Skip to main content
Entropy logoLink to Entropy
. 2021 Nov 10;23(11):1484. doi: 10.3390/e23111484

Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel

Tong Zhang 1, Gaojie Chen 2, Shuai Wang 1, Rui Wang 1,*
Editors: Eirik Rosnes, Alexandre Graell i Amat, Hsuan-Yin Lin
PMCID: PMC8621486  PMID: 34828182

Abstract

In this article, the sum secure degrees-of-freedom (SDoF) of the multiple-input multiple-output (MIMO) X channel with confidential messages (XCCM) and arbitrary antenna configurations is studied, where there is no channel state information (CSI) at two transmitters and only delayed CSI at a multiple-antenna, full-duplex, and decode-and-forward relay. We aim at establishing the sum-SDoF lower and upper bounds. For the sum-SDoF lower bound, we design three relay-aided transmission schemes, namely, the relay-aided jamming scheme, the relay-aided jamming and one-receiver interference alignment scheme, and the relay-aided jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. Moreover, the security and decoding of each scheme are analyzed. The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (CSIT). As a result, the sum-SDoF lower and upper bounds are derived, and the sum-SDoF is characterized when the relay has sufficiently large antennas. Furthermore, even assuming no CSI at two transmitters, our results show that a multiple-antenna full-duplex relay with delayed CSI can elevate the sum-SDoF of the MIMO XCCM. This is corroborated by the fact that the derived sum-SDoF lower bound can be greater than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT.

Keywords: delayed CSIT, information-theoretical security, MIMO X channel, MIMO relay, secure degrees-of-freedom

1. Introduction

The deployment of 5G and all of the connections to 6G around the world have all exacerbated the concerns for information-theoretic security in mobile communication networks [1,2,3]. The secure degrees-of-freedom (SDoF) of multiple-input multiple-output (MIMO) networks with confidential messages and perfect channel state information at the transmitter (CSIT) was studied in [4,5,6,7,8,9]. For the K-user single-input single-output (SISO) interference channel with confidential messages (ICCM), the sum-SDoF was characterized in [4]. For the multiple-input multiple-output (MIMO) ICCM, under symmetric antenna configurations, the sum-SDoF was derived in [5,6]. Then, the sum-SDoF of the MIMO ICCM with arbitrary antenna configurations was characterized in [7]. The X network with confidential messages has a more general message setting than that in ICCM. For the X network with confidential messages, the sum-SDoF was studied in [8]. The sum-SDoF of rank-deficient ICCM and broadcast channel with confidential messages (BCCM) was characterized in [9].

For the fast-fading wireless channel, the CSIT can be delayed, that is, mismatching with current CSI but matching with past CSI. Under this imperfect setting, i.e., delayed CSIT, the research of SDoF was stemmed from [10], where under arbitrary antenna configurations, the SDoF region of two-user MIMO BCCM and delayed CSIT was characterized. Thereafter, the SDoF regions of two-user multiple-input single-output (MISO) BCCM with alternating CSIT was derived in [11]. The linear SDoF of blind multi-user MISO wiretap channel with delayed CSIT was characterized in [12]. Recently, in [13], the interplay of link connectivity and alternating CSIT in MISO BCCM was studied from the SDoF perspective. Aside from the BCCM, there are many efforts devoted to investigate the SDoF of two-user interference networks with delayed feedback [14,15,16,17]. In [14], under symmetric antenna configurations, a sum-SDoF lower bound for MIMO ICCM with delayed CSIT was obtained. In [15], under symmetric antenna configurations, a higher sum-SDoF lower bound than that in [14] was derived for MIMO XCCM with delayed CSIT, considering two more confidential messages. In [16], under symmetric antenna configurations, the sum-SDoF of MIMO ICCM with local output feedback was studied. In [17], under symmetric antenna configurations, the SDoF region of MIMO XCCM with output feedback and delayed CSIT was characterized, which has the highest sum-SDoF over that in [14,15,16].

Even with delayed CSI, it is shown in [18,19,20,21,22] that the decode-and-forward relay (for brevity, we henceforth use “relay” to stand for “decode-and-forward relay”) can assist the communication and enhance the degrees-of-freedom (DoF) of MIMO networks. When there is no CSIT, reference [19,20,21,22] considered the assistance of the relay with delayed CSI. In [19], a multiple-antenna relay with delayed CSI elevated the DoF of K-user SISO interference channel. In [21], a multiple-antenna relay with delayed CSI elevated the DoF of the SISO X channel. For the MIMO X channel, it is shown in [22] that a multiple-antenna relay with delayed CSI was able to enhance the DoF. As for X networks, L multiple-antenna full-duplex relays enhanced the sum-DoF of the 2×K X networks, as shown in [20]. Furthermore, having the security constraints, only the work in [23] addressed the sum-SDoF characterization of 2×2×2 SISO ICCM with delayed CSIT.

However, to summarize, none of existing works considered the SDoF of the relay-aided MIMO XCCM, where there is no CSI at two transmitters and a delayed CSI at the relay, such as the CSI model in [20,22]. For the first time, we consider the SDoF problem of such a system. Specifically, we consider a multiple-antenna full-duplex relay with delayed CSI in the MIMO XCCM with arbitrary antenna configurations, where there is no CSI at two transmitters. However, there are two major challenges. The first one is how to design a transmission scheme with security guarantee and transmission efficiency. The second one is how to create an upper bound for the sum-SDoF in a non-trivial way. We address these two problems in the following manner: We propose the relayed-aided jamming and interference alignment (IA) design for transmission scheme, which simultaneously fulfills security guarantee and transmission efficiency. In addition, we leverage the existing SDoF region of MIMO BCCM to design a sum-SDoF upper bound. The sum-SDoF lower and upper bounds are tight for partial antenna configurations, and thus, the sum-SDoF is derived therein. The main contributions of this paper are summarized as follows:

  • To derive the sum-SDoF lower bound, under arbitrary antenna configurations, we propose three relay-aided transmission schemes, whose achievable sum-SDoF serves as the sum-SDoF lower bound. Specifically, we propose the relay-aided jamming scheme, and the relay-aided jamming and one-receiver IA scheme, and the relay-aided jamming and two-receiver IA scheme, where each scheme corresponds to one case of antenna configurations. In each scheme, the security and decoding are analyzed.

  • To obtain the sum-SDoF upper bound, which does not appear in the existing literature and is non-trivial, we first treat two transmitters and the relay as a co-located transmitter, which is an enhanced scenario. Thereafter, we apply the results of the existing SDoF region of two-user MIMO BCCM, which is proven in [10], into this enhanced scenario.

  • Our results show that if the full-duplex relay has double antennas of the receiver, the proposed sum-SDoF lower bound is not less than the sum-SDoF in existing two-user interference networks with delayed feedback in [14,15,16,17], and can be higher than the sum-SDoF of MIMO X channel with output feedback and delayed CSIT in [17]. Moreover, the proposed sum-SDoF lower bound matches with the sum-SDoF upper bound for partial antenna configurations, characterizing the sum-SDoF for these antenna configurations.

Notations: The identity matrix of dimensions m is denoted by Im. The block-diagonal matrix with blocks A and B is denoted by BD{A,B}. The rank of matrix A is denoted by RKA. The log is referred to log2. [x]+=max{x,0}.

Organizations: The rest of this paper is organized as follows: The system model is defined in Section 2. The main results and discussions are presented in Section 3. We prove the Theorem 1 in Section 4. We draw our conclusions in Section 5.

