On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI

In this paper, secure communication aided by a multiantenna cooperative jammer is investigated. Under very practical but adverse assumptions, i.e., no instantaneous jammer-eavesdropper channel state information (CSI) and imperfect instantaneous jammer-receiver CSI, the residual interference from the jammer to the legitimate receiver appears, even with spatial beamforming. Then, this paper analyzes the impact of imperfect CSI on the function of cooperative jamming and derives closed-form expressions of multiple secrecy performance metrics, including ergodic secrecy rate, secrecy outage capacity, and interception probability. Interestingly, it is found that two antennas at the jammer is always optimal. Furthermore, some insights are obtained through asymptotic analysis, e.g., the secrecy performance is saturated as the source transmit power increases, the ergodic secrecy rate is a linear function of CSI feedback bits in the region of high transmit power at the source/jammer, and interception probability is independent of transmit power at the source and is a decreasing function of transmit power at the jammer. Finally, theoretical claims are validated by simulation results.

[1]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[2]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[3]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[4]  Elza Erkip,et al.  On beamforming with finite rate feedback in multiple-antenna systems , 2003, IEEE Trans. Inf. Theory.

[5]  Hongbo Zhu,et al.  Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[7]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[8]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Athina P. Petropulu,et al.  Mobile jammers for secrecy rate maximization in cooperative networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[10]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[11]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[12]  A. Lee Swindlehurst,et al.  Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming , 2014, IEEE Trans. Signal Process..

[13]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Il-Min Kim,et al.  Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding , 2014, IEEE Transactions on Communications.

[16]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[17]  Hsiao-Hwa Chen,et al.  Enhancing wireless information and power transfer by exploiting multi-antenna techniques , 2015, IEEE Communications Magazine.

[18]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[19]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[20]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[21]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[22]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[23]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[24]  Xiaoming Chen,et al.  Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.

[25]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[26]  Xiaoming Chen,et al.  Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.

[27]  Xianbin Wang,et al.  Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[28]  Hsiao-Hwa Chen,et al.  Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.

[29]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[30]  Xiaoming Chen,et al.  Performance Analysis and Optimization for Interference Alignment Over MIMO Interference Channels With Limited Feedback , 2014, IEEE Transactions on Signal Processing.

[31]  Il-Min Kim,et al.  Power-Constrained Optimal Cooperative Jamming for Multiuser Broadcast Channel , 2013, IEEE Wireless Communications Letters.

[32]  Nihar Jindal MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.

[33]  Joonhyuk Kang,et al.  Secure Transmission in Downlink Cellular Network with a Cooperative Jammer , 2013, IEEE Wireless Communications Letters.

[34]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[35]  Il-Min Kim,et al.  Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.