Next Article in Journal
On the Neutrosophic, Pythagorean and Some Other Novel Fuzzy Sets Theories Used in Decision Making: Invitation to Discuss
Next Article in Special Issue
Key Generation Method Based on Multi-Satellite Cooperation and Random Perturbation
Previous Article in Journal
Energy, Exergy, Exergoeconomic and Exergoenvironmental Impact Analyses and Optimization of Various Geothermal Power Cycle Configurations
Previous Article in Special Issue
On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel

1
The Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China
2
5GIC & 6GIC, Institute for Communication Systems, University of Surrey, Guildford GU2 7XH, UK
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(11), 1484; https://doi.org/10.3390/e23111484
Submission received: 4 August 2021 / Revised: 6 November 2021 / Accepted: 8 November 2021 / Published: 10 November 2021
(This article belongs to the Special Issue Information-Theoretic Approach to Privacy and Security)

Abstract

:
In this article, the sum secure degrees-of-freedom (SDoF) of the multiple-input multiple-output (MIMO) X channel with confidential messages (XCCM) and arbitrary antenna configurations is studied, where there is no channel state information (CSI) at two transmitters and only delayed CSI at a multiple-antenna, full-duplex, and decode-and-forward relay. We aim at establishing the sum-SDoF lower and upper bounds. For the sum-SDoF lower bound, we design three relay-aided transmission schemes, namely, the relay-aided jamming scheme, the relay-aided jamming and one-receiver interference alignment scheme, and the relay-aided jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. Moreover, the security and decoding of each scheme are analyzed. The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (CSIT). As a result, the sum-SDoF lower and upper bounds are derived, and the sum-SDoF is characterized when the relay has sufficiently large antennas. Furthermore, even assuming no CSI at two transmitters, our results show that a multiple-antenna full-duplex relay with delayed CSI can elevate the sum-SDoF of the MIMO XCCM. This is corroborated by the fact that the derived sum-SDoF lower bound can be greater than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT.

1. Introduction

The deployment of 5G and all of the connections to 6G around the world have all exacerbated the concerns for information-theoretic security in mobile communication networks [1,2,3]. The secure degrees-of-freedom (SDoF) of multiple-input multiple-output (MIMO) networks with confidential messages and perfect channel state information at the transmitter (CSIT) was studied in [4,5,6,7,8,9]. For the K-user single-input single-output (SISO) interference channel with confidential messages (ICCM), the sum-SDoF was characterized in [4]. For the multiple-input multiple-output (MIMO) ICCM, under symmetric antenna configurations, the sum-SDoF was derived in [5,6]. Then, the sum-SDoF of the MIMO ICCM with arbitrary antenna configurations was characterized in [7]. The X network with confidential messages has a more general message setting than that in ICCM. For the X network with confidential messages, the sum-SDoF was studied in [8]. The sum-SDoF of rank-deficient ICCM and broadcast channel with confidential messages (BCCM) was characterized in [9].
For the fast-fading wireless channel, the CSIT can be delayed, that is, mismatching with current CSI but matching with past CSI. Under this imperfect setting, i.e., delayed CSIT, the research of SDoF was stemmed from [10], where under arbitrary antenna configurations, the SDoF region of two-user MIMO BCCM and delayed CSIT was characterized. Thereafter, the SDoF regions of two-user multiple-input single-output (MISO) BCCM with alternating CSIT was derived in [11]. The linear SDoF of blind multi-user MISO wiretap channel with delayed CSIT was characterized in [12]. Recently, in [13], the interplay of link connectivity and alternating CSIT in MISO BCCM was studied from the SDoF perspective. Aside from the BCCM, there are many efforts devoted to investigate the SDoF of two-user interference networks with delayed feedback [14,15,16,17]. In [14], under symmetric antenna configurations, a sum-SDoF lower bound for MIMO ICCM with delayed CSIT was obtained. In [15], under symmetric antenna configurations, a higher sum-SDoF lower bound than that in [14] was derived for MIMO XCCM with delayed CSIT, considering two more confidential messages. In [16], under symmetric antenna configurations, the sum-SDoF of MIMO ICCM with local output feedback was studied. In [17], under symmetric antenna configurations, the SDoF region of MIMO XCCM with output feedback and delayed CSIT was characterized, which has the highest sum-SDoF over that in [14,15,16].
Even with delayed CSI, it is shown in [18,19,20,21,22] that the decode-and-forward relay (for brevity, we henceforth use “relay” to stand for “decode-and-forward relay”) can assist the communication and enhance the degrees-of-freedom (DoF) of MIMO networks. When there is no CSIT, reference [19,20,21,22] considered the assistance of the relay with delayed CSI. In [19], a multiple-antenna relay with delayed CSI elevated the DoF of K-user SISO interference channel. In [21], a multiple-antenna relay with delayed CSI elevated the DoF of the SISO X channel. For the MIMO X channel, it is shown in [22] that a multiple-antenna relay with delayed CSI was able to enhance the DoF. As for X networks, L multiple-antenna full-duplex relays enhanced the sum-DoF of the 2 × K X networks, as shown in [20]. Furthermore, having the security constraints, only the work in [23] addressed the sum-SDoF characterization of 2 × 2 × 2 SISO ICCM with delayed CSIT.
However, to summarize, none of existing works considered the SDoF of the relay-aided MIMO XCCM, where there is no CSI at two transmitters and a delayed CSI at the relay, such as the CSI model in [20,22]. For the first time, we consider the SDoF problem of such a system. Specifically, we consider a multiple-antenna full-duplex relay with delayed CSI in the MIMO XCCM with arbitrary antenna configurations, where there is no CSI at two transmitters. However, there are two major challenges. The first one is how to design a transmission scheme with security guarantee and transmission efficiency. The second one is how to create an upper bound for the sum-SDoF in a non-trivial way. We address these two problems in the following manner: We propose the relayed-aided jamming and interference alignment (IA) design for transmission scheme, which simultaneously fulfills security guarantee and transmission efficiency. In addition, we leverage the existing SDoF region of MIMO BCCM to design a sum-SDoF upper bound. The sum-SDoF lower and upper bounds are tight for partial antenna configurations, and thus, the sum-SDoF is derived therein. The main contributions of this paper are summarized as follows:
  • To derive the sum-SDoF lower bound, under arbitrary antenna configurations, we propose three relay-aided transmission schemes, whose achievable sum-SDoF serves as the sum-SDoF lower bound. Specifically, we propose the relay-aided jamming scheme, and the relay-aided jamming and one-receiver IA scheme, and the relay-aided jamming and two-receiver IA scheme, where each scheme corresponds to one case of antenna configurations. In each scheme, the security and decoding are analyzed.
  • To obtain the sum-SDoF upper bound, which does not appear in the existing literature and is non-trivial, we first treat two transmitters and the relay as a co-located transmitter, which is an enhanced scenario. Thereafter, we apply the results of the existing SDoF region of two-user MIMO BCCM, which is proven in [10], into this enhanced scenario.
  • Our results show that if the full-duplex relay has double antennas of the receiver, the proposed sum-SDoF lower bound is not less than the sum-SDoF in existing two-user interference networks with delayed feedback in [14,15,16,17], and can be higher than the sum-SDoF of MIMO X channel with output feedback and delayed CSIT in [17]. Moreover, the proposed sum-SDoF lower bound matches with the sum-SDoF upper bound for partial antenna configurations, characterizing the sum-SDoF for these antenna configurations.
Notations: The identity matrix of dimensions m is denoted by I m . The block-diagonal matrix with blocks A and B is denoted by BD { A , B } . The rank of matrix A is denoted by RK A . The log is referred to log 2 . [ x ] + = max { x , 0 } .
Organizations: The rest of this paper is organized as follows: The system model is defined in Section 2. The main results and discussions are presented in Section 3. We prove the Theorem 1 in Section 4. We draw our conclusions in Section 5.

