Phase-Only Zero Forcing for Secure Communication With Multiple Antennas

Artificial noise (AN) transmission can enhance the secrecy in multiantenna wireless channels by superimposing judiciously constructed synthetic noise signals over information signals during transmission. Motivated by the large-scale multiple-input multiple-output systems, we study AN transmission under a constraint that all elements (weights) in each beamforming vector must have a constant magnitude, but can have arbitrary phases. For the special case of one AN beamforming vector and one legitimate receiver, we derive a necessary and sufficient condition for finding a beamforming vector in the null space of the legitimate receiver's channel and provide a geometric interpretation. For the independent identically distributed Rayleigh fading channel, we derive an approximate expression for the probability of failing to find such a beamforming vector, and show that it decreases exponentially in the square of the number of transmit antennas. For the general case, we propose a numerical algorithm for obtaining a set of mutually orthogonal AN beamforming vectors in the null space of all the receivers. Our approach involves reducing the problem to an unconstrained nonlinear programming problem, which is then solved using the Gauss-Newton method. We show numerically that our proposed algorithm performs significantly better than a heuristic relaxation approach. Finally, for a multiantenna system with multiple RF chains, we show numerically that the secrecy rate achieved by our proposed approach is close to that achieved by the AN transmission with unconstrained beamforming, when the number of transmit antennas is sufficiently large.

[1]  Robert W. Heath,et al.  An Overview of Signal Processing Techniques for Millimeter Wave MIMO Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[2]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[3]  Peng Ning,et al.  Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.

[4]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[5]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[6]  Robert W. Heath,et al.  Frequency Selective Hybrid Precoding for Limited Feedback Millimeter Wave Systems , 2015, IEEE Transactions on Communications.

[7]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[8]  Matthew R. McKay,et al.  Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.

[9]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[10]  Can Emre Koksal,et al.  Securing massive MIMO at the physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[11]  Larry J. Greenstein,et al.  A semi-empirical representation of antenna diversity gain at cellular and PCS base stations , 1997, IEEE Trans. Commun..

[12]  Wenyu Luo,et al.  Analysis of Pilot Contamination on the Security Performance of Artificial Noise in MIMO Systems , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[13]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[14]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[15]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[16]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[17]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[18]  Jeffrey G. Andrews,et al.  Space Division Multiple Access With a Sum Feedback Rate Constraint , 2007, IEEE Transactions on Signal Processing.

[19]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[20]  Yuval Kochman,et al.  The Gap to Practical MIMO Wiretap Codes , 2016 .

[21]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[22]  Yuan Ding,et al.  A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters , 2014, IEEE Transactions on Antennas and Propagation.

[23]  A. Hajimiri,et al.  Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.

[24]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[25]  A. Babakhani,et al.  Near-field direct antenna modulation , 2009, IEEE Microwave Magazine.

[26]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[27]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[28]  Alle-Jan van der Veen,et al.  Analog Beamforming in MIMO Communications With Phase Shift Networks and Online Channel Estimation , 2010, IEEE Transactions on Signal Processing.

[29]  Kenneth Levenberg A METHOD FOR THE SOLUTION OF CERTAIN NON – LINEAR PROBLEMS IN LEAST SQUARES , 1944 .

[30]  Antonia Maria Tulino,et al.  Impact of antenna correlation on the capacity of multiantenna channels , 2005, IEEE Transactions on Information Theory.

[31]  James M. Ortega,et al.  Iterative solution of nonlinear equations in several variables , 2014, Computer science and applied mathematics.

[32]  Michael P Daly,et al.  Beamsteering in Pattern Reconfigurable Arrays Using Directional Modulation , 2010, IEEE Transactions on Antennas and Propagation.

[33]  Ashish Khisti,et al.  Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.

[34]  Wei Yu,et al.  Hybrid digital and analog beamforming design for large-scale MIMO systems , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[35]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[36]  Dirk T. M. Slock,et al.  An optimized unitary beamforming technique for MIMO broadcast channels , 2010, IEEE Transactions on Wireless Communications.

[37]  D. Marquardt An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .