Joint PHY/MAC Layer Security Design Using ARQ With MRC and Null-Space Independent PAPR-Aware Artificial Noise in SISO Systems

Automatic-repeat-request (ARQ) as a MAC layer mechanism and artificial noise (AN) as a physical layer mechanism along with the help of maximal ratio combining (MRC), are jointly designed to achieve secrecy. Basically, a special AN, which does not require null-space in the channel, is designed based on the quality of service requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN canceling signal is properly designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper’s performance. Furthermore, two simple closed-form expressions of the achievable secure throughput are derived. The first one is given in a closed-form for the case of ARQ scheme without AN, while the second one is given in an upper-bound form for the case of ARQ with AN. Moreover, this paper addresses two critical security-associated problems: 1) the joint design of secrecy, reliability, throughput, delay and the tradeoff among them, and 2) the increase in the peak-to-average power ratio (PAPR) due to the added AN. Finally, the proposed design is extended to OFDM to demonstrate its capability in not only enhancing the secrecy due to the frequency selectivity of the channel, but also in reducing the PAPR and out-of-band emission of OFDM-based waveforms, while maintaining secrecy.

[1]  Yichen Wang,et al.  Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks , 2017, IEEE Access.

[2]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Jinho Choi,et al.  On Channel-Aware Secure HARQ-IR , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Hüseyin Arslan,et al.  Cyclic feature suppression for physical layer security , 2017, Phys. Commun..

[5]  Haji M. Furqan,et al.  Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[6]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[7]  Haji M. Furqan,et al.  Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[8]  Jehad M. Hamamreh,et al.  Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[9]  Yong Xi,et al.  Packet Error Rate Analysis and Power Allocation for CC-HARQ Over Rayleigh Fading Channels , 2014, IEEE Communications Letters.

[10]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[11]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[12]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[13]  Yi Hong,et al.  Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.

[14]  Dimitris A. Pados,et al.  Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Jehad M. Hamamreh,et al.  A practical physical-layer security method for precoded OSTBC-based systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[16]  Erik G. Larsson,et al.  Optimal Power Allocation for Hybrid ARQ with Chase Combining in i.i.d. Rayleigh Fading Channels , 2013, IEEE Transactions on Communications.

[17]  Hüseyin Arslan,et al.  Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[18]  Chan Wong Wong,et al.  Secret sharing in fast fading channels based on reliability-based hybrid ARQ , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[19]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[20]  Leszek Szczecinski,et al.  Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).

[21]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[22]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[23]  Jehad M. Hamamreh,et al.  On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..

[24]  Jehad M. Hamamreh,et al.  Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.

[25]  Nicola Laurenti,et al.  Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.

[26]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[27]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[28]  Pierre Duhamel,et al.  Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[29]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[30]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[31]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[32]  Arafat J. Al-Dweik,et al.  Low Complexity Power Optimization Algorithm for Multimedia Transmission Over Wireless Networks , 2015, IEEE Journal of Selected Topics in Signal Processing.

[33]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.