2. System Model

We consider the MIMO XCCM aided by a R-antennas full-duplex (the experimental studies and prototypes on full-duplex techniques can be found in [24,25,26,27,28,29], where the self-interference can be suppressed by radio frequency, analogue, and digital cancellations to achieve the noise floor; the details of self-interference suppression are out of the scope of this work) relay, where two transmitters (denoted by T 1 and T 2 ) have M 1 and M 2 antennas, respectively, and two receivers (denoted by R 1 and R 2 ) have N 1 and N 2 antennas, respectively, as shown in Figure 1. Namely, the antenna configurations are arbitrary. Without loss of generality, we have N 1 N 2 by denoting the receiver with most antennas by R 2 . The T i has a confidential message W i , j for R j , where i , j = 1 , 2 . The CSI matrix from T 1 , T 2 and the relay to R 1 , R 2 and the relay at time slot t is denoted by H i , j [ t ] , i , j = 1 , 2 , r , respectively, where H i , j [ t ] is time-varying and independently distributed across space and time. There is no CSI at two transmitters. At the time slot t, both R 1 and R 2 have the instantaneous knowledge of H i , 1 and H i , 2 , i = 1 , 2 , r ; the relay has the instantaneous knowledge of H i , r , i = 1 , 2 . Moreover, due to feedback delay (the CSI feedback link is assumed to be additional, compared with the data/artificial noise transmission link), the past CSI matrices H t 1 { H i , j [ t τ ] , t > τ 1 , i = 1 , 2 , r ; j = 1 , 2 } are available at the relay. Note that the definition of CSI in this paper is the same as that defined in [21,22].
A code { 2 n R i , j ( η ) , i , j = 1 , 2 } with achievable secrecy rates R i , j ( η ) , i , j = 1 , 2 is defined below, where η denotes the signal-to-noise ratio (SNR). The communication process takes n channel uses (time slots) with confidential messages W i , j = [ 1 , , 2 n R i , j ( η ) ] (from T i to R j ). At the time slot t, a stochastic encoder f i , j ( · ) at the T i encodes confidential message W i , j to an input signal x i , j [ t ] , i.e., x i , j [ t ] = f i , j ( W i , j ) . At the time slot t, a stochastic encoder f r ( · ) at the full-duplex relay encodes the collection of received signals y r t [ y r [ 1 ] , , y r [ t ] ] and delayed CSI H t 1 to an input signal x r , j t , i.e., x r , j [ t ] = f r ( y r t , H t 1 ) . At the time slot n, a decoder g i , j ( · ) at the R j decodes the output signals y j n and CSI matrices H n to an estimated message W ^ i , j , i.e., W ^ i , j = g i , j ( y j n , H n ) . According to [10], the secure code satisfies the reliability criterion,
Pr [ W i , j W ^ i , j ] ϵ n , i , j = 1 , 2 ,
and the weak secrecy criterion,
1 n I ( W i , 1 ; y 2 n ) ϵ n ,
1 n I ( W i , 2 ; y 1 n ) ϵ n , i = 1 , 2 ,
where ϵ n 0 as n 1 .
The sum of the secure channel capacity is defined as C s = max i = 1 2 j = 1 2 R i , j ( η ) . The sum-SDoF is a first-order approximation of the secure sum-capacity in the high SNR regime and defined as follows:
i = 1 2 j = 1 2 d i , j = lim η 1 C s log η .

3. Main Results and Discussions

Theorem 1.
(sum-SDoF lower bound under arbitrary antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF lower bound under arbitrary antenna configurations is given as follows:
i = 1 2 j = 1 2 d i , j ( M 1 + M 2 ) ( x 1 + x 2 ) 1 + x 1 + x 2 , M 1 + M 2 N 1 & N 2 < R , min { M 1 + M 2 , R } x 1 + ( M 1 + M 2 ) x 2 1 + x 1 + x 2 + x 3 , N 1 < M 1 + M 2 N 2 & N 2 < R , ( M 1 + M 2 ) x 1 1 + x 1 , M 1 + M 2 N 2 & N 1 < R N 2 , min { M 1 + M 2 , R , N 1 + N 2 } ( x 1 + x 2 ) 1 + x 1 + x 2 + max { x 4 , x 5 } , N 2 < M 1 + M 2 & N 2 < R , min { M 1 + M 2 , R , N 1 + N 2 } x 1 1 + x 1 + x 5 , N 2 < M 1 + M 2 & N 1 < R N 2 , 0 , R N 1 ,
where
x 1 = min { N 2 , R N 1 } N 1 ,
x 2 = min { N 1 , R N 2 } N 2 ,
x 3 = min { M 1 + M 2 N 1 , R N 1 } min { N 1 , R N 2 } min { N 1 , R } N 2 ,
x 4 = min { M 1 + M 2 N 1 , N 2 , R N 1 } min { N 1 , R N 2 } min { N 1 , R } N 2 ,
x 5 = min { M 1 + M 2 N 2 , N 1 , R N 2 } min { N 2 , R N 1 } min { N 1 , R } N 1 .
Proof. 
Please refer to Section 4. □
Remark 1.
(sum-SDoF lower bound under symmetric antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF lower bound under symmetric antenna configurations is given as follows by setting N 1 = N 2 = N and M 1 = M 2 = M in Theorem 1:
i = 1 2 j = 1 2 d i , j 4 M 3 , 2 M < N & 2 N < R , 4 M ( R N ) 2 R N , 2 M < N & N < R 2 N , 2 N min { M , N } min { M + N , 2 N } , N 2 M & 2 N < R , 2 N min { 2 M , R } ( R N ) N 2 + min { 2 M + N , R + N } ( R N ) , N 2 M & N < R 2 N , 0 , R N .
Proposition 1.
(sum-SDoF upper bound under arbitrary antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF upper bound under arbitrary antenna configurations is given by the following:
i = 1 2 j = 1 2 d i , j N 1 min { M 1 + M 2 + R N 2 , N 1 } + N 2 min { M 1 + M 2 + R N 1 , N 2 } min { M 1 + M 2 + R , N 1 + N 2 } .
Proof. 
We enhance the channel by supposing that the two transmitters and the relay constitute a co-located transmitter. Based on ([10], Theorem 3), Proposition 1 is proven. □
Proposition 2.
(antenna configurations for sum-SDoF characterization). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF is characterized by the following:
i = 1 2 j = 1 2 d i , j = N , N M & 2 N R
Proof. 
Following Theorem 1 and Proposition 1, we can verify the match of the sum-SDoF upper and lower bounds for N M and 2 N R . Therefore, the value of sum-SDoF is N for N M and 2 N R . □
Remark 2.
(advantages over existing results in two-user MIMO interference networks with delayed feedback [14,15,16,17]): Under symmetric antenna configurations, the advantages of the derived results over existing results in two-user MIMO interference networks with delayed feedback [14,15,16,17] are shown in Figure 2. In particular, Figure 2 shows that if 2 N R , the derived sum-SDoF lower bound is higher than the sum-SDoF of MIMO XCCM with output feedback and delayed CSIT in [17] for M < N , the sum-SDoF of MIMO ICCM with local output feedback in [16] for M < 2 N , the sum-SDoF lower bound of MIMO XCCM with delayed CSIT in [15] and the sum-SDoF lower bound of MIMO ICCM with delayed CSIT in [14] for all antenna configurations. The gain of our lower bound comes from the full-duplex relay taking over the artificial noise and interference transmission from the two transmitters.
Remark 3.
(numerical calculation under arbitrary antenna configurations). To illustrate the proposed upper and lower bounds for arbitrary antenna configurations, we have shown four examples in Figure 3, Figure 4, Figure 5 and Figure 6, respectively. From Figure 3 and Figure 4, it can be seen that the smaller difference between N 1 and N 2 leads to the smaller gap between the proposed upper and lower bounds, when M 1 , M 2 are fixed and R is sufficiently large. Additionally, a higher N 2 leads to a higher value of the proposed lower bound, when N 1 , M 1 , M 2 are fixed. From Figure 5 and Figure 6, it can be seen that when N 1 + N 2 is less than M 1 + M 2 and R is sufficiently large, the gap between the proposed upper and lower bounds becomes smaller.

