Power allocation of random masked beamforming for guaranteed secure communications

In order to avoid eavesdropping, beamforming can be used not only to induce artificial noise or jamming signal to an eavesdropper, but also transmit desired signals to a legitimate user (or sensor) from an access point (AP) equipped with an antenna array. In this paper, with proper power allocation, we show that beamforming under a rich scattering environment can guarantee a certain secrecy rate with an overwhelming probability. This approach becomes attractive for slow fading channels where the ergodic secrecy rate cannot be used to decide a target secrecy rate.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[4]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[7]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[8]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[9]  Joseph M. Kahn,et al.  Fading correlation and its effect on the capacity of multielement antenna systems , 2000, IEEE Trans. Commun..

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Jinho Choi,et al.  Secret key agreement under an active attack in MU-TDD systems with large antenna arrays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[12]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[13]  P. Massart,et al.  Adaptive estimation of a quadratic functional by model selection , 2000 .

[14]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[15]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[16]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[17]  Per-Simon Kildal,et al.  Correlation and capacity of MIMO systems and mutual coupling, radiation efficiency, and diversity gain of their antennas: simulations and measurements in a reverberation chamber , 2004, IEEE Communications Magazine.