2. System Model

We consider the MIMO XCCM aided by a R-antennas full-duplex (the experimental studies and prototypes on full-duplex techniques can be found in [24,25,26,27,28,29], where the self-interference can be suppressed by radio frequency, analogue, and digital cancellations to achieve the noise floor; the details of self-interference suppression are out of the scope of this work) relay, where two transmitters (denoted by T1 and T2) have M1 and M2 antennas, respectively, and two receivers (denoted by R1 and R2) have N1 and N2 antennas, respectively, as shown in Figure 1. Namely, the antenna configurations are arbitrary. Without loss of generality, we have N1N2 by denoting the receiver with most antennas by R2. The Ti has a confidential message Wi,j for Rj, where i,j=1,2. The CSI matrix from T1,T2 and the relay to R1,R2 and the relay at time slot t is denoted by Hi,j[t],i,j=1,2,r, respectively, where Hi,j[t] is time-varying and independently distributed across space and time. There is no CSI at two transmitters. At the time slot t, both R1 and R2 have the instantaneous knowledge of Hi,1 and Hi,2, i=1,2,r; the relay has the instantaneous knowledge of Hi,r,i=1,2. Moreover, due to feedback delay (the CSI feedback link is assumed to be additional, compared with the data/artificial noise transmission link), the past CSI matrices Ht1{Hi,j[tτ],t>τ1,i=1,2,r;j=1,2} are available at the relay. Note that the definition of CSI in this paper is the same as that defined in [21,22].

Figure 1.

Figure 1

Illustration of the scenario, where there are delayed CSI at the relay and no CSI at two transmitters.

A code {2nRi,j(η),i,j=1,2} with achievable secrecy rates Ri,j(η),i,j=1,2 is defined below, where η denotes the signal-to-noise ratio (SNR). The communication process takes n channel uses (time slots) with confidential messages Wi,j=[1,,2nRi,j(η)] (from Ti to Rj). At the time slot t, a stochastic encoder fi,j(·) at the Ti encodes confidential message Wi,j to an input signal xi,j[t], i.e., xi,j[t]=fi,j(Wi,j). At the time slot t, a stochastic encoder fr(·) at the full-duplex relay encodes the collection of received signals yrt[yr[1],,yr[t]] and delayed CSI Ht1 to an input signal xr,jt, i.e., xr,j[t]=fr(yrt,Ht1). At the time slot n, a decoder gi,j(·) at the Rj decodes the output signals yjn and CSI matrices Hn to an estimated message W^i,j, i.e., W^i,j=gi,j(yjn,Hn). According to [10], the secure code satisfies the reliability criterion,

Pr[Wi,jW^i,j]ϵn,i,j=1,2, (1)

and the weak secrecy criterion,

1nI(Wi,1;y2n)ϵn, (2a)
1nI(Wi,2;y1n)ϵn,i=1,2, (2b)

where ϵn0 as n1.

The sum of the secure channel capacity is defined as Cs=maxi=12j=12Ri,j(η). The sum-SDoF is a first-order approximation of the secure sum-capacity in the high SNR regime and defined as follows:

i=12j=12di,j=limη1Cslogη. (3)

3. Main Results and Discussions

Theorem 1.

(sum-SDoF lower bound under arbitrary antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF lower bound under arbitrary antenna configurations is given as follows:

i=12j=12di,j(M1+M2)(x1+x2)1+x1+x2,M1+M2N1&N2<R,min{M1+M2,R}x1+(M1+M2)x21+x1+x2+x3,N1<M1+M2N2&N2<R,(M1+M2)x11+x1,M1+M2N2&N1<RN2,min{M1+M2,R,N1+N2}(x1+x2)1+x1+x2+max{x4,x5},N2<M1+M2&N2<R,min{M1+M2,R,N1+N2}x11+x1+x5,N2<M1+M2&N1<RN2,0,RN1, (4)

where

x1=min{N2,RN1}N1, (5a)
x2=min{N1,RN2}N2, (5b)
x3=min{M1+M2N1,RN1}min{N1,RN2}min{N1,R}N2, (5c)
x4=min{M1+M2N1,N2,RN1}min{N1,RN2}min{N1,R}N2, (5d)
x5=min{M1+M2N2,N1,RN2}min{N2,RN1}min{N1,R}N1. (5e)

Proof. 

Please refer to Section 4. □

Remark 1.

(sum-SDoF lower bound under symmetric antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF lower bound under symmetric antenna configurations is given as follows by setting N1=N2=N and M1=M2=M in Theorem 1:

i=12j=12di,j4M3,2M<N&2N<R,4M(RN)2RN,2M<N&N<R2N,2Nmin{M,N}min{M+N,2N},N2M&2N<R,2Nmin{2M,R}(RN)N2+min{2M+N,R+N}(RN),N2M&N<R2N,0,RN. (6)

Proposition 1.

(sum-SDoF upper bound under arbitrary antenna configurations). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF upper bound under arbitrary antenna configurations is given by the following:

i=12j=12di,jN1min{M1+M2+RN2,N1}+N2min{M1+M2+RN1,N2}min{M1+M2+R,N1+N2}. (7)

Proof. 

We enhance the channel by supposing that the two transmitters and the relay constitute a co-located transmitter. Based on ([10], Theorem 3), Proposition 1 is proven. □

Proposition 2.

(antenna configurations for sum-SDoF characterization). For the relay-aided MIMO XCCM with delayed CSI at the multiple-antenna full-duplex relay and no CSI at two transmitters, the sum-SDoF is characterized by the following:

i=12j=12di,j=N,NM&2NR (8)

Proof. 

Following Theorem 1 and Proposition 1, we can verify the match of the sum-SDoF upper and lower bounds for NM and 2NR. Therefore, the value of sum-SDoF is N for NM and 2NR. □

Remark 2.

(advantages over existing results in two-user MIMO interference networks with delayed feedback [14,15,16,17]): Under symmetric antenna configurations, the advantages of the derived results over existing results in two-user MIMO interference networks with delayed feedback [14,15,16,17] are shown in Figure 2. In particular, Figure 2 shows that if 2NR, the derived sum-SDoF lower bound is higher than the sum-SDoF of MIMO XCCM with output feedback and delayed CSIT in [17] for M<N, the sum-SDoF of MIMO ICCM with local output feedback in [16] for M<2N, the sum-SDoF lower bound of MIMO XCCM with delayed CSIT in [15] and the sum-SDoF lower bound of MIMO ICCM with delayed CSIT in [14] for all antenna configurations. The gain of our lower bound comes from the full-duplex relay taking over the artificial noise and interference transmission from the two transmitters.

Figure 2.

Figure 2

SDoF comparison with existing results [14,15,16,17] when 2NR.

Remark 3.

(numerical calculation under arbitrary antenna configurations). To illustrate the proposed upper and lower bounds for arbitrary antenna configurations, we have shown four examples in Figure 3, Figure 4, Figure 5 and Figure 6, respectively. From Figure 3 and Figure 4, it can be seen that the smaller difference between N1 and N2 leads to the smaller gap between the proposed upper and lower bounds, when M1,M2 are fixed and R is sufficiently large. Additionally, a higher N2 leads to a higher value of the proposed lower bound, when N1,M1,M2 are fixed. From Figure 5 and Figure 6, it can be seen that when N1+N2 is less than M1+M2 and R is sufficiently large, the gap between the proposed upper and lower bounds becomes smaller.

Figure 3.

Figure 3

(N1,N2,M1,M2)=(2,3,2,3).