4. Proof of Theorem 1: Relay-Aided Transmission Scheme Design

4.1. M 1 + M 2 N 1 Case: The Relay-Aided Jamming Scheme

When M 1 + M 2 N 1 , each receiver can immediately decode the transmitted data symbols, which implies there is no need for IA. At the same time, the relay can send artificial noise symbols to ensure secure data symbol transmission. Therefore, we propose a relay-aided jamming scheme with three phases, where the relay cooperates with two transmitters for artificial noise transmission. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R 1 ; meanwhile, the output signal of Phase I at R 1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R 2 ; meanwhile, the output signal of Phase I at R 2 is reconstructed and re-transmitted by relay. The flowchart of this scheme is illustrated in Figure 7. Firstly, we define the holistic CSI matrices for this scheme as follows:
H i , j P - I BD { H i , j [ 1 ] , , H i , j [ τ 1 ] } , H i , j P - II BD { H i , j [ τ 1 + 1 ] , , H i , j [ τ 1 + τ 2 ] } , H i , j P - III BD { H i , j [ τ 1 + τ 2 + 1 ] , , H i , j [ τ 1 + τ 2 + τ 3 ] } ,
where i , j = 1 , 2 , r , and the value of τ 1 , τ 2 , and τ 3 is determined based on the security analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ 1 C R τ 2 × N 1 τ 1 and Φ 2 C R τ 3 × N 2 τ 1 , whose items follow complex Gaussian CN ( 0 , 1 ) . Next, the proposed three-phase transmission scheme and related analysis are elaborated.
Phase I (Jamming by the Relay): This phase aims at sending R τ 1 artificial noise symbols from the relay in τ 1 time slots by R antennas. Denote the artificial noise vector sent by R antennas in τ 1 time slots as u C R τ 1 . The received signals of Phase-I at two receivers are expressed as follows:
y j P - I = H r , j P - I u , j = 1 , 2 .
Note that additive white Gaussian noise (AWGN) is omitted, due to the SDoF analysis. The CSI matrices of Phase I return to the relay at the end of Phase I.
Phase II (joint data transmission for R 1 by two transmitters and Phase I output transmission by the relay): We aim at sending M 1 τ 2 data symbols to R 1 from T 1 and M 2 τ 2 data symbols to R 1 from T 2 in τ 2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at receivers, i.e., y 1 P - I and y 2 P - I . At each time slot, the data symbols for R 1 are sent from two transmitters, and simultaneously, the Phase I output at R 1 is sent from the relay. Denote the data symbols for R 1 sent from T 1 and T 2 as s 1 , 1 C M 1 τ 2 and s 2 , 1 C M 2 τ 2 , respectively. Therefore, the transmit signals of Phase II at two transmitters are expressed as follows:
x i P - II = s i , 1 , i = 1 , 2 .
The transmit signals of Phase-II at the relay are designed as follows:
x r P - II = Φ 1 y 1 P - I .
The received signals of Phase-II at two receivers are written by the following:
y j P - II = H 1 , j P - II s 1 , 1 + H 2 , j P - II s 2 , 1 + H r , j P - II Φ 1 y 1 P - I , j = 1 , 2 .
Phase III (joint data transmission for R 2 by two transmitters and Phase I output transmission by the relay): This phase aims at sending M 1 τ 3 data symbols to R 2 from T 1 and M 2 τ 3 data symbols to R 2 from T 2 in τ 3 time slots. At each time slot, the data symbols for R 2 are sent from two transmitters, and simultaneously, the Phase I output at R 2 is sent from the relay. Denote the data symbols for R 2 sent from T 1 and T 2 as s 1 , 2 C M 1 τ 3 and s 2 , 2 C M 2 τ 3 , respectively. Therefore, the transmit signals of Phase III at two transmitters are expressed as follows:
x i P - III = s i , 2 , i = 1 , 2 .
The transmit signals of Phase III at the relay are designed as follows:
x r P - III = Φ 2 y 2 P - I .
The received signals of Phase III at two receivers are written by the following:
y j P - III = H 1 , j P - III s 1 , 2 + H 2 , j P - III s 2 , 2 + H r , j P - III Φ 2 y 2 P - I , j = 1 , 2 .
Security analysis: Firstly, we need to verify the zero information leakage at R 1 , when SNR goes to infinity. With y 1 [ y 1 P - I ; y 1 P - II ; y 1 P - III ] , the information leakage is calculated as follows:
I ( s 1 , 2 , s 2 , 2 ; y 1 | H n , s 1 , 1 , s 2 , 1 ) ( a ) I ( s 1 , 2 , s 2 , 2 , u ; y 1 | H n , s 1 , 1 , s 2 , 1 ) I ( u ; y 1 | H n , s 1 , 1 , s 2 , 1 , s 1 , 2 , s 2 , 2 ) ( b ) I ( H r , 1 P - I u , H 1 , 1 P - III s 1 , 2 + H 2 , 1 P - III s 2 , 2 + H r , 1 P - III Φ 2 y 2 P - I ; y 1 | H n , s 1 , 1 , s 2 , 1 ) I ( u ; y 1 | H n , s 1 , 1 , s 2 , 1 , s 1 , 2 , s 2 , 2 ) = ( c ) η 1 RK I N 1 τ 1 0 H r , 1 P - II Φ 1 0 0 I N 1 τ 3 A 1 log η RK H r , 1 P - I H r , 1 P - II Φ 1 H r , 1 P - I H r , 1 P - III Φ 2 H r , 2 P - I A 2 log η = ( d ) N 1 ( τ 1 + τ 3 ) log η min { N 1 τ 1 + min { R , N 1 } τ 3 , ( N 1 + N 2 ) τ 1 , R τ 1 } log η ,
where the reason for each step is given as follows:
(a)
Chain rule of mutual information.
(b)
Applying the data processing inequality for the Markov chain ( s 1 , 2 , s 2 , 2 , u ) ( H r , 1 P - I u , H 1 , 1 P - III s 1 , 2 + H 2 , 1 P - III s 2 , 2 + H r , 1 P - III Φ 2 y 2 P - I ) y 1 .
