Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security

Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet keeping AN disruptive to possible eavesdroppers (Eves). The scenario considered here is a multiple-input single-output wiretap channel with multiple Eves. This paper starts from AN design without any knowledge of Eve’s CSI, builds with solutions with statistical CSI up to full CSI. Both perfect and imperfect channel information have been considered, in particular, with different extent of Eves’ channel responses. The main objective is to improve the receive signal-to-interference and noise ratio at IR through exploitation of AN power in an attempt to minimize the total transmit power, while hindering detection at the Eves. Numerical simulations demonstrate that the proposed constructive AN precoding approach yields superior performance over conventional AN schemes in terms of transmit power. Critically, they show that, while the statistical constraints of conventional approaches may lead to instantaneous IR outages and security breaches from the Eves, the instantaneous constraints of our approach guarantee both IR performance and secrecy at every symbol period.

[1]  Christos Masouros,et al.  Exploiting Constructive Mutual Coupling in P2P MIMO by Analog-Digital Phase Alignment , 2017, IEEE Transactions on Wireless Communications.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[4]  Christos Masouros,et al.  Adaptive code allocation for interference management on the downlink of DS-CDMA systems , 2008, IEEE Transactions on Wireless Communications.

[5]  Erica L. Daly,et al.  Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.

[6]  Christos Masouros,et al.  Transmit Precoding for Interference Exploitation in the Underlay Cognitive Radio Z-channel , 2016, IEEE Transactions on Signal Processing.

[7]  Christos Masouros,et al.  Massive MIMO 1-Bit DAC Transmission: A Low-Complexity Symbol Scaling Approach , 2017, IEEE Transactions on Wireless Communications.

[8]  Mathini Sellathurai,et al.  Vector Perturbation Based on Symbol Scaling for Limited Feedback MISO Downlinks , 2014, IEEE Transactions on Signal Processing.

[9]  Yangyang Zhang,et al.  Probabilistically Robust SWIPT for Secrecy MISOME Systems , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Tharmalingam Ratnarajah,et al.  Known interference in the cellular downlink: a performance limiting factor or a source of green signal power? , 2013, IEEE Communications Magazine.

[11]  Christos Masouros,et al.  Exploiting Constructive Interference for Simultaneous Wireless Information and Power Transfer in Multiuser Downlink Systems , 2016, IEEE Journal on Selected Areas in Communications.

[12]  Symeon Chatzinotas,et al.  Symbol-Level Multiuser MISO Precoding for Multi-Level Adaptive Modulation , 2016, IEEE Transactions on Wireless Communications.

[13]  Christos Masouros,et al.  Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization , 2015, IEEE Transactions on Signal Processing.

[14]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[15]  Symeon Chatzinotas,et al.  Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.

[16]  Christos Masouros,et al.  Correlation Rotation Linear Precoding for MIMO Broadcast Communications , 2011, IEEE Transactions on Signal Processing.

[17]  Muhammad R. A. Khandaker,et al.  One- and Two-Way Relay Optimization for MIMO Interference Networks , 2017, ArXiv.

[18]  Christos Masouros,et al.  Rethinking the role of interference in wireless networks , 2014, IEEE Communications Magazine.

[19]  Christos Masouros,et al.  Constant Envelope Precoding by Interference Exploitation in Phase Shift Keying-Modulated Multiuser Transmission , 2017, IEEE Transactions on Wireless Communications.

[20]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Christos Masouros,et al.  Interference-Driven Antenna Selection for Massive Multiuser MIMO , 2016, IEEE Transactions on Vehicular Technology.

[22]  Christos Masouros,et al.  Large Scale Antenna Selection and Precoding for Interference Exploitation , 2017, IEEE Transactions on Communications.

[23]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[25]  V. Erceg,et al.  TGn Channel Models , 2004 .

[26]  C. Masouros,et al.  Interference exploitation using adaptive code allocation for the downlink of precoded multiple carrier code division multiple access systems , 2008, IET Commun..

[27]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[28]  Christos Masouros,et al.  Two-stage transmitter precoding based on data-driven code-hopping and partial zero forcing beamforming for MC-CDMA communications , 2009, IEEE Transactions on Wireless Communications.

[29]  Muhammad R. A. Khandaker,et al.  Interference MIMO Relay Channel: Joint Power Control and Transceiver-Relay Beamforming , 2012, IEEE Transactions on Signal Processing.

[30]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[31]  Christos Masouros,et al.  Constructive interference based secure precoding , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[32]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[33]  Christos Masouros,et al.  Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems , 2009, IEEE Transactions on Wireless Communications.

[34]  Christos Masouros,et al.  A Novel Transmitter-Based Selective-Precoding Technique for DS/CDMA Systems , 2007, 2007 IEEE International Conference on Communications.

[35]  Symeon Chatzinotas,et al.  Secure M-PSK communication via directional modulation , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[36]  Symeon Chatzinotas,et al.  Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.

[37]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[38]  Muhammad R. A. Khandaker,et al.  Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers , 2015, IEEE Wireless Communications Letters.