks based on global channel state information (CSI) and only SD pairs CSI, respectively. Since all users can communicate within the same coherence time, our joint RS schemes are important for the user-fairness and ultra-reliable low-latency communications. To evaluate the performance, the exact secrecy outage probability of the SRS scheme is derived under two residual self-interference models. The asymptotic analysis shows that the SRS scheme achieves full diversity. A relay-based jamming scheme is also proposed by using unassigned relays for user communications. Finally, the two-hop RS schemes and the analysis are extended to the general multi-hop network with multiple eavesdroppers. The numerical results reveal interesting fundamental trends where the proposed schemes can significantly enhance the secrecy performance.