Figure 4.

Figure 4

(N1,N2,M1,M2)=(2,2,2,3).

Figure 5.

Figure 5

(N1,N2,M1,M2)=(4,5,2,3).

Figure 6.

Figure 6

(N1,N2,M1,M2)=(2,3,4,5).

4. Proof of Theorem 1: Relay-Aided Transmission Scheme Design

4.1. M1+M2N1 Case: The Relay-Aided Jamming Scheme

When M1+M2N1, each receiver can immediately decode the transmitted data symbols, which implies there is no need for IA. At the same time, the relay can send artificial noise symbols to ensure secure data symbol transmission. Therefore, we propose a relay-aided jamming scheme with three phases, where the relay cooperates with two transmitters for artificial noise transmission. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R1; meanwhile, the output signal of Phase I at R1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R2; meanwhile, the output signal of Phase I at R2 is reconstructed and re-transmitted by relay. The flowchart of this scheme is illustrated in Figure 7. Firstly, we define the holistic CSI matrices for this scheme as follows:

Hi,jP-IBD{Hi,j[1],,Hi,j[τ1]},Hi,jP-IIBD{Hi,j[τ1+1],,Hi,j[τ1+τ2]},Hi,jP-IIIBD{Hi,j[τ1+τ2+1],,Hi,j[τ1+τ2+τ3]},

where i,j=1,2,r, and the value of τ1, τ2, and τ3 is determined based on the security analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ1CRτ2×N1τ1 and Φ2CRτ3×N2τ1, whose items follow complex Gaussian CN(0,1). Next, the proposed three-phase transmission scheme and related analysis are elaborated.

Figure 7.

Figure 7

Flowchart of the relay-aided jamming scheme.

Phase I (Jamming by the Relay): This phase aims at sending Rτ1 artificial noise symbols from the relay in τ1 time slots by R antennas. Denote the artificial noise vector sent by R antennas in τ1 time slots as uCRτ1. The received signals of Phase-I at two receivers are expressed as follows:

yjP-I=Hr,jP-Iu,j=1,2. (9)

Note that additive white Gaussian noise (AWGN) is omitted, due to the SDoF analysis. The CSI matrices of Phase I return to the relay at the end of Phase I.

Phase II (joint data transmission for R1 by two transmitters and Phase I output transmission by the relay): We aim at sending M1τ2 data symbols to R1 from T1 and M2τ2 data symbols to R1 from T2 in τ2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at receivers, i.e., y1P-I and y2P-I. At each time slot, the data symbols for R1 are sent from two transmitters, and simultaneously, the Phase I output at R1 is sent from the relay. Denote the data symbols for R1 sent from T1 and T2 as s1,1CM1τ2 and s2,1CM2τ2, respectively. Therefore, the transmit signals of Phase II at two transmitters are expressed as follows:

xiP-II=si,1,i=1,2. (10)

The transmit signals of Phase-II at the relay are designed as follows:

xrP-II=Φ1y1P-I. (11)

The received signals of Phase-II at two receivers are written by the following:

yjP-II=H1,jP-IIs1,1+H2,jP-IIs2,1+Hr,jP-IIΦ1y1P-I,j=1,2. (12)

Phase III (joint data transmission for R2 by two transmitters and Phase I output transmission by the relay): This phase aims at sending M1τ3 data symbols to R2 from T1 and M2τ3 data symbols to R2 from T2 in τ3 time slots. At each time slot, the data symbols for R2 are sent from two transmitters, and simultaneously, the Phase I output at R2 is sent from the relay. Denote the data symbols for R2 sent from T1 and T2 as s1,2CM1τ3 and s2,2CM2τ3, respectively. Therefore, the transmit signals of Phase III at two transmitters are expressed as follows:

xiP-III=si,2,i=1,2. (13)

The transmit signals of Phase III at the relay are designed as follows:

xrP-III=Φ2y2P-I. (14)

The received signals of Phase III at two receivers are written by the following:

yjP-III=H1,jP-IIIs1,2+H2,jP-IIIs2,2+Hr,jP-IIIΦ2y2P-I,j=1,2. (15)

Security analysis: Firstly, we need to verify the zero information leakage at R1, when SNR goes to infinity. With y1[y1P-I;y1P-II;y1P-III], the information leakage is calculated as follows:

I(s1,2,s2,2;y1|Hn,s1,1,s2,1)(a)I(s1,2,s2,2,u;y1|Hn,s1,1,s2,1)I(u;y1|Hn,s1,1,s2,1,s1,2,s2,2)(b)I(Hr,1P-Iu,H1,1P-IIIs1,2+H2,1P-IIIs2,2+Hr,1P-IIIΦ2y2P-I;y1|Hn,s1,1,s2,1)I(u;y1|Hn,s1,1,s2,1,s1,2,s2,2)=(c)η1RKIN1τ10Hr,1P-IIΦ100IN1τ3A1logηRKHr,1P-IHr,1P-IIΦ1Hr,1P-IHr,1P-IIIΦ2Hr,2P-IA2logη=(d)N1(τ1+τ3)logηmin{N1τ1+min{R,N1}τ3,(N1+N2)τ1,Rτ1}logη, (16)

where the reason for each step is given as follows:

  • (a)

    Chain rule of mutual information.

  • (b)

    Applying the data processing inequality for the Markov chain (s1,2,s2,2,u)(Hr,1P-Iu, H1,1P-IIIs1,2+H2,1P-IIIs2,2+Hr,1P-IIIΦ2y2P-I)y1.

  • (c)

    When the input is the circularly symmetric complex Gaussian, according to [30], rewrite the mutual information into log|I+ηA1A1H|log|I+ηA2A2H|, and using ([10], Lemma 2), when SNR goes to infinity.

  • (d)

    The rank of matrix A1 is deduced by Gaussian elimination. The rank of matrix A2 is derived in Appendix A.

We shall ensure I(s1,2,s2,2;y1|Hn,s1,1,s2,1)=o(logη), or equivalently, (16) is zero. If N1<R, N1(τ1+τ3)=N1τ1+min{R,N1}τ3. If N1+N2R, we have N1(τ1+τ3)=(N1+N2)τ1. Otherwise, if N1<R<N1+N2, we have N1(τ1+τ3)=Rτ1. Those two equalities can be simplified to the following:

τ1τ3=N1min{N2,RN1}. (17)

Otherwise, if RN1, we cannot guarantee zero information leakage from transmitted data symbols s2,1,s2,1 to the undesired receiver R2, which implies τ3=0.

Secondly, we only need to verify the zero information leakage at the R2, when SNR goes to infinity. With y2[y2P-I;y2P-II;y2P-III], the information leakage is calculated as follows:

I(s1,1,s2,1;y2|Hn,s1,2,s2,2)(a)I(s1,1,s2,1,u;y2|Hn,s1,2,s2,2)I(u;y2|Hn,s1,1,s2,1,s1,2,s2,2)(b)I(Hr,2P-Iu,H1,2P-IIs1,1+H2,2P-IIs2,1+Hr,2P-IIΦ1y1P-I;y2|Hn,s1,2,s2,2)I(u;y2|Hn,s1,1,s2,1,s1,2,s2,2)=(c)η1RKIN2τ100IN2τ2Hr,2P-IIIΦ20B1logηRKHr,2P-IHr,2P-IIΦ1Hr,1P-IHr,2P-IIIΦ2Hr,2P-IB2logη=(d)N2(τ1+τ2)logηmin{N2τ1+min{R,N2}τ2,(N1+N2)τ1,Rτ1}logη, (18)

where the reason for each step is given as follows:

  • (a)

    Chain rule of mutual information.

