Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis

A novel approach for ensuring confidential wireless communication is proposed and analyzed from an information-theoretic standpoint. In this approach, the legitimate receiver generates artificial noise (AN) to impair the intruder's channel. This method is robust because it does not need the feedback of channel state information (CSI) to the transmitter and does not assume that the number of Eve's antennas should be smaller than that of Bob. Furthermore, we propose a new concept of outage secrecy region to evaluate the secrecy performance from a geometrical perspective. This should be useful if we need to know what zone should be protected (or militarized). Analysis and simulation results in practical environments show that the proposed method has a good performance.

[1]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[2]  Chong-Yung Chi,et al.  Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[5]  Sang Wu Kim,et al.  Co-Channel Interference Cancellation Using Single Radio Frequency and Baseband Chain , 2010, IEEE Transactions on Communications.

[6]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[7]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[8]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[9]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[10]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[11]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[12]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[13]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[14]  Jing Wang,et al.  Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).