Security protection over wireless fading channels by exploiting frequency selectivity

Secure wireless communication has always been a hot research topic due to the vulnerabilities associated with wireless channel. Physical layer aspects to secure wireless communication, based on the information-theoretic security and signal processing methods have gained much recognition over the last decade. Specifically, artificial noise (AN) methods are assumed to be good means for providing security against potential eavesdroppers in multi-input multi-output (MIMO) systems and/or relay systems. However, there are still a large number of nodes which do not have multi-antennas or support sophisticated protocols in wireless networks. In this paper, a novel AN-aided method is proposed to secure wireless communications between the legitimate users (not equipped with multiple antennas) in the presence of an eavesdropper. In this proposed method frequency selective property of wireless channel is exploited. The basic principle is same in which transmitter generate random AN signal utilizing some of the transmission power to confuse eavesdropper. However artificial noise is generated in such a way that it appears to be zero at the sampling time, only for the legitimate receiver while degrading eavesdropper's channel. Artificial noise is specified using the channel state information (CSI) of the legitimate users' link. However, the secrecy of proposed scheme doesn't depend on the secrecy of CSI. Extensive simulation suggests that the proposed scheme can effectively utilized for securing wireless transmissions.

[1]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[4]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[5]  Xianbin Wang,et al.  Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.

[6]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Mohsen Guizani,et al.  Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.

[9]  B. P. Lathi,et al.  Modern Digital and Analog Communication Systems , 1983 .

[10]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[11]  Willie K. Harrison,et al.  Parity modifications and stopping sets in high-rate codes for physical-layer security , 2014, 2014 IEEE Conference on Communications and Network Security.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Li Sun,et al.  Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.

[14]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[15]  William H. Tranter,et al.  Principles of Communication Systems Simulation with Wireless Applications , 2004 .

[16]  Zhi Xue,et al.  Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver , 2014, 9th International Conference on Communications and Networking in China.

[17]  Bingli Jiao,et al.  Artificial-noise strategy for single-antenna systems over multi-path fading channels , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[20]  Li Sun,et al.  On achievable secrecy rate by noise aggregation over wireless fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[21]  Wenbo Wang,et al.  Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.

[22]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[23]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[24]  Hüseyin Arslan,et al.  Achieving secure communication through pilot manipulation , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[25]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.