  • (b)

    Applying the data processing inequality for the Markov chain (s1,1,s2,1,u)(Hr,2P-Iu, H1,2P-IIs1,1+H2,2P-IIs2,1+Hr,2P-IIΦ1y1P-I)y2.

  • (c)

    When the input is the circularly symmetric complex Gaussian, according to [30], and rewrite the mutual information into log|I+ηB1B1H|log|I+ηB2B2H|, and using ([10], Lemma 2), when SNR goes to infinity.

  • (d)

    The rank of matrix B1 is deduced by Gaussian elimination. The rank of matrix B2 is derived in Appendix A.

We shall ensure I(s1,1,s2,1;y2|Hn,s1,2,s2,2)=o(logη), or equivalently, (18) is zero. If N2<R, N2(τ1+τ2)N2τ1+min{R,N2}τ2. If N1+N2R, we have N2(τ1+τ2)=(N1+N2)τ1. Otherwise, if N2<R<N1+N2, we have N2(τ1+τ2)=Rτ1. Those two inequalities can be simplified to the following:

τ1τ2=N2min{N1,RN2}. (19)

If RN2, we cannot guarantee zero information leakage from transmitted data symbols s1,1,s1,2 to the undesired receiver R2, which implies τ2=0.

Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s1,1CM1τ2,s2,1CM2τ2 at R1, which is enabled by the following cancellation:

y1P-IIHr,1P-IIΦ1y1P-I=H1,1P-IIs1,1+H2,1P-IIs2,1, (20)

At each time slot, there are N1 observations at R1. Thus, we are able to decode M1 data symbols from T1 and M2 data symbols from T2, due to the setting, i.e., M1+M2N1. Therefore, R1 can decode (M1+M2)τ2 data symbols.

Secondly, we need to verify the decoding of transmitted data symbols s1,2CM1τ3,s2,2CM2τ3 at R2, which is enabled by the following cancellation:

y2P-IIIHr,2P-IIIΦ2y2P-I=H1,2P-IIIs1,2+H2,2P-IIIs2,2, (21)

At each time slot, there are N2 observations at R2. Thus, we are able to decode M1 data symbols from T1 and M2 data symbols from T2, due to the setting, i.e., M1+M2N1N2. Therefore, R2 can decode (M1+M2)τ3 data symbols.

Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of (M1+M2)(τ2+τ3) data symbols over τ1+τ2+τ3 time slots. This implies that the achievable sum-SDoF can be expressed as (M1+M2)(τ2+τ3)/(τ1+τ2+τ3). According to the security analysis, the achievable sum-SDoF of proposed relay-aided jamming scheme is calculated through the following:

  • If N2<R, we substitute (17) and (19) into (M1+M2)(τ2+τ3)/(τ1+τ2+τ3) to derive the exact achievable sum-SDoF.

  • If N1<RN2, we substitute τ2=0 and (17) into (M1+M2)(τ2+τ3)/(τ1+τ2+τ3) to derive the exact achievable sum-SDoF.

  • If RN1, we cannot ensure zero information leakage; hence, achievable sum-SDoF is zero.

The achievable sum-SDoF of the proposed relay-aided jamming scheme is given in (4) for M1+M2N1&N2<R Case, M1+M2N1&N1<RN2 Case, and RN1 Case.

4.2. N1<M1+M2N2 Case: The Relay-Aided Jamming and One-Receiver IA Scheme

When N1<M1+M2N2, then R1 can immediately decode the transmitted data symbols, while R2 cannot. Therefore, the technique of IA can be adopted to enable the decoding of transmitted data symbols for R2, where the interference at R1 is re-transmitted to provide lacking equations for decoding. To this end, we propose a relay-aided jamming and the one-receiver IA scheme with four phases, where the relay cooperates with two transmitters for both artificial noise transmission and IA. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R1; meanwhile, the output signal of Phase I at R1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R2; meanwhile, the output signal of Phase I at R2 is reconstructed and re-transmitted by relay. In Phase IV, the interference at R2 is re-transmitted to provide lacking equations for R1. The flowchart of this scheme is illustrated in Figure 8. Firstly, we define the holistic CSI matrices for this scheme as follows:

Hi,jP-IBD{Hi,j[1],,Hi,j[τ1]},Hi,jP-IIBD{Hi,j[τ1+1],,Hi,j[τ1+τ2]},Hi,jP-IIIBD{Hi,j[τ1+τ2+1],,Hi,j[τ1+τ2+τ3]},Hi,jP-IVBD{Hi,j[τ1+τ2+τ3+1],,Hi,j[τ1+τ2+τ3+τ4]},

where i,j=1,2,r, and the value of τ1, τ2, and τ3 is determined based on security analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ1CRτ2×N1τ1, Φ2CRτ3×N2τ1, and Π1Cmin{N1,R}τ4×N2τ2, whose items follow complex Gaussian CN(0,1). Next, the proposed three-phase transmission scheme and related analysis are elaborated.

Figure 8.

Figure 8

Flowchart of the relay-aided jamming and one-receiver IA scheme.

Phase I (jamming by the relay): This phase aims at sending Rτ1 artificial noise symbols from the relay in τ1 time slots by R antennas. Denote the artificial noise vector sent by R antennas in τ1 time slots as uCRτ1. The received signals of Phase I at two receivers are expressed as follows:

yjP-I=Hr,jP-Iu,j=1,2. (22)

The CSI matrices of Phase I return to the relay at the end of Phase I.

Phase II (joint data transmission for R1 by two transmitters and Phase I output transmission by the relay): We aim at sending M1τ2 data symbols to R1 from T1 and min{M2,RM1}τ2 data symbols to R1 from T2 in τ2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at the receivers, i.e., y1P-I and y2P-I. At each time slot, the data symbols for R1 are sent from two transmitters, and simultaneously, the Phase I output at R1 is sent from the relay. Denote the data symbols for R1 sent from T1 and T2 as s1,1CM1τ2 and s2,1Cmin{M2,RM1}τ2, respectively. Therefore, the transmit signals of Phase-II at two transmitters are expressed as follows:

xiP-II=si,1,i=1,2. (23)

The transmit signals of Phase II at the relay are designed as follows:

xrP-II=Φ1y1P-I. (24)

The received signals of Phase II at two receivers are written as follows:

yjP-II=H1,jP-IIs1,1+H2,jP-IIs2,1+Hr,jP-IIΦ1y1P-I,j=1,2. (25)

After the successful self-interference cancellation (for the successful interference cancellation, the residual self-interference can achieve noise floor; therefore, the residual self-interference does not affect the SDoF analysis) at the relay, the received signals of Phase II at the relay are expressed as follows:

yrP-II=H1,rP-IIs1,2+H2,rP-IIs2,2. (26)

Since there are R observations at the relay, the relay can immediately decode all transmitted min{M1+M2,R} data symbols, given by s1,1 and s2,1. The CSI matrices of Phase II return to the relay at the end of Phase II.

