Abstract
The growing concern of secure communication becomes more challenging when encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform eavesdropping and jamming simultaneously. To analyze secrecy outage performance in the presence of such a potential attacker, the proposed work assumes complete information of the legitimate link only. It considers unavailability of complete information of all the ungoverned communication links including eavesdropping, jamming and self-interference link of attacker. FD operation is associated with the problem of imperfect self-interference cancellation. Our proposed analysis considers residual self-interference at the attacker's end in its modelling. The closed-form expressions have been obtained for secrecy outage probability under generalized as well as special cases. The results obtained facilitate in investigating the impact of fading under FD attack and provide important insights about source power, jamming power, attacker's location. Approximate closed-form results also help in reducing computation time by more than 55%.
Original language | English |
---|---|
Article number | 9390213 |
Pages (from-to) | 1454-1458 |
Number of pages | 5 |
Journal | IEEE Wireless Communications Letters |
Volume | 10 |
Issue number | 7 |
DOIs | |
State | Published - Jul 2021 |
Externally published | Yes |
Funding
Manuscript received January 15, 2021; accepted March 17, 2021. Date of publication March 30, 2021; date of current version July 9, 2021. This work was supported by the Department of Electronics and Information Technology, Government of India under Vishvesvaraya Fellowship Scheme. The associate editor coordinating the review of this article and approving it for publication was J. Xu. (Corresponding author: Bhawna Ahuja.) Bhawna Ahuja is with the Bharti School of Telecommunication Technology and Management, Indian Institute of Technology Delhi, New Delhi 110016, India (e-mail: [email protected]).
Funders | Funder number |
---|---|
Department of Electronics and Information Technology |
Keywords
- Full-duplex attacker
- incomplete CSI
- performance analysis
- secrecy outage probability