(c)
When the input is the circularly symmetric complex Gaussian, according to [30], rewrite the mutual information into log | I + η A 1 A 1 H | log | I + η A 2 A 2 H | , and using ([10], Lemma 2), when SNR goes to infinity.
(d)
The rank of matrix A 1 is deduced by Gaussian elimination. The rank of matrix A 2 is derived in Appendix A.
We shall ensure I ( s 1 , 2 , s 2 , 2 ; y 1 | H n , s 1 , 1 , s 2 , 1 ) = o ( log η ) , or equivalently, (16) is zero. If N 1 < R , N 1 ( τ 1 + τ 3 ) = N 1 τ 1 + min { R , N 1 } τ 3 . If N 1 + N 2 R , we have N 1 ( τ 1 + τ 3 ) = ( N 1 + N 2 ) τ 1 . Otherwise, if N 1 < R < N 1 + N 2 , we have N 1 ( τ 1 + τ 3 ) = R τ 1 . Those two equalities can be simplified to the following:
τ 1 τ 3 = N 1 min { N 2 , R N 1 } .
Otherwise, if R N 1 , we cannot guarantee zero information leakage from transmitted data symbols s 2 , 1 , s 2 , 1 to the undesired receiver R 2 , which implies τ 3 = 0 .
Secondly, we only need to verify the zero information leakage at the R 2 , when SNR goes to infinity. With y 2 [ y 2 P - I ; y 2 P - II ; y 2 P - III ] , the information leakage is calculated as follows:
I ( s 1 , 1 , s 2 , 1 ; y 2 | H n , s 1 , 2 , s 2 , 2 ) ( a ) I ( s 1 , 1 , s 2 , 1 , u ; y 2 | H n , s 1 , 2 , s 2 , 2 ) I ( u ; y 2 | H n , s 1 , 1 , s 2 , 1 , s 1 , 2 , s 2 , 2 ) ( b ) I ( H r , 2 P - I u , H 1 , 2 P - II s 1 , 1 + H 2 , 2 P - II s 2 , 1 + H r , 2 P - II Φ 1 y 1 P - I ; y 2 | H n , s 1 , 2 , s 2 , 2 ) I ( u ; y 2 | H n , s 1 , 1 , s 2 , 1 , s 1 , 2 , s 2 , 2 ) = ( c ) η 1 RK I N 2 τ 1 0 0 I N 2 τ 2 H r , 2 P - III Φ 2 0 B 1 log η RK H r , 2 P - I H r , 2 P - II Φ 1 H r , 1 P - I H r , 2 P - III Φ 2 H r , 2 P - I B 2 log η = ( d ) N 2 ( τ 1 + τ 2 ) log η min { N 2 τ 1 + min { R , N 2 } τ 2 , ( N 1 + N 2 ) τ 1 , R τ 1 } log η ,
where the reason for each step is given as follows:
(a)
Chain rule of mutual information.
(b)
Applying the data processing inequality for the Markov chain ( s 1 , 1 , s 2 , 1 , u ) ( H r , 2 P - I u , H 1 , 2 P - II s 1 , 1 + H 2 , 2 P - II s 2 , 1 + H r , 2 P - II Φ 1 y 1 P - I ) y 2 .
(c)
When the input is the circularly symmetric complex Gaussian, according to [30], and rewrite the mutual information into log | I + η B 1 B 1 H | log | I + η B 2 B 2 H | , and using ([10], Lemma 2), when SNR goes to infinity.
(d)
The rank of matrix B 1 is deduced by Gaussian elimination. The rank of matrix B 2 is derived in Appendix A.
We shall ensure I ( s 1 , 1 , s 2 , 1 ; y 2 | H n , s 1 , 2 , s 2 , 2 ) = o ( log η ) , or equivalently, (18) is zero. If N 2 < R , N 2 ( τ 1 + τ 2 ) N 2 τ 1 + min { R , N 2 } τ 2 . If N 1 + N 2 R , we have N 2 ( τ 1 + τ 2 ) = ( N 1 + N 2 ) τ 1 . Otherwise, if N 2 < R < N 1 + N 2 , we have N 2 ( τ 1 + τ 2 ) = R τ 1 . Those two inequalities can be simplified to the following:
τ 1 τ 2 = N 2 min { N 1 , R N 2 } .
If R N 2 , we cannot guarantee zero information leakage from transmitted data symbols s 1 , 1 , s 1 , 2 to the undesired receiver R 2 , which implies τ 2 = 0 .
Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s 1 , 1 C M 1 τ 2 , s 2 , 1 C M 2 τ 2 at R 1 , which is enabled by the following cancellation:
y 1 P - II H r , 1 P - II Φ 1 y 1 P - I = H 1 , 1 P - II s 1 , 1 + H 2 , 1 P - II s 2 , 1 ,
At each time slot, there are N 1 observations at R 1 . Thus, we are able to decode M 1 data symbols from T 1 and M 2 data symbols from T 2 , due to the setting, i.e., M 1 + M 2 N 1 . Therefore, R 1 can decode ( M 1 + M 2 ) τ 2 data symbols.
Secondly, we need to verify the decoding of transmitted data symbols s 1 , 2 C M 1 τ 3 , s 2 , 2 C M 2 τ 3 at R 2 , which is enabled by the following cancellation:
y 2 P - III H r , 2 P - III Φ 2 y 2 P - I = H 1 , 2 P - III s 1 , 2 + H 2 , 2 P - III s 2 , 2 ,
At each time slot, there are N 2 observations at R 2 . Thus, we are able to decode M 1 data symbols from T 1 and M 2 data symbols from T 2 , due to the setting, i.e., M 1 + M 2 N 1 N 2 . Therefore, R 2 can decode ( M 1 + M 2 ) τ 3 data symbols.
Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of ( M 1 + M 2 ) ( τ 2 + τ 3 ) data symbols over τ 1 + τ 2 + τ 3 time slots. This implies that the achievable sum-SDoF can be expressed as ( M 1 + M 2 ) ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 ) . According to the security analysis, the achievable sum-SDoF of proposed relay-aided jamming scheme is calculated through the following:
  • If N 2 < R , we substitute (17) and (19) into ( M 1 + M 2 ) ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 ) to derive the exact achievable sum-SDoF.
  • If N 1 < R N 2 , we substitute τ 2 = 0 and (17) into ( M 1 + M 2 ) ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 ) to derive the exact achievable sum-SDoF.
  • If R N 1 , we cannot ensure zero information leakage; hence, achievable sum-SDoF is zero.
The achievable sum-SDoF of the proposed relay-aided jamming scheme is given in (4) for M 1 + M 2 N 1 & N 2 < R Case, M 1 + M 2 N 1 & N 1 < R N 2 Case, and R N 1 Case.