Phase III (joint data transmission for R2 by two transmitters and Phase I output transmission by the relay): This phase aims at sending M1τ3 data symbols to R2 from T1 and M2τ3 data symbols to R2 from T2 in τ3 time slots. At each time slot, the data symbols for R2 are sent from two transmitters, and simultaneously, the Phase I output at R2 is sent from the relay. Denote the data symbols for R1 sent from T1 and T2 as s1,2CM1τ3 and s2,2CM2τ3, respectively. Therefore, the transmit signals of Phase III at the two transmitters are expressed as follows:

xiP-III=si,2,i=1,2. (27)

The transmit signals of Phase III at the relay are designed as follows:

xrP-III=Φ2y2P-I. (28)

The received signals of Phase III at two receivers are written as follows:

yjP-III=H1,jP-IIIs1,2+H2,jP-IIIs2,2+Hr,jP-IIIΦ2y2P-I,j=1,2. (29)

The CSI matrices of Phase III return to the relay at the end of Phase III.

Phase IV (one-receiver IA by the relay): In order to provide lacking equations for decoding, we aim at sending min{N1,R}τ3 combinations of interference at Phase II in τ4 time slots. With CSI matrices of Phase I and Phase II, s1,1 and s2,1, the relay re-constructs the interference at Phase II, i.e., y2P-II. The transmit signals of Phase IV at the relay are designed as follows:

xrP-IV=Π1y2P-II. (30)

At the same time, two transmitters keep silent. The received signals of Phase IV at two receivers are written as follows:

yjP-IV=Hr,jP-IVΠ1y2P-II,j=1,2. (31)

Security Analysis: As the received signals in Phase IV can be constructed by the received signals in Phase II and CSI matrices, the security analysis is similar to that in the relay-aided jamming scheme. Therefore, it can be checked that to ensure zero information leakage at R1 and R2, when SNR goes to infinity, phase duration should follow (17) and (19), respectively.

Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s1,1 and s2,1 at R1. This is enabled by the following cancellation:

y1P-IIHr,1P-IIΦ1y1P-Iy1P-IIHr,1P-IVΠ1Hr,2P-IIΦ1y1P-I=H1,1P-IIH2,1P-IIHr,1P-IVΠ1H1,2P-IIHr,1P-IVΠ1H2,2P-IIH1s1,1s2,1, (32)

where the rank of matrix H1 is min{N1τ2+min{N1τ4,Rτ4},(M1+M2)τ2,Rτ2}. The reason is given in Appendix B. Since min{M1+M2,R}τ2 data symbols for R1 are transmitted, to ensure the decoding, we shall follow that

min{M1+M2,R}τ2N1τ2+min{N1τ4,Rτ4}, (33)

which simplifies to the following:

τ2τ4min{N1,R}min{M1+M2N1,RN1}. (34)

Then, multiplying (34) by (19), we have the following:

τ1τ4min{N1,R}N2min{M1+M2N1,RN1}min{N1,RN2}. (35)

Secondly, we need to verify the decoding of transmitted data symbols s1,2 and s2,2 at the receiver R2, which is enabled by the following cancellation:

y2P-IIIHr,2P-IIIΦ2y2P-I=H1,2P-IIIs1,2+H2,2P-IIIs2,2, (36)

At each time slot, there are N2 observations at R2. Thus, we are able to decode M1 data symbols from T1 and M2 data symbols from T2, due to the setting, i.e, M1+M2N2. Therefore, R2 can decode (M1+M2)τ3 data symbols.

Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of min{M1+M2,R}τ2+(M1+M2)τ3 data symbols over τ1+τ2+τ3+τ4 time slots. This implies that the achievable sum-SDoF can be expressed as (min{M1+M2,R}τ2+(M1+M2)τ3)/(τ1+τ2+τ3+τ4). According to the security and decoding analysis, the achievable sum-SDoF of proposed relay-aided jamming and one-receiver IA scheme is calculated through the following:

  • If N2<R, we substitute (17), (19), and (35) with equality into (min{M1+M2,R}τ2+(M1+M2)τ3)/(τ1+τ2+τ3+τ4) to derive the exact achievable sum-SDoF.

  • If N1<RN2, we substitute (17), τ2=0, and τ4=0 into (min{M1+M2,R}τ2+(M1+M2)τ3)/(τ1+τ2+τ3+τ4) to derive the exact achievable sum-SDoF.

  • If RN1, we cannot ensure zero information leakage, and hence, the achievable sum-SDoF is zero.

The achievable sum-SDoF of the proposed relay-aided jamming and one-receiver IA scheme is given in (4) for N1<M1+M2N2&N2<R Case, M1+M2N2&N1<RN2 Case, and RN1 Case.

4.3. N2<M1+M2 Case: The Relay-Aided Jamming and Two-Receiver IA Scheme

When N2<M1+M2, both two receivers, i.e., R1 and R2, are unable to immediately decode the transmitted data symbols. Therefore, the technique of IA can be adopted to enable the decoding of transmitted data symbols for both two receivers, where the interference at both two receivers is re-transmitted to provide lacking equations for decoding. To this end, we propose a relay-aided jamming and two-receiver IA scheme with four phases, where the relay cooperates with two transmitters for both artificial noise transmission and IA. In Phase I, the relay sends artificial noise symbols. In Phase II, two transmitters send data symbols for R1; meanwhile, the output signal of Phase I at R1 is reconstructed and re-transmitted by relay. In Phase III, two transmitters send data symbols for R2; meanwhile the output signal of Phase I at R2 is reconstructed and re-transmitted by relay. In Phase IV, the interference at R2 is re-transmitted to provide lacking equations for R1; meanwhile, the interference at R1 is re-transmitted to provide lacking equations for R2. The flowchart of this scheme is illustrated in Figure 9. Firstly, we define the holistic CSI matrices as follows:

Hi,jP-IBD{Hi,j[1],,Hi,j[τ1]},Hi,jP-IIBD{Hi,j[τ1+1],,Hi,j[τ1+τ2]},Hi,jP-IIIBD{Hi,j[τ1+τ2+1],,Hi,j[τ1+τ2+τ3]},Hi,jP-IVBD{Hi,j[τ1+τ2+τ3+1],,Hi,j[τ1+τ2+τ3+τ4]},

where i,j=1,2,r, and the values of τ1, τ2, τ3, and τ4 are determined based on security and decoding analysis of the scheme. Moreover, we introduce the pre-stored full-rank matrices Φ1CRτ2×N1τ1, Φ1CRτ3×N2τ1, Π1Cmin{N1,R}τ4×N2τ2, and Π2Cmin{N1,R}τ4×N1τ3, whose items follow complex Gaussian CN(0,1). Next, the proposed four-phase transmission scheme and related analysis are elaborated.

Figure 9.

Figure 9

Flowchart of the relay-aided jamming and two-receiver IA scheme.

Phase I (jamming by the relay): This phase aims at sending Rτ1 artificial noise symbols from the relay by R antennas in τ1 time slots. Denote the artificial noise vector sent by R antennas in τ1 time slots as uCRτ1. The received signals of Phase I at two receivers are expressed as follows:

yjP-I=Hr,jP-Iu,j=1,2. (37)

The CSI matrices of Phase I return to the relay at the end of Phase I.

