An Electromagnetic Analysis of Noise-Based Intrinsically Secure Communication in Wireless Systems

Recently there has been an increasing interest toward unconditionally secure communication systems in which the mechanism assuring the secrecy of the message is physical and not computational. An interesting approach proposed in the information theory literature for unconditionally secure communication is based on the use of artificial noise at a rate related to the difference between the mutual information in perfect secrecy. Since the mechanism assuring the secrecy of the message is physical and not computational, the unauthorized receiver cannot obtain information from the received signal, regardless of how much computational power is available. For this reason, such a cryptographic system is called unconditionally secure. The aim of this paper is to investigate an electromagnetic approach to the noise-based wireless communication systems stressing the important role of the electromagnetic propagation and antenna design. In particular, the concept of the number of degrees of freedom of the field is used to clarify the physical mechanism that allows for a decrease in the mutual information of the unauthorized channel compared to the eavesdropper channel. Numerical examples regarding both free-space propagation and rich scattering environments are shown, confirming the importance of the role of the electromagnetic propagation and antenna design.

[1]  M.A. Jensen,et al.  A review of antennas and propagation for MIMO wireless communications , 2004, IEEE Transactions on Antennas and Propagation.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Krishnamoorthy Iyer Broadcast channel with confidential messages and secret keys , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[4]  J. Wallace,et al.  Capacity of the Continuous-Space Electromagnetic Channel , 2008, IEEE Transactions on Antennas and Propagation.

[5]  D. Jason Palmer Noise keeps the spooks off your back , 2007 .

[6]  M. Migliore,et al.  On Electromagnetics and Information Theory , 2008, IEEE Transactions on Antennas and Propagation.

[7]  M. Migliore On the role of the number of degrees of freedom of the field in MIMO channels , 2006, IEEE Transactions on Antennas and Propagation.

[8]  M. Migliore On the Sampling of the Electromagnetic Field Radiated by Sparse Sources , 2015, IEEE Transactions on Antennas and Propagation.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[11]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[12]  Nader Mokari,et al.  Secure communications in OFDMA decode and forward relay assisted networks in presence of multiple eavesdroppers , 2016, 2016 8th International Symposium on Telecommunications (IST).

[13]  Chiman Kwan,et al.  Unconditionally secure credit/debit card chip scheme and physical unclonable function , 2016, ArXiv.

[14]  Tharmalingam Ratnarajah,et al.  Secrecy Outage Analysis of $k$ th Best Link in Random Wireless Networks , 2017, IEEE Transactions on Communications.

[15]  Adrian Cho,et al.  Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.

[16]  F. K. Gruber,et al.  New Aspects of Electromagnetic Information Theory for Wireless and Antenna Systems , 2008, IEEE Transactions on Antennas and Propagation.

[17]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[18]  Marco Donald Migliore,et al.  Effectively Exploiting Parasitic Arrays for Secret Key Sharing , 2016, IEEE Transactions on Vehicular Technology.

[19]  G. Franceschetti,et al.  On the degrees of freedom of scattered fields , 1989 .

[20]  H. Vincent Poor,et al.  The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.