Two-step transmission with artificial noise for secure wireless SIMO communications

The issue of physical layer security of the wireless single-input multiple-output (SIMO) system is addressed in this paper. We propose a two-step transmission scheme with artificial noise to improve the security and the scheme does not require the channel state information of the eavesdropper. In the first step, the destination which has multiple antennas generates a random reference symbol and artificial noise and transmits them in the direction of the source and its orthogonal space, respectively. The reference symbol is received by the source without being polluted by the artificial noise, while it is jammed by the artificial noise for the eavesdropper. In the second step, the symbol of the source is multiplied by the received reference symbol and then transmitted. Finally, the destination can directly estimate the symbol of the source using the reference symbol. However, the eavesdropper needs to additionally estimate the reference symbol for demodulating the symbol of the source, which usually obtains an inaccurate result due to the artificial noise. The information-theoretic security of our scheme is analyzed and a lower bound of the achievable secrecy rate is derived. The performance of the new scheme is compared with that of the traditional approach under different input signals through numerical simulations. The results show that the proposed scheme outperforms the traditional SIMO approach especially in the high SNR region.

[1]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Xiaohua Li,et al.  Array Redundancy and Diversity for Wireless Transmissions with Low Probability of Interception , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[4]  Di Zhao,et al.  Ergodic secrecy rate of two-user MISO interference channels with statistical CSI , 2014, Science China Information Sciences.

[5]  Are Hjørungnes Complex-Valued Matrix Derivatives: Preface , 2011 .

[6]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[7]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[8]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[9]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Anelia Somekh-Baruch,et al.  On Gaussian wiretap channels with M-PAM inputs , 2010, 2010 European Wireless Conference (EW).

[12]  Hon Tat Hui,et al.  Multi-Cell Random Beamforming: Achievable Rate and Degrees of Freedom Region , 2012, IEEE Transactions on Signal Processing.

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[14]  Tao Jiang,et al.  Secure Space-Time Communications Over Rayleigh Flat Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[15]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[16]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[17]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[18]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[19]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[20]  Huiming Wang,et al.  Improving the secrecy rate of wireless SIMO systems via two-step transmission , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[21]  J. Geist Capacity and cutoff rate for dense M-ary PSK constellations , 1990, IEEE Conference on Military Communications.

[22]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Yahong Rosa Zheng,et al.  On the Mutual Information and Power Allocation for Vector Gaussian Channels with Finite Discrete Inputs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.