Phase II (joint data transmission for R1 by two transmitters and Phase I output transmission by the relay): We aim at sending M1τ2 data symbols to R1 from T1 and min{M2,RM1,N1+N2M1}τ2 data symbols to R1 from T2 in τ2 time slots. With CSI matrices of Phase I, the relay re-constructs the Phase I output at receivers, i.e., y1P-I and y2P-I. At each time slot, the data symbols for R1 are sent from two transmitters, and simultaneously, the Phase I output at R1 is sent from the relay. Denote the data symbols for R1 sent from T1 and T2 as s1,1CM1τ2 and s2,1Cmin{M2,RM1,N1+N2M1}τ2, respectively. Therefore, the transmit signals of Phase II at two transmitters are expressed as follows:

xiP-II=si,1,i=1,2. (38)

The transmit signals of Phase II at the relay are designed as follows:

xrP-II=Φ1y1P-I. (39)

The received signals of Phase II at two receivers are written as follows:

yjP-II=H1,jP-IIs1,1+H2,jP-IIs2,1+Hr,jP-IIΦ1y1P-I,j=1,2. (40)

After the successful self-interference cancellation at the relay, the received signals of Phase II at the relay are expressed as follows:

yrP-II=H1,rP-IIs1,1+H2,rP-IIs2,1. (41)

Since there are R observations at the relay, the relay can immediately decode all transmitted min{M1+M2,R,N1+N2} data symbols, given by s1,1 and s2,1. The CSI matrices of Phase II return to the relay at the end of Phase II.

Phase III (joint data transmission for R2 by two transmitters and Phase I output transmission by the relay): We aim at sending M1τ2 data symbols to R2 from T1 and min{M2,RM1,N1+N2M1}τ2 data symbols to R2 from T2 in τ3 time slots. At each time slot, the data symbols for R2 are sent from two transmitters, and simultaneously, the Phase I output at R2 is sent from the relay. Denote the data symbols for R2 sent from T1 and T2 as s1,2CM1τ2 and s2,2Cmin{M2,RM1,N1+N2M1}τ2, respectively. Therefore, the transmit signals of Phase-III at two transmitters are expressed as follows:

xiP-III=si,2,i=1,2. (42)

The transmit signals of Phase III at the relay are designed as follows:

xrP-III=Φ2y2P-I. (43)

The received signals of Phase II at two receivers are written as follows:

yjP-III=H1,jP-IIIs1,2+H2,jP-IIIs2,2+Hr,jP-IIIΦ2y2P-I,j=1,2. (44)

After the successful self-interference cancellation at the relay, the received signals of Phase II at the relay are expressed as follows:

yrP-III=H1,rP-IIIs1,2+H2,rP-IIIs2,2. (45)

Since there are R observations at the relay, the relay can immediately decode all transmitted min{M1+M2,R,N1+N2} data symbols, given by s1,1 and s2,1. The CSI matrices of Phase III return to the relay at the end of Phase III.

Phase IV (two-receiver IA by the relay): In order to provide lacking equations for decoding, we aim at sending min{N1,R}τ4 combinations of interference at Phase II and Phase III by min{N1,R} antennas in τ4 time slots after Phase III. With CSI matrices of Phase I, Phase II, and Phase III, the relay re-constructs the interference at Phase II and Phase III, i.e, y2P-II and y1P-III. The transmit signals of Phase-IV at the relay are designed as follows:

xrP-IV=Π2y1P-III+Π1y2P-II. (46)

At the same time, two transmitters keep silent. The received signals of Phase IV at two receivers are written by the following:

yjP-IV=Hr,jP-IVΠ2y1P-III+Hr,jP-IVΠ1y2P-II,j=1,2. (47)

Security Analysis: As the received signals in Phase IV can be constructed by the received signals in Phase II, Phase III, and CSI matrices, the security analysis is similar to that in the relay-aided jamming scheme. Therefore, it can be checked that to ensure zero information leakage at R1 and R2, when SNR goes to infinity, the phase duration should follow (17) and (19), respectively.

Decoding analysis: Firstly, we need to verify the decoding of transmitted data symbols s1,1 and s2,1 at the receiver R1. This is enabled by the following cancellation:

y1P-IIHr,1P-IIΦ1y1P-Iy1P-IVHr,1P-IVΠ2y1P-IIIHr,1P-IVΠ1Hr,2P-IIΦ1y1P-I=H1,1P-IIH2,1P-IIHr,1P-IVΠ1H1,2P-IIHr,1P-IVΠ1H2,2P-IIH1s1,1s2,1, (48)

where the rank of matrix H1 is min{N1τ2+min{N1,R}τ4,(N1+N2)τ2,(M1+M2)τ2,Rτ2}, and the reason is given in Appendix C. Since min{M1+M2,R,N1+N2}τ2 data symbols for R1 are transmitted, to ensure the decoding, we shall follow that

min{M1+M2,R,N1+N2}τ2min{N1τ2+min{N1,R}τ4,(N1+N2)τ2}. (49)

If M1+M2N1+N2, (49) simplifies to the following:

τ2τ4min{N1,R}min{M1+M2N1,RN1}. (50)

Otherwise, if N1+N2<M1+M2, (49) simplifies to the following:

τ2τ4min{N1,R}min{N2,RN1}. (51)

Combining (50) and (51), we have the following:

τ2τ4min{N1,R}min{M1+M2N1,N2,RN1}. (52)

Then, multiplying (52) by (19), we have the following:

τ1τ4min{N1,R}N2min{M1+M2N1,N2,RN1}min{N1,RN2}. (53)

Secondly, we need to verify the decoding of transmitted data symbols s1,2 and s2,2 at the receiver R2, which is enabled by the following cancellation:

y2P-IIIHr,2P-IIIΦ2y2P-Iy2P-IVHr,2P-IVΠ1y2P-IIHr,2P-IVΠ2Hr,1P-IIIΦ2y2P-I=H1,2P-IIIH2,2P-IIIHr,2P-IVΠ2H1,1P-IIIHr,2P-IVΠ2H2,1P-IIIH2s1,2s2,2, (54)

where the rank of matrix H2 is min{N2τ3+min{N1,R}τ4,(N1+N2)τ3,(M1+M2)τ3,Rτ3}, and the reason is given in Appendix C. Since min{M1+M2,R,N1+N2}τ3 data symbols for R2 are transmitted, to ensure the decoding, we shall follow that

min{M1+M2,R,N1+N2}τ3min{N2τ3+min{N1,R}τ4,(N1+N2)τ3}. (55)

If M1+M2N1+N2, (55) simplifies to the following:

τ3τ4min{N1,R}min{M1+M2N2,RN2}. (56)

Otherwise, if N1+N2<M1+M2, (49) simplifies to the following:

τ3τ4min{N1,R}min{N1,RN2}. (57)

Combining (56) and (57), we have the following:

τ3τ4min{N1,R}min{M1+M2N2,N1,RN2}. (58)

Then, multiplying (58) by (17), we have the following:

τ1τ4min{N1,R}N1min{M1+M2N2,N1,RN2}min{N2,RN1}. (59)

Achievable sum-SDoF analysis: As shown in the decoding analysis, two receivers can decode a total of min{M1+M2,R,N1+N2}(τ2+τ3) data symbols over τ1+τ2+τ3+τ4 time slots. This implies that the achievable sum-SDoF can be expressed as min{M1+M2,R,N1+N2}(τ2+τ3)/(τ1+τ2+τ3+τ4). According to the security and decoding analysis, the achievable sum-SDoF of proposed relay-aided jamming and two-receiver IA scheme is calculated through the following:

  • If N2<R, we substitute (17), (19), and (53) with equality or (59) with equality into (min{M1+M2,R,N1+N2}(τ2+τ3)/(τ1+τ2+τ3+τ4) to derive the exact achievable sum-SDoF.

  • If N1<RN2, we substitute (17), τ2=0, and (59) with equality into min{M1+M2,R,N1+N2}(τ2+τ3)/(τ1+τ2+τ3+τ4) to derive the exact achievable sum-SDoF.