4.2. N 1 < M 1 + M 2 N 2 Case: The Relay-Aided Jamming and One-Receiver IA Scheme

When N 1 < M 1 + M 2 N 2 , then R 1 can immediately decode the transmitted data symbols, while R 2 cannot. Therefore, the technique of IA can be adopted to enable the decoding of transmitted data symbols for R 2 , where the interference at R 1 is re-transmitted to provide lacking equations for decoding. To this end, we propose a relay-aided jamming and the one-receiver IA scheme with four phases, where the relay cooperates with two transmitters for both artificial noise transmission and IA. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R 1 ; meanwhile, the output signal of Phase I at R 1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R 2 ; meanwhile, the output signal of Phase I at R 2 is reconstructed and re-transmitted by relay. In Phase IV, the interference at R 2 is re-transmitted to provide lacking equations for R 1 . The flowchart of this scheme is illustrated in Figure 8. Firstly, we define the holistic CSI matrices for this scheme as follows:
H i , j P - I BD { H i , j [ 1 ] , , H i , j [ τ 1 ] } , H i , j P - II BD { H i , j [ τ 1 + 1 ] , , H i , j [ τ 1 + τ 2 ] } , H i , j P - III BD { H i , j [ τ 1 + τ 2 + 1 ] , , H i , j [ τ 1 + τ 2 + τ 3 ] } , H i , j P - IV BD { H i , j [ τ 1 + τ 2 + τ 3 + 1 ] , , H i , j [ τ 1 + τ 2 + τ 3 + τ 4 ] } ,
where i , j = 1 , 2 , r , and the value of τ 1 , τ 2 , and τ 3 is determined based on security analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ 1 C R τ 2 × N 1 τ 1 , Φ 2 C R τ 3 × N 2 τ 1 , and Π 1 C min { N 1 , R } τ 4 × N 2 τ 2 , whose items follow complex Gaussian CN ( 0 , 1 ) . Next, the proposed three-phase transmission scheme and related analysis are elaborated.
Phase I (jamming by the relay): This phase aims at sending R τ 1 artificial noise symbols from the relay in τ 1 time slots by R antennas. Denote the artificial noise vector sent by R antennas in τ 1 time slots as u C R τ 1 . The received signals of Phase I at two receivers are expressed as follows:
y j P - I = H r , j P - I u , j = 1 , 2 .
The CSI matrices of Phase I return to the relay at the end of Phase I.
Phase II (joint data transmission for R 1 by two transmitters and Phase I output transmission by the relay): We aim at sending M 1 τ 2 data symbols to R 1 from T 1 and min { M 2 , R M 1 } τ 2 data symbols to R 1 from T 2 in τ 2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at the receivers, i.e., y 1 P - I and y 2 P - I . At each time slot, the data symbols for R 1 are sent from two transmitters, and simultaneously, the Phase I output at R 1 is sent from the relay. Denote the data symbols for R 1 sent from T 1 and T 2 as s 1 , 1 C M 1 τ 2 and s 2 , 1 C min { M 2 , R M 1 } τ 2 , respectively. Therefore, the transmit signals of Phase-II at two transmitters are expressed as follows:
x i P - II = s i , 1 , i = 1 , 2 .
The transmit signals of Phase II at the relay are designed as follows:
x r P - II = Φ 1 y 1 P - I .
The received signals of Phase II at two receivers are written as follows:
y j P - II = H 1 , j P - II s 1 , 1 + H 2 , j P - II s 2 , 1 + H r , j P - II Φ 1 y 1 P - I , j = 1 , 2 .
After the successful self-interference cancellation (for the successful interference cancellation, the residual self-interference can achieve noise floor; therefore, the residual self-interference does not affect the SDoF analysis) at the relay, the received signals of Phase II at the relay are expressed as follows:
y r P - II = H 1 , r P - II s 1 , 2 + H 2 , r P - II s 2 , 2 .
Since there are R observations at the relay, the relay can immediately decode all transmitted min { M 1 + M 2 , R } data symbols, given by s 1 , 1 and s 2 , 1 . The CSI matrices of Phase II return to the relay at the end of Phase II.
Phase III (joint data transmission for R 2 by two transmitters and Phase I output transmission by the relay): This phase aims at sending M 1 τ 3 data symbols to R 2 from T 1 and M 2 τ 3 data symbols to R 2 from T 2 in τ 3 time slots. At each time slot, the data symbols for R 2 are sent from two transmitters, and simultaneously, the Phase I output at R 2 is sent from the relay. Denote the data symbols for R 1 sent from T 1 and T 2 as s 1 , 2 C M 1 τ 3 and s 2 , 2 C M 2 τ 3 , respectively. Therefore, the transmit signals of Phase III at the two transmitters are expressed as follows:
x i P - III = s i , 2 , i = 1 , 2 .
The transmit signals of Phase III at the relay are designed as follows:
x r P - III = Φ 2 y 2 P - I .
The received signals of Phase III at two receivers are written as follows:
y j P - III = H 1 , j P - III s 1 , 2 + H 2 , j P - III s 2 , 2 + H r , j P - III Φ 2 y 2 P - I , j = 1 , 2 .
The CSI matrices of Phase III return to the relay at the end of Phase III.
Phase IV (one-receiver IA by the relay): In order to provide lacking equations for decoding, we aim at sending min { N 1 , R } τ 3 combinations of interference at Phase II in τ 4 time slots. With CSI matrices of Phase I and Phase II, s 1 , 1 and s 2 , 1 , the relay re-constructs the interference at Phase II, i.e., y 2 P - II . The transmit signals of Phase IV at the relay are designed as follows:
x r P - IV = Π 1 y 2 P - II .
At the same time, two transmitters keep silent. The received signals of Phase IV at two receivers are written as follows:
y j P - IV = H r , j P - IV Π 1 y 2 P - II , j = 1 , 2 .
Security Analysis: As the received signals in Phase IV can be constructed by the received signals in Phase II and CSI matrices, the security analysis is similar to that in the relay-aided jamming scheme. Therefore, it can be checked that to ensure zero information leakage at R 1 and R 2 , when SNR goes to infinity, phase duration should follow (17) and (19), respectively.
Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s 1 , 1 and s 2 , 1 at R 1 . This is enabled by the following cancellation:
y 1 P - II H r , 1 P - II Φ 1 y 1 P - I y 1 P - II H r , 1 P - IV Π 1 H r , 2 P - II Φ 1 y 1 P - I = H 1 , 1 P - II H 2 , 1 P - II H r , 1 P - IV Π 1 H 1 , 2 P - II H r , 1 P - IV Π 1 H 2 , 2 P - II H 1 s 1 , 1 s 2 , 1 ,
where the rank of matrix H 1 is min { N 1 τ 2 + min { N 1 τ 4 , R τ 4 } , ( M 1 + M 2 ) τ 2 , R τ 2 } . The reason is given in Appendix B. Since min { M 1 + M 2 , R } τ 2 data symbols for R 1 are transmitted, to ensure the decoding, we shall follow that
min { M 1 + M 2 , R } τ 2 N 1 τ 2 + min { N 1 τ 4 , R τ 4 } ,
which simplifies to the following:
τ 2 τ 4 min { N 1 , R } min { M 1 + M 2 N 1 , R N 1 } .
Then, multiplying (34) by (19), we have the following:
τ 1 τ 4 min { N 1 , R } N 2 min { M 1 + M 2 N 1 , R N 1 } min { N 1 , R N 2 } .
Secondly, we need to verify the decoding of transmitted data symbols s 1 , 2 and s 2 , 2 at the receiver R 2 , which is enabled by the following cancellation:
y 2 P - III H r , 2 P - III Φ 2 y 2 P - I = H 1 , 2 P - III s 1 , 2 + H 2 , 2 P - III s 2 , 2 ,
At each time slot, there are N 2 observations at R 2 . Thus, we are able to decode M 1 data symbols from T 1 and M 2 data symbols from T 2 , due to the setting, i.e, M 1 + M 2 N 2 . Therefore, R 2 can decode ( M 1 + M 2 ) τ 3 data symbols.
Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of min { M 1 + M 2 , R } τ 2 + ( M 1 + M 2 ) τ 3 data symbols over τ 1 + τ 2 + τ 3 + τ 4 time slots. This implies that the achievable sum-SDoF can be expressed as ( min { M 1 + M 2 , R } τ 2 + ( M 1 + M 2 ) τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) . According to the security and decoding analysis, the achievable sum-SDoF of proposed relay-aided jamming and one-receiver IA scheme is calculated through the following:
  • If N 2 < R , we substitute (17), (19), and (35) with equality into ( min { M 1 + M 2 , R } τ 2 + ( M 1 + M 2 ) τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) to derive the exact achievable sum-SDoF.
  • If N 1 < R N 2 , we substitute (17), τ 2 = 0 , and τ 4 = 0 into ( min { M 1 + M 2 , R } τ 2 + ( M 1 + M 2 ) τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) to derive the exact achievable sum-SDoF.
  • If R N 1 , we cannot ensure zero information leakage, and hence, the achievable sum-SDoF is zero.
The achievable sum-SDoF of the proposed relay-aided jamming and one-receiver IA scheme is given in (4) for N 1 < M 1 + M 2 N 2 & N 2 < R Case, M 1 + M 2 N 2 & N 1 < R N 2 Case, and R N 1 Case.

