Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System

Sparse code multiple access (SCMA) is a promising candidate air interface of next-generation mobile networks. In this paper, we focus on a downlink SCMA system where a transmitter sends confidential messages to multiple users in the presence of external eavesdroppers. Consequently, we develop a novel secure transmission approach over physical layer based on a highly structured SCMA codebook design. In our proposed scheme, we rotate the base constellations (BCs) with random angles by extracting channel phases from the channel state information. By employing randomized constellation rotation, the security of downlink SCMA can be ensured. In addition, a tight SCMA upper bound is introduced to guide the design of the encrypted codebook. As a result, we propose an approach to avoid the significant error rate performance loss caused by using codebooks that are designed using our method. The proposed upper-bound-aided codebook design scheme can select relatively good codebooks with low complexity. By combining SCMA codebook design and secure communication, our scheme ensures security for massive quantities of users with low encrypted and decrypted complexity at the cost of transmission rate and possible error rate performance loss. Moreover, the proposed scheme can achieve robustness against channel estimation errors. Analyses and Monte Carlo simulations confirm the effectiveness of our scheme.

[1]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[2]  Trung Q. Duong,et al.  Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.

[3]  Zhi Chen,et al.  Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Robert Michael Tanner,et al.  A recursive approach to low complexity codes , 1981, IEEE Trans. Inf. Theory.

[5]  Jonathan Rodriguez,et al.  A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.

[6]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[7]  Guixia Kang,et al.  A Dimension Distance-Based SCMA Codebook Design , 2017, IEEE Access.

[8]  Milica Stojanovic,et al.  Analysis of the impact of channel estimation errors on the performance of a decision-feedback equalizer in fading multipath channels , 1995, IEEE Trans. Commun..

[9]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[10]  Wen Chen,et al.  Low Complexity Iterative Receiver Design for Sparse Code Multiple Access , 2017, IEEE Transactions on Communications.

[11]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[12]  Alireza Bayesteh,et al.  SCMA Codebook Design , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[13]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[15]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[16]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[17]  Steven W. McLaughlin,et al.  Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.

[18]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[19]  Hosein Nikopour,et al.  Sparse code multiple access , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[20]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[21]  Pingzhi Fan,et al.  An optimized design of SCMA codebook based on star-QAM signaling constellations , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[22]  Hui Zhao,et al.  A top-down SCMA codebook design scheme based on lattice theory , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[23]  Steven W. McLaughlin,et al.  Tandem coding and cryptography on wiretap channels: EXIT chart analysis , 2009, 2009 IEEE International Symposium on Information Theory.

[24]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[26]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[27]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[28]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[29]  Ming Xiao,et al.  Joint Multiuser Detection of Multidimensional Constellations Over Fading Channels , 2017, IEEE Transactions on Communications.

[30]  Hanna Bogucka,et al.  Toward secure energy harvesting cooperative networks , 2015, IEEE Communications Magazine.

[31]  Xiaohu Ge,et al.  5G wireless communication systems: prospects and challenges [Guest Editorial] , 2014 .

[32]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[33]  Lin Yang,et al.  Low Complexity Message Passing Algorithm for SCMA System , 2016, IEEE Communications Letters.