  • If RN1, we cannot ensure zero information leakage; hence, achievable sum-SDoF is zero.

The achievable sum-SDoF of proposed relay-aided jamming and two-receiver IA scheme is given in (4) for N2<M1+M2&N2<R Case, N2<M1+M2&N1<RN2 Case, and RN1 Case.

5. Conclusions

We studied the sum-SDoF of the multiple-antenna full-duplex relay-aided MIMO XCCM with arbitrary antenna configurations, where there is no CSI at two transmitters and delayed CSI at the relay. To establish a sum-SDoF lower bound, we designed three transmission schemes. For the proposed schemes, full-duplex relay was utilized to receive the data symbol signals meanwhile transmit jamming signals, as this method can increase the transmission efficiency in contrast to half-duplex systems. We also derived a sum-SDoF upper bound. We characterized the sum-SDoF for 2NR and NM. We showed that the derived sum-SDoF lower bound can be higher than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT for 2NR and M<N, which is not attained by the MIMO XCCM with no CSIT. Therefore, a multiple-antenna full-duplex relay with delayed CSI is beneficial for the MIMO XCCM with no CSIT from the SDoF perspective. In the future, there are several directions to extend this work, which are as follows: (1) a better sum-SDoF upper bound; (2) the impact of cognitive messages at transmitters/receivers; (3) MIMO X networks with more than two receivers; (4) the impact of imperfect self-interference cancellation on sum-SDoF characterization; and (5) the analysis of error performance of proposed schemes for finite SNR.

Appendix A. The Rank of Matrices A2, B2

The matrix A2 can be decomposed into the following:

IN1τ10Hr,1P-IIΦ100IN1τ3A2,1Hr,1P-IHr,1P-IIIΦ2Hr,2P-IA2,2,

where the rank of matrix A2,1 is N1(τ1+τ3) by Gaussian elimination, and the rank of matrix A2,2 is min{N1τ1+min{R,N1}τ3,(N1+N2)τ1,Rτ1}, due to RKHr,1P-I=min{N1,R}τ1, RKHr,2P-I=min{N2,R}τ1, RKΦ2=min{Rτ3,N2τ1}, and RKHr,1P-III=min{R,N1}τ3. Therefore, the rank of matrix A2 is min{N1τ1+min{R,N1}τ3,(N1+N2)τ1,Rτ1}.

The matrix B2 can be decomposed into the following:

IN2τ100IN2τ2Hr,2P-IIIΦ20B2,1Hr,2P-IHr,2P-IIΦ1Hr,1P-IB2,2,

where the rank of matrix B2,1 is N2(τ1+τ2) by Gaussian elimination, and the rank of matrix B2,2 is min{N2τ1+min{R,N2}τ2,(N1+N2)τ1,Rτ1}, due to RKHr,2P-I=min{N2,R}τ1, RKHr,1P-I=min{N1,R}τ1, RKΦ1=min{Rτ2,N1τ1}, and RKHr,2P-II=min{R,N2}τ2. Therefore, the rank of matrix B2 is min{N2τ1+min{R,N2}τ2,(N1+N2)τ1,Rτ1}.

Appendix B. The Rank of Matrices H1

The matrix H1 can be decomposed into the following:

IN1τ200Hr,1P-IVΠ1H1,1H1,1P-IIH2,1P-IIH1,2P-IIH2,2P-IIH1,2,

where the rank of matrix H1,1 is min{N1τ2+min{N1,R}τ4,(N1+N2)τ2}, due to RKHr,1P-IV=min{N1,R}τ4 and RKΠ1=min{N2τ2,min{N1,R}τ4}, and the rank of matrix H1,2 is min{(N1+N2)τ2,(M1+M2)τ2,Rτ2}, due to RKH1,jP-II=min{Nj,M1}τ2,j=1,2, and RKH2,jP-II=min{M2,RM1,N1+N2M1,Nj}τ2,j=1,2. Therefore, the rank of matrix H1 follows min{N1τ2+min{N1,R}τ4,(N1+N2)τ2,(M1+M2)τ2,Rτ2}. With N1<M1+M2N2, the rank of matrix H1 is min{N1τ2+min{N1τ4,Rτ4},(M1+M2)τ2,Rτ2}.

Appendix C. The Rank of Matrices H1′ and H2

The rank of matrix H1 can be decomposed into the following:

IN1τ200Hr,1P-IVΠ1H1,1H1,1P-IIH2,1P-IIH1,2P-IIH2,2P-IIH1,2,

where the rank of matrix H1,1 is min{min{N1,R}τ4,(N1+N2)τ2}, due to RKHr,1P-IV=min{N1,R}τ4 and RKΠ1=min{N2τ2,min{N1,R}τ4}, and the rank of matrix H1,2 is min{(N1+N2)τ2,(M1+M2)τ2,Rτ2}, due to RKH1,jP-II=min{Nj,M1}τ2,j=1,2, and RKH2,jP-II=min{M2,RM1,N1+N2M1,Nj}τ2,j=1,2. Therefore, the rank of matrix H1 is min{N1τ2+min{N1,R}τ4,(N1+N2)τ2,(M1+M2)τ2,Rτ2}.

The rank of matrix H2 can be decomposed into the following:

IN2τ300Hr,2P-IVΠ2H2,1H1,1P-IIIH2,1P-IIIH1,2P-IIIH2,2P-IIIH2,2,

where the rank of matrix H2,1 is min{min{N1,R}τ4,(N1+N2)τ3}, due to RKHr,2P-IV=min{N1,R}τ4 and RKΠ2=min{N1τ3,min{N1,R}τ4}, and the rank of matrix H2,2 is min{(N1+N2)τ3,(M1+M2)τ3,Rτ3}, due to RKH1,jP-III=min{Nj,M1}τ3,j=1,2, and RKH2,jP-III=min{M2,RM1,N1+N2M1,Nj}τ3,j=1,2. Therefore, the rank of matrix H2 is min{N2τ3+min{N1,R}τ4,(N1+N2)τ3,(M1+M2)τ3,Rτ3}.

