70 research outputs found
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
In this paper, we investigate methods for reducing the likelihood that a
message transmitted between two multiantenna nodes is intercepted by an
undetected eavesdropper. In particular, we focus on the judicious transmission
of artificial interference to mask the desired signal at the time it is
broadcast. Unlike previous work that assumes some prior knowledge of the
eavesdropper's channel and focuses on maximizing secrecy capacity, we consider
the case where no information regarding the eavesdropper is available, and we
use signal-to-interference-plus-noise-ratio (SINR) as our performance metric.
Specifically, we focus on the problem of maximizing the amount of power
available to broadcast a jamming signal intended to hide the desired signal
from a potential eavesdropper, while maintaining a prespecified SINR at the
desired receiver. The jamming signal is designed to be orthogonal to the
information signal when it reaches the desired receiver, assuming both the
receiver and the eavesdropper employ optimal beamformers and possess exact
channel state information (CSI). In practice, the assumption of perfect CSI at
the transmitter is often difficult to justify. Therefore, we also study the
resulting performance degradation due to the presence of imperfect CSI, and we
present robust beamforming schemes that recover a large fraction of the
performance in the perfect CSI case. Numerical simulations verify our
analytical performance predictions, and illustrate the benefit of the robust
beamforming schemes.Comment: 10 pages, 5 figures; to appear, IEEE Transactions on Signal
Processing, 201
Transmit design for MIMO wiretap channel with a malicious jammer
In this paper, we consider the transmit design for multi-input multi-output
(MIMO) wiretap channel including a malicious jammer. We first transform the
system model into the traditional three-node wiretap channel by whitening the
interference at the legitimate user. Additionally, the eavesdropper channel
state information (ECSI) may be fully or statistically known, even unknown to
the transmitter. Hence, some strategies are proposed in terms of different
levels of ECSI available to the transmitter in our paper. For the case of
unknown ECSI, a target rate for the legitimate user is first specified. And
then an inverse water-filling algorithm is put forward to find the optimal
power allocation for each information symbol, with a stepwise search being used
to adjust the spatial dimension allocated to artificial noise (AN) such that
the target rate is achievable. As for the case of statistical ECSI, several
simulated channels are randomly generated according to the distribution of
ECSI. We show that the ergodic secrecy capacity can be approximated as the
average secrecy capacity of these simulated channels. Through maximizing this
average secrecy capacity, we can obtain a feasible power and spatial dimension
allocation scheme by using one dimension search. Finally, numerical results
reveal the effectiveness and computational efficiency of our algorithms.Comment: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring
Secure Communication over 1-2-1 Networks
This paper starts by assuming a 1-2-1 network, the abstracted noiseless model
of mmWave networks that was shown to closely approximate the Gaussian capacity
in [1], and studies secure communication. First, the secure capacity is derived
for 1-2-1 networks where a source is connected to a destination through a
network of unit capacity links. Then, lower and upper bounds on the secure
capacity are derived for the case when source and destination have more than
one beam, which allow them to transmit and receive in multiple directions at a
time. Finally, secure capacity results are presented for diamond 1-2-1 networks
when edges have different capacities.Comment: Submitted for ISIT 201
Integration of Signal and Artificial Noise in MIMO Wiretap Channel
In this paper, the integrated signal-to-artificial noise (ISAN) design is applied in MIMO wiretap channel to ensure wireless communication security. When the information of eavesdropper is unknown, the total power is divided into two parts: signal and artificial noise. The signal can secure certain quality at the legitimate receiver. The artificial noise which is in the null space of the receiver channel matrix can deteriorate eavesdropper channel by the method of beam forming. The artificial noise power is distributed evenly in other space, so that the eavesdropper channel is deteriorated in all directions. The signal to interface and noise ratio (SINR) is regarded as the efficient parameter on measuring reliability and security of information at the legitimate receiver. The simulations reveal that ISAN can deteriorate the eavesdropper channel and safeguard the information transmission on the premise of the given SINR of the legitimate receiver
Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective
This article examines the secrecy coding aided wireless communications from a
source to a destination in the presence of an eavesdropper from a
security-reliability tradeoff (SRT) perspective. Explicitly, the security is
quantified in terms of the intercept probability experienced at the
eavesdropper, while the outage probability encountered at the destination is
used to measure the transmission reliability. We characterize the SRT of
conventional direct transmission from the source to the destination and show
that if the outage probability is increased, the intercept probability
decreases, and vice versa. We first demonstrate that the employment of relay
nodes for assisting the source-destination transmissions is capable of
defending against eavesdropping, followed by quantifying the benefits of
single-relay selection (SRS) as well as of multi-relay selection (MRS) schemes.
More specifically, in the SRS scheme, only the single "best" relay is selected
for forwarding the source signal to the destination, whereas the MRS scheme
allows multiple relays to participate in this process. It is illustrated that
both the SRS and MRS schemes achieve a better SRT than the conventional direct
transmission, especially upon increasing the number of relays. Numerical
results also show that as expected, the MRS outperforms the SRS in terms of its
SRT. Additionally, we present some open challenges and future directions for
the wireless relay aided physical-layer security.Comment: 16 pages, IEEE Network, 201
Pilot contamination for active eavesdropping
Abstract—Existing studies on physical layer security often assume the availability of perfect channel state information (CSI)
and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new
security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the
transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to
strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.This work was supported by the Australian Research Council's Discovery Projects funding scheme (project no. DP110102548) and the Research Council of Norway through the project 197565/V30
Cooperative Jamming with AF Relay in Power Monitoring and Communication Systems for Mining
In underground mines, physical layer security (PLS) technology is a promising method for the effective and secure communication to monitor the mining process. Therefore, in this paper, we investigate the PLS of an amplify-and-forward relay-aided system in power monitoring and communication systems for mining, with the consideration of multiple eavesdroppers. Explicitly, we propose a PLS scheme of cooperative jamming and precoding for a full-duplex system considering imperfect channel state information. To maximize the secrecy rate of the communications, an effective block coordinate descent algorithm is used to design the precoding and jamming matrix at both the source and the relay. Furthermore, the effectiveness and convergence of the proposed scheme with high channel state information uncertainty have been proven
- …