MIMO Secret Communications Against an Active Eavesdropper

This paper considers a scenario in which an <italic>Alice</italic>–<italic>Bob</italic> pair wishes to communicate in secret in the presence of an active <italic>Eve</italic>, who is capable of jamming as well as eavesdropping and operates in full-duplex (FD) mode. As countermeasure, <italic>Bob</italic> operates in FD mode, using a subset of its antennas to receive, and the remaining antennas to transmit jamming noise. <italic>Alice</italic> and <italic>Bob</italic> employ linear precoding, and all nodes use Gaussian code books. In that context, our goal is to maximize the achievable secrecy degrees of freedom (S.D.o.F.) of the system. We provide the optimal receive/transmit antennas allocation at <italic>Bob</italic>, based on which we determine in closed form the maximum achievable S.D.o.F. We also provide a method for constructing the precoding matrices of <italic>Alice</italic> and <italic>Bob</italic>, based on which the maximum S.D.o.F. can be achieved. We further investigate the adverse scenario in which <italic>Eve</italic> knows <italic>Bob</italic>’s transmission strategy and optimizes its transmit/receive antennas allocation in order to minimize the achievable S.D.o.F. For that case, we find the worst case achievable S.D.o.F. Numerical results validate the theoretical findings and demonstrate the performance of the proposed method.

[1]  James S. Lehnert,et al.  Optimal cooperative jamming for security , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[2]  Andrey Garnaev,et al.  To Eavesdrop or Jam, That is the Question , 2013, ADHOCNETS.

[3]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[4]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[5]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[6]  H. Vincent Poor,et al.  On unbounded path-loss models: effects of singularity on wireless network performance , 2009, IEEE Journal on Selected Areas in Communications.

[7]  A. Lee Swindlehurst,et al.  Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[8]  Mohammad Reza Javan Guaranteeing secure communication in OFDM network with an active eavesdropper , 2014, 7'th International Symposium on Telecommunications (IST'2014).

[9]  Zhi Chen,et al.  A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.

[10]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[11]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[12]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[13]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.

[14]  Aylin Yener,et al.  Secure degrees of freedom of N ×N ×M wiretap channel with a K-antenna cooperative jammer , 2015, 2015 IEEE International Conference on Communications (ICC).

[15]  Sennur Ulukus,et al.  Secrecy in broadcast channel with combating helpers and interference channel with selfish users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[16]  Zhi Chen,et al.  Secrecy degrees of freedom of a MIMO Gaussian wiretap channel with a cooperative jammer , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[18]  George T. Amariucai,et al.  Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.

[19]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[20]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[21]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[22]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[23]  Jeffrey G. Andrews,et al.  MIMO Interference Alignment Over Correlated Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[24]  Sennur Ulukus,et al.  Achievable secrecy rates in the multiple access wiretap channel with deviating users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[25]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO transmission in the presence of an active eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).

[26]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[27]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[28]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[29]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[30]  Jianwei Xie,et al.  Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.

[31]  Athina P. Petropulu,et al.  Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[32]  Wan Choi,et al.  Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.

[33]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[34]  H. Vincent Poor,et al.  A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.

[35]  Zhi Chen,et al.  Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[36]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[37]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[38]  Azzam Al-Nahari,et al.  Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers , 2016, IET Commun..

[39]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[40]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[41]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[42]  Aylin Yener,et al.  Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[43]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[44]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[45]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[46]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.