Author Contributions

Conceptualization, T.Z. and G.C.; Formal analysis, T.Z. and S.W.; Methodology, T.Z.; Supervision, R.W.; Writing—original draft, T.Z. and G.C.; Writing—review and editing, S.W., G.C. and R.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the China Postdoctoral Science Foundation under grant no. 2021M691453, the National Natural Science Foundation of China: 61771232, 62001203.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Bloch M., Günlü O., Yener A., Oggier F., Poor H.V., Sankar L., Schaefer R.F. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. IEEE J. Sel. Areas Inf. Theory. 2021;2:5–22. doi: 10.1109/JSAIT.2021.3062755. [DOI] [Google Scholar]
  • 2.Cao P.L., Oechtering T.J. Optimal Transmit Strategies for Gaussian MISO Wiretap Channels. IEEE Trans. Inf. Forensics Secur. 2020;15:829–838. doi: 10.1109/TIFS.2019.2929474. [DOI] [Google Scholar]
  • 3.Wang S., Wen M., Xia M., Wang R., Hao Q., Wu Y.C. Angle Aware User Cooperation for Secure Massive MIMO in Rician Fading Channel. IEEE J. Sel. Areas Commun. 2020;38:2182–2196. doi: 10.1109/JSAC.2020.3000837. [DOI] [Google Scholar]
  • 4.Xie J., Ulukus S. Secure Degrees of Freedom of One-Hop Wireless Networks. IEEE Trans. Inf. Theory. 2014;60:3359–3378. doi: 10.1109/TIT.2014.2315801. [DOI] [Google Scholar]
  • 5.Banawan K., Ulukus S. Secure degrees of freedom of the Gaussian MIMO interference channel; Proceedings of the 2015 49th Asilomar Conference Signals, Systems Computers; Pacific Grove, CA, USA. 8–11 November 2015; pp. 40–44. [DOI] [Google Scholar]
  • 6.Banawan K., Ulukus S. Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel. IEEE Trans. Inf. Theory. 2019;65:444–461. doi: 10.1109/TIT.2018.2839658. [DOI] [Google Scholar]
  • 7.Wang Q., Wang Y., Wang H. Secure Degrees of Freedom of the Asymmetric Gaussian MIMO Interference Channel. IEEE Trans. Veh. Technol. 2017;66:8001–8009. doi: 10.1109/TVT.2017.2685526. [DOI] [Google Scholar]
  • 8.Wang Z., Xiao M., Skoglund M., Poor H.V. Secure Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment. IEEE Trans. Commun. 2015;63:2632–2646. doi: 10.1109/TCOMM.2015.2434378. [DOI] [Google Scholar]
  • 9.Wang Q., Zhang T., Dong D., Li X. Secure Degrees of Freedom of Rank-Deficient BCCM and Rank-Deficient ICCM. IEEE Trans. Veh. Technol. 2020;69:4033–4041. doi: 10.1109/TVT.2020.2973749. [DOI] [Google Scholar]
  • 10.Yang S., Kobayashi M., Piantanida P., Shamai S. Secrecy Degrees of Freedom of MIMO Broadcast Channels with Delayed CSIT. IEEE Trans. Inf. Theory. 2013;59:5244–5256. doi: 10.1109/TIT.2013.2266924. [DOI] [Google Scholar]
  • 11.Mukherjee P., Tandon R., Ulukus S. Secure Degrees of Freedom Region of the Two-User MISO Broadcast Channel with Alternating CSIT. IEEE Trans. Inf. Theory. 2017;63:3823–3853. doi: 10.1109/TIT.2017.2663427. [DOI] [Google Scholar]
  • 12.Lashgari S., Avestimehr A.S. Secrecy DoF of Blind MIMOME Wiretap Channel with Delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2018;13:478–489. doi: 10.1109/TIFS.2017.2756602. [DOI] [Google Scholar]
  • 13.Awan Z.H., Sezgin A. Secure MISO Broadcast Channel: An Interplay Between CSIT and Network Topology. IEEE J. Sel. Areas Inf. Theory. 2021;2:121–138. doi: 10.1109/JSAIT.2021.3052845. [DOI] [Google Scholar]
  • 14.Zhang T., Ching P.C. Secure MIMO Interference Channel with Confidential Messages and Delayed CSIT; Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); Brighton, UK. 12–17 May 2019; pp. 2437–2441. [Google Scholar]
  • 15.Zhang T., Wang R. Secure Degrees-of-Freedom of the MIMO X Channel with Delayed CSIT. IEEE Wirel. Commun. Lett. 2021;10:1319–1323. doi: 10.1109/LWC.2021.3065712. [DOI] [Google Scholar]
  • 16.Zhang T., Xu Y., Wang S., Wen M., Wang R. On Secure Degrees of Freedom of the MIMO Interference Channel with Local Output Feedback. IEEE Internet Things J. 2021;8:15334–15348. doi: 10.1109/JIOT.2021.3062880. [DOI] [Google Scholar]
  • 17.Zaidi A., Awan Z.H., Shamai S., Vandendorpe L. Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2013;8:1760–1774. doi: 10.1109/TIFS.2013.2278936. [DOI] [Google Scholar]
  • 18.Wang Z., Xiao M., Wang C., Skoglund M. Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT. IEEE Wirel. Commun. Lett. 2013;2:1–4. doi: 10.1109/WCL.2013.13.120857. [DOI] [Google Scholar]
  • 19.Shin W., Lee B., Shim B., Lee J. A MIMO Relay with Delayed Feedback Can Improve DoF in K- User MISO Interference Channel with No CSIT. IEEE Trans. Veh. Technol. 2016;65:10188–10192. doi: 10.1109/TVT.2016.2553246. [DOI] [Google Scholar]
  • 20.Shin W., Lee N., Yang H., Lee J. Relay-Aided Successive Aligned Interference Cancellation for Wireless X Networks with Full-Duplex Relays. IEEE Trans. Veh. Technol. 2017;66:421–432. doi: 10.1109/TVT.2016.2542190. [DOI] [Google Scholar]
  • 21.Tian Y., Yener A. Guiding Blind Transmitters: Degrees of Freedom Optimal Interference Alignment Using Relays. IEEE Trans. Inf. Theory. 2013;59:4819–4832. doi: 10.1109/TIT.2013.2258713. [DOI] [Google Scholar]
  • 22.Shin W., Lee N., Lee J., Poor H.V. Relay-Aided Space-Time Beamforming for Interference Networks with Partial Channel Knowledge. IEEE Trans. Signal Process. 2016;64:5119–5130. doi: 10.1109/TSP.2016.2591909. [DOI] [Google Scholar]
  • 23.Wang Z., Xiao M., Skoglund M. Secrecy Degrees of Freedom of the 2 × 2 × 2 Interference Channel with Delayed CSIT. IEEE Wirel. Commun. Lett. 2014;3:341–344. doi: 10.1109/LWC.2014.2315795. [DOI] [Google Scholar]
  • 24.Debaillie B., van den Broek D.J., Lavín C., van Liempd B., Klumperink E.A.M., Palacios C., Craninckx J., Nauta B., Pärssinen A. Analog/RF Solutions Enabling Compact Full-Duplex Radios. IEEE J. Sel. Areas Commun. 2014;32:1662–1673. doi: 10.1109/JSAC.2014.2330171. [DOI] [Google Scholar]
  • 25.Yilan M., Ayar H., Nawaz H., Gurbuz O., Tekin I. Monostatic Antenna In-Band Full Duplex Radio: Performance Limits and Characterization. IEEE Trans. Veh. Technol. 2019;68:4786–4799. doi: 10.1109/TVT.2019.2904138. [DOI] [Google Scholar]
  • 26.Zhang Z., Long K., Vasilakos A.V., Hanzo L. Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions. Proc. IEEE. 2016;104:1369–1409. doi: 10.1109/JPROC.2015.2497203. [DOI] [Google Scholar]
  • 27.Duarte M., Dick C., Sabharwal A. Experiment-Driven Characterization of Full-Duplex Wireless Systems. IEEE Trans. Wirel. Commun. 2012;11:4296–4307. doi: 10.1109/TWC.2012.102612.111278. [DOI] [Google Scholar]
  • 28.Chung M., Sim M.S., Kim J., Kim D.K., Chae C.b. Prototyping real-time full duplex radios. IEEE Commun. Mag. 2015;53:56–63. doi: 10.1109/MCOM.2015.7263346. [DOI] [Google Scholar]
  • 29.Duarte M., Sabharwal A., Aggarwal V., Jana R., Ramakrishnan K.K., Rice C.W., Shankaranarayanan N.K. Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks. IEEE Trans. Veh. Technol. 2014;63:1160–1177. doi: 10.1109/TVT.2013.2284712. [DOI] [Google Scholar]
  • 30.Telatar E. Capacity of multi-antenna Gaussian channels. Eur. Trans. Telecommun. 1999;10:585–595. doi: 10.1002/ett.4460100604. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES