Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter

This paper addresses the establishment of secure communication links between Alice and Bob in the presence of an eavesdropper (Eve). The proposed scenario assumes: 1) MIMOME wiretap channel; 2) transmit antenna selection at the Alice; 3) no channel state information at the transmitter; 4) fixed Wyner codes; and 5) guarantee of secure throughput by both quality of service and secrecy outage constraints. We propose a simple protocol to enhance security via transmit antenna selection, and then assess its performance in a closed form by means of secrecy outage and successful transmission probabilities. We assume these probabilities are our constraints and then maximize the secure throughput, establishing a security-reliability tradeoff for the proposed scenario. Our numerical results illustrate the effect of this tradeoff on the secure throughput as well as on the number of antennas at Alice, Bob, and Eve. Interestingly, a small sacrifice in reliability allows secrecy enhancement in terms of secure bps/Hz. We apply this idea in our smart grid application (where Alice represents a smart meter and Bob an aggregator) to exemplify that, although Eve may acquire some samples of the average power demand of a household, it is not enough to properly reconstruct such curve.

[1]  Branka Vucetic,et al.  Error performance of maximal-ratio combining with transmit antenna selection in flat Nakagami-m fading channels , 2006, IEEE Transactions on Wireless Communications.

[2]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[3]  J. Zico Kolter,et al.  REDD : A Public Data Set for Energy Disaggregation Research , 2011 .

[4]  Ruoheng Liu,et al.  On the Achievable Secrecy Throughput of Block Fading Channels with No Channel State Information at Transmitter , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[5]  Goran Strbac,et al.  Demand side management: Benefits and challenges ☆ , 2008 .

[6]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[7]  Matti Latva-aho,et al.  Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[10]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[11]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[12]  Saifur Rahman,et al.  Communication network requirements for major smart grid applications in HAN, NAN and WAN , 2014, Comput. Networks.

[13]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[14]  Matti Latva-aho,et al.  Optimal Transmission Capacity of Ad Hoc Networks with Packet Retransmissions , 2012, IEEE Transactions on Wireless Communications.

[15]  Mario Gerla,et al.  Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.

[16]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[17]  Husheng Li,et al.  Gathering Process Data in Low-Voltage Systems by Enhanced Event-Driven Metering , 2017, IEEE Systems Journal.

[18]  Hirley Alves,et al.  Enhanced physical layer security through transmit antenna selection , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[19]  Matti Latva-aho,et al.  On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels , 2015, IEEE Signal Processing Letters.

[20]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[21]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[22]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[23]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[24]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[25]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[26]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[27]  Ronald F. Boisvert,et al.  NIST Handbook of Mathematical Functions , 2010 .

[28]  Matti Latva-aho,et al.  Models for the modern power grid , 2013, 1401.0260.

[29]  Xiangyun Zhou,et al.  On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[30]  Lazaros Gkatzikis,et al.  The Role of Aggregators in Smart Grid Demand Response Markets , 2013, IEEE Journal on Selected Areas in Communications.

[31]  Matti Latva-aho,et al.  Joint sampling-communication strategies for smart-meters to aggregator link as secondary users , 2016, 2016 IEEE International Energy Conference (ENERGYCON).

[32]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[33]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[34]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[35]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[36]  A. G. Greenhill,et al.  Handbook of Mathematical Functions with Formulas, Graphs, , 1971 .

[37]  Hirley Alves,et al.  Throughput performance of parallel and repetition coding in incremental decode-and-forward relaying , 2012, Wirel. Networks.

[38]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.