Distributed Power Control in Single-stream MIMO Wiretap Interference Networks with Full-duplex Jamming Receivers

Peyman Siyari, Marwan M Krunz, Diep N. Nguyen

Research output: Contribution to journalArticle

2 Scopus citations

Abstract

We study secure and distributed power control in a multi-link interference network that is tapped by an external eavesdropper. To conceal information from the eavesdropper, legitimate links are equipped with both transmitter-based friendly jamming (TxFJ) and receiver-based friendly jamming (RxFJ). Each transmitter-receiver (Tx-Rx) pair seeks to maximize its secrecy rate by determining the best power assignment (PA) for the information, TxFJ, and RxFJ signals. Joint optimization of these parameters is a non-convex problem, thus computationally demanding. Hence, we seek sub-optimal solutions that aim to provide positive secrecy for each link. Specifically, we find a lower bound on the allocated power to TxFJ above which positive secrecy is achievable for a given link. Once positive secrecy is achieved, the secrecy rate becomes monotonically increasing in the power at the Tx (Alice). Therefore, the rest of Alice's power is allocated to the information signal. Despite its sub-optimality, such an approach precludes the possibility of employing a strong multiuser detector (e.g., successive interference cancellation) by the eavesdropper. The TxFJ PA at a link is done with respect to the observed interference at the corresponding Rx and at Eve, whereas the RxFJ of that link is adjusted using an on-off PA that depends only on the link's local channel state information (CSI). With every link following such a strategy, we model this interaction as a non-cooperative game. Assuming knowledge of eavesdropper's CSI (E-CSI), we derive sufficient conditions for the uniqueness of the resulting Nash equilibrium. We then propose an algorithm to implement the PA game. Lastly, we relax knowledge of E-CSI and propose a framework that is robust to unknown E-CSI. Our results indicate that the performance of this robust framework is close to when E-CSI is fully known to legitimate links. Moreover, empirically it is shown that the secrecy sum-rate scales with the power budget of legitimate transmitters.

Original languageEnglish (US)
JournalIEEE Transactions on Signal Processing
DOIs
StateAccepted/In press - Jan 1 2018

    Fingerprint

Keywords

  • distributed design
  • friendly jamming
  • fullduplex radios
  • game theory
  • Games
  • Interference cancellation
  • Interference network
  • Jamming
  • Power control
  • Receivers
  • Security

ASJC Scopus subject areas

  • Signal Processing
  • Electrical and Electronic Engineering

Cite this