A Versatile Secure Transmission Strategy in the Presence of Outdated CSI

We study secure transmission considering the practical scenario in which only outdated knowledge of the legitimate receiver's channel and statistical knowledge of the eavesdropper's channel are available at the transmitter. Conditioned on the limited channel knowledge, we adopt an on-off secure transmission scheme and propose a versatile strategy to determine the codeword transmission rate. We first analyze the outage performance of the system and then provide the design of optimal wiretap code parameters maximizing the secrecy throughput. Compared with the existing solution in the literature, the proposed secure transmission design enlarges the achievable reliability-security region and increases the maximum secrecy throughput.

[1]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[3]  Gilles Burel,et al.  Hierarchical Space-Time Block Code Recognition Using Correlation Matrices , 2008, IEEE Transactions on Wireless Communications.

[4]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[5]  Wenbo Wang,et al.  Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.

[6]  Octavia A. Dobre,et al.  Blind Identification of Spatial Multiplexing and Alamouti Space-Time Block Code via Kolmogorov-Smirnov (K-S) Test , 2014, IEEE Communications Letters.

[7]  Yahia A. Eldemerdash,et al.  Second-Order Cyclostationarity of BT-SCLD Signals: Theoretical Developments and Applications to Signal Classification and Blind Parameter Estimation , 2013, IEEE Transactions on Wireless Communications.

[8]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[9]  George K. Karagiannidis,et al.  Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.

[10]  Gilles Burel,et al.  Blind Recognition of Linear Space–Time Block Codes: A Likelihood-Based Approach , 2010, IEEE Transactions on Signal Processing.

[11]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Norman C. Beaulieu,et al.  On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..

[14]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Matthew R. McKay,et al.  Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.

[16]  Octavia A. Dobre,et al.  Identification of SM-OFDM and AL-OFDM Signals Based on Their Second-Order Cyclostationarity , 2015, IEEE Transactions on Vehicular Technology.

[17]  Xiangyun Zhou,et al.  On–Off-Based Secure Transmission Design With Outdated Channel State Information , 2016, IEEE Transactions on Vehicular Technology.

[18]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[19]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[20]  Yahia A. Eldemerdash,et al.  Blind Identification of SM and Alamouti STBC-OFDM Signals , 2015, IEEE Transactions on Wireless Communications.

[21]  Gerhard Fettweis,et al.  Algorithm for Detecting the Number of Transmit Antennas in MIMO-OFDM Systems , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[22]  Yueming Cai,et al.  A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.

[23]  M. Berbineau,et al.  Blind detection of the number of transmitting antennas for spatially-correlated MIMO systems , 2011, 2011 11th International Conference on ITS Telecommunications.

[24]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[25]  Octavia A. Dobre,et al.  Signal identification for emerging intelligent radios: classical problems and new challenges , 2015, IEEE Instrumentation & Measurement Magazine.

[26]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[27]  Y. Bar-Ness,et al.  Blind modulation classification: a concept whose time has come , 2005, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005..