Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications

Network coding is an efficient means to improve the spectrum efficiency of satellite communications. However, its resilience to eavesdropping attacks is not well understood. This paper studies the confidentiality issue in a bidirectional satellite network consisting of two mobile users who want to exchange message via a multibeam satellite using the XOR network coding protocol. We aim to maximize the sum secrecy rate by designing the optimal beamforming vector along with optimizing the return and forward link time allocation. The problem is nonconvex, and we find its optimal solution using semidefinite programming together with a 1-D search. For comparison, we also solve the sum secrecy rate maximization problem for a conventional reference scheme without using network coding. Simulation results using realistic system parameters demonstrate that the bidirectional scheme using network coding provides considerably higher secrecy rate compared with that of the conventional scheme.

[1]  Rahim Tafazolli,et al.  Network Coding Theory: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Jianhua Lu,et al.  Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.

[3]  Carlos Mosquera,et al.  Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures , 2012, EURASIP J. Wirel. Commun. Netw..

[4]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[5]  Daniel Enrique Lucani,et al.  Codes and balances: Multibeam satellite load balancing with coded packets , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Larry Wissel,et al.  Megagate ASICs for the Thuraya satellite digital signal processor , 2002, Proceedings International Symposium on Quality Electronic Design.

[7]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[8]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[9]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Cheol-Sung Kim,et al.  Performance Evaluation for A closed loop power control using An Efficient Channel Estimation in SAT-CDMA , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[11]  Gregg H. Gunsch,et al.  An overview of the IRIDIUM (R) low Earth orbit (LEO) satellite system , 1998, Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No.98CH36185).

[12]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[13]  魏文,et al.  Propagation data and prediction methods required for the design of Earth-space telecommunication systems , 2009 .

[14]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  John S. Baras,et al.  Security issues in hybrid networks with a satellite component , 2005, IEEE Wireless Communications.

[17]  Björn E. Ottersten,et al.  Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.

[18]  Arsenia Chorti Helping interferer physical layer security strategies for M-QAM and M-PSK systems , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[19]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[20]  Athina P. Petropulu,et al.  Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Kaizhi Huang,et al.  Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels , 2013, IEEE Communications Letters.

[22]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Steven W. McLaughlin,et al.  Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.

[25]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[26]  Hartmut Brandt,et al.  An experimental demonstration of Network Coding for satellite networks , 2011 .

[27]  Ana I. Pérez-Neira,et al.  Design of an on-board beam generation process for the forward link of a multi-beam broadband satellite system , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[28]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[29]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[30]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[31]  Francesco Rossetto A comparison of different physical layer network coding techniques for the satellite environment , 2010, 2010 5th Advanced Satellite Multimedia Systems Conference and the 11th Signal Processing for Space Communications Workshop.

[32]  A. Lee Swindlehurst,et al.  Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[33]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[34]  Daniel Enrique Lucani,et al.  Systematic design of network coding-aware buffering strategies , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[35]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[36]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[37]  B. Hassibi,et al.  The MIMO wiretap channel , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[38]  Carlos Mosquera,et al.  Joint Linear Precoding and Beamforming for the Forward Link of Multi-Beam Broadband Satellite Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[39]  Mazen O. Hasna,et al.  On Hierarchical Network Coding Versus Opportunistic User Selection for Two-Way Relay Channels with Asymmetric Data Rates , 2013, IEEE Transactions on Communications.

[40]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[41]  Anja Klein,et al.  Regenerative Multi-Group Multi-Way Relaying , 2011, IEEE Transactions on Vehicular Technology.

[42]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[43]  L. Cottatellucci 1 Interference Mitigation Techniques for Broadband Satellite Systems , 2006 .

[44]  Laura Cottatellucci,et al.  Interference mitigation techniques for broadband satellite system , 2006 .

[45]  Jun Du,et al.  Channel Modeling and Simulation in Satellite Mobile Communication Systems , 1992, IEEE J. Sel. Areas Commun..

[46]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[47]  Muhammad Ali Imran,et al.  Semi-Adaptive Beamforming for OFDM Based Hybrid Terrestrial-Satellite Mobile System , 2012, IEEE Transactions on Wireless Communications.

[48]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.

[49]  Luc Vandendorpe,et al.  Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.

[50]  Gerhard Bauch,et al.  MIMO two-way relaying with transmit CSI at the relay , 2007, 2007 IEEE 8th Workshop on Signal Processing Advances in Wireless Communications.

[51]  Daniel Enrique Lucani,et al.  Load-aware soft-handovers for multibeam satellites: A network coding perspective , 2012, 2012 6th Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop (SPSC).

[52]  Zhu Han,et al.  Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints , 2011, IEEE Transactions on Information Forensics and Security.

[53]  Symeon Chatzinotas,et al.  Linear and nonlinear techniques for multibeam joint processing in satellite communications , 2012, EURASIP J. Wirel. Commun. Netw..

[54]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[55]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[56]  Shahrokh Valaee,et al.  Joint control of delay and packet drop rate in satellite systems using network coding , 2010, 2010 5th Advanced Satellite Multimedia Systems Conference and the 11th Signal Processing for Space Communications Workshop.

[57]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[58]  Haitham S. Cruickshank,et al.  Securing multicast in DVB-RCS satellite systems , 2005, IEEE Wireless Communications.

[59]  Mikko Vehkaperä,et al.  On the ergodic secrecy capacity of MIMO wiretap channels with statistical CSI , 2014, 2014 International Symposium on Information Theory and its Applications.