Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation

In this work, Automatic-Repeat-Request (ARQ) and Maximal Ratio Combination (MRC), have been jointly exploited to enhance the confidentiality of wireless services requested by a legitimate user (Bob) against an eavesdropper (Eve). The obtained security performance is analyzed using Packet Error Rate (PER), where the exact PER gap between Bob and Eve is determined. PER is proposed as a new practical security metric in cross layers (Physical/MAC) security design since it reflects the influence of upper layers mechanisms, and it can be linked with Quality of Service (QoS) requirements for various digital services such as voice and video. Exact PER formulas for both Eve and Bob in i.i.d Rayleigh fading channel are derived. The simulation and theoretical results show that the employment of ARQ mechanism and MRC on a signal level basis before demodulation can significantly enhance data security for certain services at specific SNRs. However, to increase and ensure the security of a specific service at any SNR, adaptive modulation is proposed to be used along with the aforementioned scheme. Analytical and simulation studies demonstrate orders of magnitude difference in PER performance between eavesdroppers and intended receivers.

[1]  Yong Xi,et al.  Packet Error Rate Analysis and Power Allocation for CC-HARQ Over Rayleigh Fading Channels , 2014, IEEE Communications Letters.

[2]  Huseyin Arslan,et al.  Cyclic Feature Concealing CP Selection for Physical Layer Security , 2014, 2014 IEEE Military Communications Conference.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[6]  Nicola Laurenti,et al.  Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[8]  Erik G. Larsson,et al.  Optimal Power Allocation for Hybrid ARQ with Chase Combining in i.i.d. Rayleigh Fading Channels , 2013, IEEE Transactions on Communications.

[9]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[10]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[11]  Dimitris A. Pados,et al.  Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[13]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[14]  Ming Li,et al.  Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.

[15]  H. Vincent Poor,et al.  Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.

[16]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Pierre Duhamel,et al.  Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[19]  Erik G. Larsson,et al.  Optimal Power Allocation for Hybrid ARQ with Chase Combining in i , 2013 .

[20]  Leszek Szczecinski,et al.  Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).