Secure Array Synthesis

A new array synthesis problem, whose objective is to maximize secure information shared with a legitimate recipient in the presence of a passive eavesdropper, is posed for line-of-sight (LOS) wireless transmission. By casting the problem into the form of a semidefinite program, it is found that the problem is convex and that optimal solutions can be efficiently found irrespective of the array topology. Representative results for a uniform linear array (ULA) and uniform circular array (UCA) are presented to demonstrate the utility of the method. Furthermore, it is shown that the radiated power of the optimal solution can be naturally decomposed into a signal pattern and noise pattern, providing an intuitive description of the optimal solutions and allowing comparison with standard array synthesis techniques.

[1]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Michael A. Jensen,et al.  Mutual coupling in MIMO wireless systems: a rigorous network theory analysis , 2004, IEEE Transactions on Wireless Communications.

[3]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .

[4]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[5]  Walid Saad,et al.  On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[6]  Stephen P. Boyd,et al.  Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..

[7]  Anton van den Hengel,et al.  Semidefinite Programming , 2014, Computer Vision, A Reference Guide.

[8]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[9]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[10]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[11]  Mounir Ghogho,et al.  Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation , 2011, Phys. Commun..

[12]  Michael A. Jensen,et al.  Key Establishment Employing Reconfigurable Antennas: Impact of Antenna Complexity , 2014, IEEE Transactions on Wireless Communications.

[13]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[14]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[15]  Stark C. Draper,et al.  Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Björn E. Ottersten,et al.  Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.

[17]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  Matthew R. McKay,et al.  Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.

[19]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[21]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.