Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay

We investigate a relay network where a multi-antenna source can potentially utilize an unauthenticated (untrusted) relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We present a low-complexity scheme denoted as imbalanced beamforming based on linear beamforming and constellation mapping that ensures perfect physical-layer security even while utilizing the untrusted relay. Furthermore, the security of the scheme holds even if the relay adopts the conventional decode-and-forward protocol, unlike prior work. Simulation results show that the proposed imbalanced signaling maintains a constant BER of 0.5 at the eavesdropper at any SNR and number of source antennas, while maintaining or improving the detection performance of the destination compared to not utilizing the relay or existing security methods.

[1]  Ramesh Annavajjala,et al.  On the optimality of bit detection of certain digital modulations , 2005, IEEE Transactions on Communications.

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[5]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[6]  A. Lee Swindlehurst,et al.  Dirty Paper Coding versus Linear GSVD-Based Precoding in MIMO Broadcast Channel with Confidential Messages , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[7]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2009, EURASIP J. Wirel. Commun. Netw..

[8]  Stephan Pfletschinger,et al.  Error Floor Removal for Bit-Interleaved Coded Modulation with Iterative Detection , 2006, IEEE Transactions on Wireless Communications.

[9]  Matthew C. Valenti,et al.  Constellation Labeling Maps for Low Error Floors , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[10]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[11]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[12]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[13]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[14]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[15]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[16]  Dongwoo Kim,et al.  BER analysis for decode-and-forward relaying in dissimilar Rayleigh fading channels , 2007, IEEE Communications Letters.