Achieve Practical Secrecy with Vector Perturbation Precoding

Vector perturbation (VP) precoding which utilizes a scaled Gaussian vector to minimize the effective transmit power is proved can obtain better diversity compared with linear precoding techniques. In this paper, we apply VP precoding in wireless MIMO wiretap channels to obtain practical physical layer security which aims at maximizing eavesdropper’s error probability. The proposed scheme can also avoid performance loss introduced by artificial noise (AN) based secure schemes. New limit of perturbation vector is developed to guarantee practical secrecy and a new sphere decoder is given to meet such limitation. Furthermore, a modified VP scheme is proposed to reduce the complexity introduced by sphere decoder. Simulation results show that the proposed scheme could also achieve practical secrecy as AN based schemes, and better performance is obtained at the intended user with proposed scheme at the cost of computation complexity.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Ping Zhang,et al.  Vector Perturbation Precoding Under Imperfect CSI and Inaccurate Power Scaling Factors , 2019, IEEE Access.

[3]  Amir K. Khandani,et al.  Communication Over MIMO Broadcast Channels Using Lattice-Basis Reduction , 2006, IEEE Transactions on Information Theory.

[4]  Erik Agrell,et al.  Faster Recursions in Sphere Decoding , 2009, IEEE Transactions on Information Theory.

[5]  Rahim Tafazolli,et al.  Low-Complexity MU-MIMO Nonlinear Precoding Using Degree-2 Sparse Vector Perturbation , 2016, IEEE Journal on Selected Areas in Communications.

[6]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[7]  Yi Hong,et al.  Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.

[8]  R. Zamir Lattices are everywhere , 2009, 2009 Information Theory and Applications Workshop.

[9]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[10]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[13]  A. Lee Swindlehurst,et al.  A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.

[14]  Inkyu Lee,et al.  Modulo Loss Reduction for Vector Perturbation Systems , 2010, IEEE Transactions on Communications.

[15]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.