4.3. N 2 < M 1 + M 2 Case: The Relay-Aided Jamming and Two-Receiver IA Scheme

When N 2 < M 1 + M 2 , both two receivers, i.e., R 1 and R 2 , are unable to immediately decode the transmitted data symbols. Therefore, the technique of IA can be adopted to enable the decoding of transmitted data symbols for both two receivers, where the interference at both two receivers is re-transmitted to provide lacking equations for decoding. To this end, we propose a relay-aided jamming and two-receiver IA scheme with four phases, where the relay cooperates with two transmitters for both artificial noise transmission and IA. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R 1 ; meanwhile, the output signal of Phase I at R 1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R 2 ; meanwhile the output signal of Phase I at R 2 is reconstructed and re-transmitted by relay. In Phase IV, the interference at R 2 is re-transmitted to provide lacking equations for R 1 ; meanwhile, the interference at R 1 is re-transmitted to provide lacking equations for R 2 . The flowchart of this scheme is illustrated in Figure 9. Firstly, we define the holistic CSI matrices as follows:
H i , j P - I BD { H i , j [ 1 ] , , H i , j [ τ 1 ] } , H i , j P - II BD { H i , j [ τ 1 + 1 ] , , H i , j [ τ 1 + τ 2 ] } , H i , j P - III BD { H i , j [ τ 1 + τ 2 + 1 ] , , H i , j [ τ 1 + τ 2 + τ 3 ] } , H i , j P - IV BD { H i , j [ τ 1 + τ 2 + τ 3 + 1 ] , , H i , j [ τ 1 + τ 2 + τ 3 + τ 4 ] } ,
where i , j = 1 , 2 , r , and the values of τ 1 , τ 2 , τ 3 , and τ 4 are determined based on security and decoding analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ 1 C R τ 2 × N 1 τ 1 , Φ 1 C R τ 3 × N 2 τ 1 , Π 1 C min { N 1 , R } τ 4 × N 2 τ 2 , and Π 2 C min { N 1 , R } τ 4 × N 1 τ 3 , whose items follow complex Gaussian CN ( 0 , 1 ) . Next, the proposed four-phase transmission scheme and related analysis are elaborated.
Phase I (jamming by the relay): This phase aims at sending R τ 1 artificial noise symbols from the relay by R antennas in τ 1 time slots. Denote the artificial noise vector sent by R antennas in τ 1 time slots as u C R τ 1 . The received signals of Phase I at two receivers are expressed as follows:
y j P - I = H r , j P - I u , j = 1 , 2 .
The CSI matrices of Phase I return to the relay at the end of Phase I.
Phase II (joint data transmission for R 1 by two transmitters and Phase I output transmission by the relay): We aim at sending M 1 τ 2 data symbols to R 1 from T 1 and min { M 2 , R M 1 , N 1 + N 2 M 1 } τ 2 data symbols to R 1 from T 2 in τ 2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at receivers, i.e., y 1 P - I and y 2 P - I . At each time slot, the data symbols for R 1 are sent from two transmitters, and simultaneously, the Phase I output at R 1 is sent from the relay. Denote the data symbols for R 1 sent from T 1 and T 2 as s 1 , 1 C M 1 τ 2 and s 2 , 1 C min { M 2 , R M 1 , N 1 + N 2 M 1 } τ 2 , respectively. Therefore, the transmit signals of Phase II at two transmitters are expressed as follows:
x i P - II = s i , 1 , i = 1 , 2 .
The transmit signals of Phase II at the relay are designed as follows:
x r P - II = Φ 1 y 1 P - I .
The received signals of Phase II at two receivers are written as follows:
y j P - II = H 1 , j P - II s 1 , 1 + H 2 , j P - II s 2 , 1 + H r , j P - II Φ 1 y 1 P - I , j = 1 , 2 .
After the successful self-interference cancellation at the relay, the received signals of Phase II at the relay are expressed as follows:
y r P - II = H 1 , r P - II s 1 , 1 + H 2 , r P - II s 2 , 1 .
Since there are R observations at the relay, the relay can immediately decode all transmitted min { M 1 + M 2 , R , N 1 + N 2 } data symbols, given by s 1 , 1 and s 2 , 1 . The CSI matrices of Phase II return to the relay at the end of Phase II.
Phase III (joint data transmission for R 2 by two transmitters and Phase I output transmission by the relay): We aim at sending M 1 τ 2 data symbols to R 2 from T 1 and min { M 2 , R M 1 , N 1 + N 2 M 1 } τ 2 data symbols to R 2 from T 2 in τ 3 time slots. At each time slot, the data symbols for R 2 are sent from two transmitters, and simultaneously, the Phase I output at R 2 is sent from the relay. Denote the data symbols for R 2 sent from T 1 and T 2 as s 1 , 2 C M 1 τ 2 and s 2 , 2 C min { M 2 , R M 1 , N 1 + N 2 M 1 } τ 2 , respectively. Therefore, the transmit signals of Phase-III at two transmitters are expressed as follows:
x i P - III = s i , 2 , i = 1 , 2 .
The transmit signals of Phase III at the relay are designed as follows:
x r P - III = Φ 2 y 2 P - I .
The received signals of Phase II at two receivers are written as follows:
y j P - III = H 1 , j P - III s 1 , 2 + H 2 , j P - III s 2 , 2 + H r , j P - III Φ 2 y 2 P - I , j = 1 , 2 .
After the successful self-interference cancellation at the relay, the received signals of Phase II at the relay are expressed as follows:
y r P - III = H 1 , r P - III s 1 , 2 + H 2 , r P - III s 2 , 2 .
Since there are R observations at the relay, the relay can immediately decode all transmitted min { M 1 + M 2 , R , N 1 + N 2 } data symbols, given by s 1 , 1 and s 2 , 1 . The CSI matrices of Phase III return to the relay at the end of Phase III.
Phase IV (two-receiver IA by the relay): In order to provide lacking equations for decoding, we aim at sending min { N 1 , R } τ 4 combinations of interference at Phase II and Phase III by min { N 1 , R } antennas in τ 4 time slots after Phase III. With CSI matrices of Phase I, Phase II, and Phase III, the relay re-constructs the interference at Phase II and Phase III, i.e, y 2 P - II and y 1 P - III . The transmit signals of Phase-IV at the relay are designed as follows:
x r P - IV = Π 2 y 1 P - III + Π 1 y 2 P - II .
At the same time, two transmitters keep silent. The received signals of Phase IV at two receivers are written by the following:
y j P - IV = H r , j P - IV Π 2 y 1 P - III + H r , j P - IV Π 1 y 2 P - II , j = 1 , 2 .
Security Analysis: As the received signals in Phase IV can be constructed by the received signals in Phase II, Phase III, and CSI matrices, the security analysis is similar to that in the relay-aided jamming scheme. Therefore, it can be checked that to ensure zero information leakage at R 1 and R 2 , when SNR goes to infinity, the phase duration should follow (17) and (19), respectively.
Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s 1 , 1 and s 2 , 1 at the receiver R 1 . This is enabled by the following cancellation:
y 1 P - II H r , 1 P - II Φ 1 y 1 P - I y 1 P - IV H r , 1 P - IV Π 2 y 1 P - III H r , 1 P - IV Π 1 H r , 2 P - II Φ 1 y 1 P - I = H 1 , 1 P - II H 2 , 1 P - II H r , 1 P - IV Π 1 H 1 , 2 P - II H r , 1 P - IV Π 1 H 2 , 2 P - II H 1 s 1 , 1 s 2 , 1 ,
where the rank of matrix H 1 is min { N 1 τ 2 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 , ( M 1 + M 2 ) τ 2 , R τ 2 } , and the reason is given in Appendix C. Since min { M 1 + M 2 , R , N 1 + N 2 } τ 2 data symbols for R 1 are transmitted, to ensure the decoding, we shall follow that
min { M 1 + M 2 , R , N 1 + N 2 } τ 2 min { N 1 τ 2 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 } .
If M 1 + M 2 N 1 + N 2 , (49) simplifies to the following:
τ 2 τ 4 min { N 1 , R } min { M 1 + M 2 N 1 , R N 1 } .
Otherwise, if N 1 + N 2 < M 1 + M 2 , (49) simplifies to the following:
τ 2 τ 4 min { N 1 , R } min { N 2 , R N 1 } .
Combining (50) and (51), we have the following:
τ 2 τ 4 min { N 1 , R } min { M 1 + M 2 N 1 , N 2 , R N 1 } .
Then, multiplying (52) by (19), we have the following:
τ 1 τ 4 min { N 1 , R } N 2 min { M 1 + M 2 N 1 , N 2 , R N 1 } min { N 1 , R N 2 } .
Secondly, we need to verify the decoding of transmitted data symbols s 1 , 2 and s 2 , 2 at the receiver R 2 , which is enabled by the following cancellation:
y 2 P - III H r , 2 P - III Φ 2 y 2 P - I y 2 P - IV H r , 2 P - IV Π 1 y 2 P - II H r , 2 P - IV Π 2 H r , 1 P - III Φ 2 y 2 P - I = H 1 , 2 P - III H 2 , 2 P - III H r , 2 P - IV Π 2 H 1 , 1 P - III H r , 2 P - IV Π 2 H 2 , 1 P - III H 2 s 1 , 2 s 2 , 2 ,
where the rank of matrix H 2 is min { N 2 τ 3 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 3 , ( M 1 + M 2 ) τ 3 , R τ 3 } , and the reason is given in Appendix C. Since min { M 1 + M 2 , R , N 1 + N 2 } τ 3 data symbols for R 2 are transmitted, to ensure the decoding, we shall follow that
min { M 1 + M 2 , R , N 1 + N 2 } τ 3 min { N 2 τ 3 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 3 } .
If M 1 + M 2 N 1 + N 2 , (55) simplifies to the following:
τ 3 τ 4 min { N 1 , R } min { M 1 + M 2 N 2 , R N 2 } .
Otherwise, if N 1 + N 2 < M 1 + M 2 , (49) simplifies to the following:
τ 3 τ 4 min { N 1 , R } min { N 1 , R N 2 } .
Combining (56) and (57), we have the following:
τ 3 τ 4 min { N 1 , R } min { M 1 + M 2 N 2 , N 1 , R N 2 } .
Then, multiplying (58) by (17), we have the following:
τ 1 τ 4 min { N 1 , R } N 1 min { M 1 + M 2 N 2 , N 1 , R N 2 } min { N 2 , R N 1 } .
Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of min { M 1 + M 2 , R , N 1 + N 2 } ( τ 2 + τ 3 ) data symbols over τ 1 + τ 2 + τ 3 + τ 4 time slots. This implies that the achievable sum-SDoF can be expressed as min { M 1 + M 2 , R , N 1 + N 2 } ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) . According to the security and decoding analysis, the achievable sum-SDoF of proposed relay-aided jamming and two-receiver IA scheme is calculated through the following:
  • If N 2 < R , we substitute (17), (19), and (53) with equality or (59) with equality into ( min { M 1 + M 2 , R , N 1 + N 2 } ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) to derive the exact achievable sum-SDoF.
  • If N 1 < R N 2 , we substitute (17), τ 2 = 0 , and (59) with equality into min { M 1 + M 2 , R , N 1 + N 2 } ( τ 2 + τ 3 ) / ( τ 1 + τ 2 + τ 3 + τ 4 ) to derive the exact achievable sum-SDoF.
  • If R N 1 , we cannot ensure zero information leakage; hence, achievable sum-SDoF is zero.
The achievable sum-SDoF of proposed relay-aided jamming and two-receiver IA scheme is given in (4) for N 2 < M 1 + M 2 & N 2 < R Case, N 2 < M 1 + M 2 & N 1 < R N 2 Case, and R N 1 Case.

