Defeating the Eavesdropper: On the Achievable Secrecy Capacity Using Reconfigurable Antennas

In this paper, we consider the transmission of confidential messages over slow fading wireless channels in the presence of an eavesdropper. We propose a transmission scheme that employs a single reconfigurable antenna at each of the legitimate partners, whereas the eavesdropper uses a single conventional antenna. A reconfigurable antenna can switch its propagation characteristics over time and thus it perceives different fading channels. It is shown that without channel side information (CSI) at the legitimate partners, the main channel can be transformed into an ergodic regime offering a secrecy capacity gain for strict outage constraints. If the legitimate partners have partial or full CSI, a sort of selection diversity can be applied boosting the maximum secret communication rate. In this case, fading acts as a friend not a foe.

[1]  Ning Kong Performance Comparison Among Conventional Selection Combining, Optimum Selection Combining and Maximal Ratio Combining , 2009, 2009 IEEE International Conference on Communications.

[2]  Camilla Hollanti,et al.  Physical Layer Security: A Paradigm Shift in Data Confidentiality , 2016 .

[3]  Alexander Barg,et al.  Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component , 2015, ITW.

[4]  Kapil R. Dandekar,et al.  Enhancing wireless security through reconfigurable antennas , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).

[5]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[6]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[7]  J. Vardaxoglou,et al.  Frequency and beam reconfigurable antenna using photoconducting switches , 2006, IEEE Transactions on Antennas and Propagation.

[8]  Yaxing Cai,et al.  A Novel Pattern Reconfigurable Antenna Array for Diversity Systems , 2009, IEEE Antennas and Wireless Propagation Letters.

[9]  Ross D. Murch,et al.  Improving Space-Time Code Performance in Slow Fading Channels using Reconfigurable Antennas , 2012, IEEE Communications Letters.

[10]  Kapil R. Dandekar,et al.  A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks , 2012 .

[11]  Rashid Mehmood,et al.  Wireless security enhancement using parasitic reconfigurable aperture antennas , 2011, Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP).

[12]  Tao Chen,et al.  Device-To-Device (D2D) Communication in Cellular Network - Performance Analysis of Optimum and Practical Communication Mode Selection , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[13]  R.W. Heath,et al.  Design and Evaluation of a Reconfigurable Antenna Array for MIMO Systems , 2008, IEEE Transactions on Antennas and Propagation.

[14]  K. Sarabandi,et al.  Dual-band reconfigurable antenna with a very wide tunability range , 2006, IEEE Transactions on Antennas and Propagation.

[15]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[16]  J.T. Bernhard,et al.  A novel radiation pattern and frequency reconfigurable single turn square spiral microstrip antenna , 2003, IEEE Microwave and Wireless Components Letters.

[17]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[18]  Michael P. Daly,et al.  Physical layer encryption using fixed and reconfigurable antennas , 2012 .

[19]  Marco Di Renzo,et al.  On secrecy rate analysis of spatial modulation and space shift keying , 2015, 2015 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).

[20]  Amir K. Khandani,et al.  The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.

[21]  Sanjay Karmakar,et al.  Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).

[22]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.