Unconditional Secrecy and Computational Complexity against Wireless Eavesdropping

Unconditional secrecy (UNS) of a wireless transmission scheme refers to the minimum amount of secrecy of the scheme subject to eavesdropping by eavesdropper (Eve) with any number of antennas and any noise level. For each coherence period of wireless channels, the UNS achievable is known to be limited by the entropy of user’s reciprocal channel state information (subject to a proper level of quantization). While UNS rate may be too limited for environment with low mobility, it is possible to design physical layer encryption methods to increase the computational complexities that Eve has to overcome in order to break further secrecy beyond UNS. In this paper, we quantify the UNS of several classic transmission schemes and examine the complexity needed to break further secrecy beyond UNS of these schemes. We also provide a UNS and complexity analysis of a recently proposed physical layer encryption scheme called randomized reciprocal channel modulation (RRCM), and show an example where the complexity may exceed Eve’s capability.

[1]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[2]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[3]  Rafael F. Schaefer,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[4]  Yingbo Hua,et al.  Advanced Properties of Full-Duplex Radio for Securing Wireless Network , 2019, IEEE Transactions on Signal Processing.

[5]  H. Vincent Poor,et al.  Secure Key Generation for Distributed Inference in IoT Invited Presentation , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).

[6]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[7]  Yingbo Hua,et al.  Secrecy Analyses of a Full-Duplex MIMOME Network , 2019, IEEE Transactions on Signal Processing.

[8]  Changick Song,et al.  Leakage Rate Analysis for Artificial Noise Assisted Massive MIMO With Non-Coherent Passive Eavesdropper in Block-Fading , 2018, IEEE Transactions on Wireless Communications.

[9]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[10]  Abbas El Gamal,et al.  Wiretap Channel With Causal State Information , 2012, IEEE Trans. Inf. Theory.

[11]  Chong-Yung Chi,et al.  Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.

[12]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..