5. Conclusions

We studied the sum-SDoF of the multiple-antenna full-duplex relay-aided MIMO XCCM with arbitrary antenna configurations, where there is no CSI at two transmitters and delayed CSI at the relay. To establish a sum-SDoF lower bound, we designed three transmission schemes. For the proposed schemes, full-duplex relay was utilized to receive the data symbol signals meanwhile transmit jamming signals, as this method can increase the transmission efficiency in contrast to half-duplex systems. We also derived a sum-SDoF upper bound. We characterized the sum-SDoF for 2 N R and N M . We showed that the derived sum-SDoF lower bound can be higher than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT for 2 N R and M < N , which is not attained by the MIMO XCCM with no CSIT. Therefore, a multiple-antenna full-duplex relay with delayed CSI is beneficial for the MIMO XCCM with no CSIT from the SDoF perspective. In the future, there are several directions to extend this work, which are as follows: (1) a better sum-SDoF upper bound; (2) the impact of cognitive messages at transmitters/receivers; (3) MIMO X networks with more than two receivers; (4) the impact of imperfect self-interference cancellation on sum-SDoF characterization; and (5) the analysis of error performance of proposed schemes for finite SNR.

Author Contributions

Conceptualization, T.Z. and G.C.; Formal analysis, T.Z. and S.W.; Methodology, T.Z.; Supervision, R.W.; Writing—original draft, T.Z. and G.C.; Writing—review and editing, S.W., G.C. and R.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the China Postdoctoral Science Foundation under grant no. 2021M691453, the National Natural Science Foundation of China: 61771232, 62001203.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest

Appendix A. The Rank of Matrices A2, B2

The matrix A 2 can be decomposed into the following:
I N 1 τ 1 0 H r , 1 P - II Φ 1 0 0 I N 1 τ 3 A 2 , 1 H r , 1 P - I H r , 1 P - III Φ 2 H r , 2 P - I A 2 , 2 ,
where the rank of matrix A 2 , 1 is N 1 ( τ 1 + τ 3 ) by Gaussian elimination, and the rank of matrix A 2 , 2 is min { N 1 τ 1 + min { R , N 1 } τ 3 , ( N 1 + N 2 ) τ 1 , R τ 1 } , due to RK H r , 1 P - I = min { N 1 , R } τ 1 , RK H r , 2 P - I = min { N 2 , R } τ 1 , RK Φ 2 = min { R τ 3 , N 2 τ 1 } , and RK H r , 1 P - III = min { R , N 1 } τ 3 . Therefore, the rank of matrix A 2 is min { N 1 τ 1 + min { R , N 1 } τ 3 , ( N 1 + N 2 ) τ 1 , R τ 1 } .
The matrix B 2 can be decomposed into the following:
I N 2 τ 1 0 0 I N 2 τ 2 H r , 2 P - III Φ 2 0 B 2 , 1 H r , 2 P - I H r , 2 P - II Φ 1 H r , 1 P - I B 2 , 2 ,
where the rank of matrix B 2 , 1 is N 2 ( τ 1 + τ 2 ) by Gaussian elimination, and the rank of matrix B 2 , 2 is min { N 2 τ 1 + min { R , N 2 } τ 2 , ( N 1 + N 2 ) τ 1 , R τ 1 } , due to RK H r , 2 P - I = min { N 2 , R } τ 1 , RK H r , 1 P - I = min { N 1 , R } τ 1 , RK Φ 1 = min { R τ 2 , N 1 τ 1 } , and RK H r , 2 P - II = min { R , N 2 } τ 2 . Therefore, the rank of matrix B 2 is min { N 2 τ 1 + min { R , N 2 } τ 2 , ( N 1 + N 2 ) τ 1 , R τ 1 } .

Appendix B. The Rank of Matrices H1

The matrix H 1 can be decomposed into the following:
I N 1 τ 2 0 0 H r , 1 P - IV Π 1 H 1 , 1 H 1 , 1 P - II H 2 , 1 P - II H 1 , 2 P - II H 2 , 2 P - II H 1 , 2 ,
where the rank of matrix H 1 , 1 is min { N 1 τ 2 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 } , due to RK H r , 1 P - IV = min { N 1 , R } τ 4 and RK Π 1 = min { N 2 τ 2 , min { N 1 , R } τ 4 } , and the rank of matrix H 1 , 2 is min { ( N 1 + N 2 ) τ 2 , ( M 1 + M 2 ) τ 2 , R τ 2 } , due to RK H 1 , j P - II = min { N j , M 1 } τ 2 , j = 1 , 2 , and RK H 2 , j P - II = min { M 2 , R M 1 , N 1 + N 2 M 1 , N j } τ 2 , j = 1 , 2 . Therefore, the rank of matrix H 1 follows min { N 1 τ 2 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 , ( M 1 + M 2 ) τ 2 , R τ 2 } . With N 1 < M 1 + M 2 N 2 , the rank of matrix H 1 is min { N 1 τ 2 + min { N 1 τ 4 , R τ 4 } , ( M 1 + M 2 ) τ 2 , R τ 2 } .

Appendix C. The Rank of Matrices H1′ and H2

The rank of matrix H 1 can be decomposed into the following:
I N 1 τ 2 0 0 H r , 1 P - IV Π 1 H 1 , 1 H 1 , 1 P - II H 2 , 1 P - II H 1 , 2 P - II H 2 , 2 P - II H 1 , 2 ,
where the rank of matrix H 1 , 1 is min { min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 } , due to RK H r , 1 P - IV = min { N 1 , R } τ 4 and RK Π 1 = min { N 2 τ 2 , min { N 1 , R } τ 4 } , and the rank of matrix H 1 , 2 is min { ( N 1 + N 2 ) τ 2 , ( M 1 + M 2 ) τ 2 , R τ 2 } , due to RK H 1 , j P - II = min { N j , M 1 } τ 2 , j = 1 , 2 , and RK H 2 , j P - II = min { M 2 , R M 1 , N 1 + N 2 M 1 , N j } τ 2 , j = 1 , 2 . Therefore, the rank of matrix H 1 is min { N 1 τ 2 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 2 , ( M 1 + M 2 ) τ 2 , R τ 2 } .
The rank of matrix H 2 can be decomposed into the following:
I N 2 τ 3 0 0 H r , 2 P - IV Π 2 H 2 , 1 H 1 , 1 P - III H 2 , 1 P - III H 1 , 2 P - III H 2 , 2 P - III H 2 , 2 ,
where the rank of matrix H 2 , 1 is min { min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 3 } , due to RK H r , 2 P - IV = min { N 1 , R } τ 4 and RK Π 2 = min { N 1 τ 3 , min { N 1 , R } τ 4 } , and the rank of matrix H 2 , 2 is min { ( N 1 + N 2 ) τ 3 , ( M 1 + M 2 ) τ 3 , R τ 3 } , due to RK H 1 , j P - III = min { N j , M 1 } τ 3 , j = 1 , 2 , and RK H 2 , j P - III = min { M 2 , R M 1 , N 1 + N 2 M 1 , N j } τ 3 , j = 1 , 2 . Therefore, the rank of matrix H 2 is min { N 2 τ 3 + min { N 1 , R } τ 4 , ( N 1 + N 2 ) τ 3 , ( M 1 + M 2 ) τ 3 , R τ 3 } .

References

  1. Bloch, M.; Günlü, O.; Yener, A.; Oggier, F.; Poor, H.V.; Sankar, L.; Schaefer, R.F. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. IEEE J. Sel. Areas Inf. Theory 2021, 2, 5–22. [Google Scholar] [CrossRef]
  2. Cao, P.L.; Oechtering, T.J. Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. IEEE Trans. Inf. Forensics Secur. 2020, 15, 829–838. [Google Scholar] [CrossRef]
  3. Wang, S.; Wen, M.; Xia, M.; Wang, R.; Hao, Q.; Wu, Y.C. Angle Aware User Cooperation for Secure Massive MIMO in Rician Fading Channel. IEEE J. Sel. Areas Commun. 2020, 38, 2182–2196. [Google Scholar] [CrossRef]
  4. Xie, J.; Ulukus, S. Secure Degrees of Freedom of One-Hop Wireless Networks. IEEE Trans. Inf. Theory 2014, 60, 3359–3378. [Google Scholar] [CrossRef] [Green Version]
  5. Banawan, K.; Ulukus, S. Secure degrees of freedom of the Gaussian MIMO interference channel. In Proceedings of the 2015 49th Asilomar Conference Signals, Systems Computers, Pacific Grove, CA, USA, 8–11 November 2015; pp. 40–44. [Google Scholar] [CrossRef]
  6. Banawan, K.; Ulukus, S. Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel. IEEE Trans. Inf. Theory 2019, 65, 444–461. [Google Scholar] [CrossRef]
  7. Wang, Q.; Wang, Y.; Wang, H. Secure Degrees of Freedom of the Asymmetric Gaussian MIMO Interference Channel. IEEE Trans. Veh. Technol. 2017, 66, 8001–8009. [Google Scholar] [CrossRef]
  8. Wang, Z.; Xiao, M.; Skoglund, M.; Poor, H.V. Secure Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment. IEEE Trans. Commun. 2015, 63, 2632–2646. [Google Scholar] [CrossRef] [Green Version]
  9. Wang, Q.; Zhang, T.; Dong, D.; Li, X. Secure Degrees of Freedom of Rank-Deficient BCCM and Rank-Deficient ICCM. IEEE Trans. Veh. Technol. 2020, 69, 4033–4041. [Google Scholar] [CrossRef]
  10. Yang, S.; Kobayashi, M.; Piantanida, P.; Shamai, S. Secrecy Degrees of Freedom of MIMO Broadcast Channels with Delayed CSIT. IEEE Trans. Inf. Theory 2013, 59, 5244–5256. [Google Scholar] [CrossRef] [Green Version]
  11. Mukherjee, P.; Tandon, R.; Ulukus, S. Secure Degrees of Freedom Region of the Two-User MISO Broadcast Channel with Alternating CSIT. IEEE Trans. Inf. Theory 2017, 63, 3823–3853. [Google Scholar] [CrossRef]
  12. Lashgari, S.; Avestimehr, A.S. Secrecy DoF of Blind MIMOME Wiretap Channel with Delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2018, 13, 478–489. [Google Scholar] [CrossRef]
  13. Awan, Z.H.; Sezgin, A. Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology. IEEE J. Sel. Areas Inf. Theory 2021, 2, 121–138. [Google Scholar] [CrossRef]
  14. Zhang, T.; Ching, P.C. Secure MIMO Interference Channel with Confidential Messages and Delayed CSIT. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 2437–2441. [Google Scholar]
  15. Zhang, T.; Wang, R. Secure Degrees-of-Freedom of the MIMO X Channel with Delayed CSIT. IEEE Wirel. Commun. Lett. 2021, 10, 1319–1323. [Google Scholar] [CrossRef]
  16. Zhang, T.; Xu, Y.; Wang, S.; Wen, M.; Wang, R. On Secure Degrees of Freedom of the MIMO Interference Channel with Local Output Feedback. IEEE Internet Things J. 2021, 8, 15334–15348. [Google Scholar] [CrossRef]
  17. Zaidi, A.; Awan, Z.H.; Shamai, S.; Vandendorpe, L. Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1760–1774. [Google Scholar] [CrossRef] [Green Version]
  18. Wang, Z.; Xiao, M.; Wang, C.; Skoglund, M. Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT. IEEE Wirel. Commun. Lett. 2013, 2, 1–4. [Google Scholar] [CrossRef] [Green Version]
  19. Shin, W.; Lee, B.; Shim, B.; Lee, J. A MIMO Relay with Delayed Feedback Can Improve DoF in K- User MISO Interference Channel with No CSIT. IEEE Trans. Veh. Technol. 2016, 65, 10188–10192. [Google Scholar] [CrossRef]
  20. Shin, W.; Lee, N.; Yang, H.; Lee, J. Relay-Aided Successive Aligned Interference Cancellation for Wireless X Networks with Full-Duplex Relays. IEEE Trans. Veh. Technol. 2017, 66, 421–432. [Google Scholar] [CrossRef]
  21. Tian, Y.; Yener, A. Guiding Blind Transmitters: Degrees of Freedom Optimal Interference Alignment Using Relays. IEEE Trans. Inf. Theory 2013, 59, 4819–4832. [Google Scholar] [CrossRef] [Green Version]
  22. Shin, W.; Lee, N.; Lee, J.; Poor, H.V. Relay-Aided Space-Time Beamforming for Interference Networks with Partial Channel Knowledge. IEEE Trans. Signal Process. 2016, 64, 5119–5130. [Google Scholar] [CrossRef]
  23. Wang, Z.; Xiao, M.; Skoglund, M. Secrecy Degrees of Freedom of the 2 × 2 × 2 Interference Channel with Delayed CSIT. IEEE Wirel. Commun. Lett. 2014, 3, 341–344. [Google Scholar] [CrossRef]
  24. Debaillie, B.; van den Broek, D.J.; Lavín, C.; van Liempd, B.; Klumperink, E.A.M.; Palacios, C.; Craninckx, J.; Nauta, B.; Pärssinen, A. Analog/RF Solutions Enabling Compact Full-Duplex Radios. IEEE J. Sel. Areas Commun. 2014, 32, 1662–1673. [Google Scholar] [CrossRef]
  25. Yilan, M.; Ayar, H.; Nawaz, H.; Gurbuz, O.; Tekin, I. Monostatic Antenna In-Band Full Duplex Radio: Performance Limits and Characterization. IEEE Trans. Veh. Technol. 2019, 68, 4786–4799. [Google Scholar] [CrossRef]
  26. Zhang, Z.; Long, K.; Vasilakos, A.V.; Hanzo, L. Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions. Proc. IEEE 2016, 104, 1369–1409. [Google Scholar] [CrossRef] [Green Version]
  27. Duarte, M.; Dick, C.; Sabharwal, A. Experiment-Driven Characterization of Full-Duplex Wireless Systems. IEEE Trans. Wirel. Commun. 2012, 11, 4296–4307. [Google Scholar] [CrossRef] [Green Version]
  28. Chung, M.; Sim, M.S.; Kim, J.; Kim, D.K.; Chae, C.b. Prototyping real-time full duplex radios. IEEE Commun. Mag. 2015, 53, 56–63. [Google Scholar] [CrossRef]
  29. Duarte, M.; Sabharwal, A.; Aggarwal, V.; Jana, R.; Ramakrishnan, K.K.; Rice, C.W.; Shankaranarayanan, N.K. Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks. IEEE Trans. Veh. Technol. 2014, 63, 1160–1177. [Google Scholar] [CrossRef] [Green Version]
  30. Telatar, E. Capacity of multi-antenna Gaussian channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
Figure 1. Illustration of the scenario, where there are delayed CSI at the relay and no CSI at two transmitters.
Figure 1. Illustration of the scenario, where there are delayed CSI at the relay and no CSI at two transmitters.
Entropy 23 01484 g001
Figure 2. SDoF comparison with existing results [14,15,16,17] when 2 N R .
Figure 2. SDoF comparison with existing results [14,15,16,17] when 2 N R .
Entropy 23 01484 g002
Figure 3. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 3 , 2 , 3 ) .
Figure 3. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 3 , 2 , 3 ) .
Entropy 23 01484 g003
Figure 4. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 2 , 2 , 3 ) .
Figure 4. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 2 , 2 , 3 ) .
Entropy 23 01484 g004
Figure 5. ( N 1 , N 2 , M 1 , M 2 ) = ( 4 , 5 , 2 , 3 ) .
Figure 5. ( N 1 , N 2 , M 1 , M 2 ) = ( 4 , 5 , 2 , 3 ) .
Entropy 23 01484 g005
Figure 6. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 3 , 4 , 5 ) .
Figure 6. ( N 1 , N 2 , M 1 , M 2 ) = ( 2 , 3 , 4 , 5 ) .
Entropy 23 01484 g006
Figure 7. Flowchart of the relay-aided jamming scheme.
Figure 7. Flowchart of the relay-aided jamming scheme.
Entropy 23 01484 g007
Figure 8. Flowchart of the relay-aided jamming and one-receiver IA scheme.
Figure 8. Flowchart of the relay-aided jamming and one-receiver IA scheme.
Entropy 23 01484 g008
Figure 9. Flowchart of the relay-aided jamming and two-receiver IA scheme.
Figure 9. Flowchart of the relay-aided jamming and two-receiver IA scheme.
Entropy 23 01484 g009
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, T.; Chen, G.; Wang, S.; Wang, R. Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel. Entropy 2021, 23, 1484. https://doi.org/10.3390/e23111484

AMA Style

Zhang T, Chen G, Wang S, Wang R. Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel. Entropy. 2021; 23(11):1484. https://doi.org/10.3390/e23111484

Chicago/Turabian Style

Zhang, Tong, Gaojie Chen, Shuai Wang, and Rui Wang. 2021. "Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel" Entropy 23, no. 11: 1484. https://doi.org/10.3390/e23111484

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop