Efficient Receive Beamformers for Secure Spatial Modulation against a Malicious Full-duplex Attacker with Eavesdropping Ability

In this paper, we consider a new secure spatial modulation scenario with a full-duplex (FD) malicious attacker Mallory owning eavesdropping capacity, where Mallory works on FD model and transmits a malicious jamming such as artificial noise (AN) to interfere with Bob. To suppress the malicious jamming on Bob from Mallory, a conventional maximum receive power (Max-RP) at Bob is presented firstly. Subsequently, to exploit the colored property of noise plus interference at Bob, a whitening-filter-based Max-RP (Max-WFRP) is proposed with an obvious performance enhancement over Max-RP. To completely remove the malicious jamming from Mallory, a Max-RP with a constraint of forcing the malicious jamming from Mallory to zero at Bob is proposed. To further improve secrecy rate (SR) by removing the ZF contraint (ZFC), the maximum signal-to-jamming-plus-noise ratio (Max-SJNR) is proposed. Our proposed methods have closed-form expressions. From simulation results, the four receive beamforming methods have an increasing order in performance: Max-RP, Max-RP with ZFC and Max-SJNR$\approx$Max-WFRP. Additionally, the latter two harvest a substantial performance gains over Max-RP and Max-RP with ZFC in the low and medium signal-to-noise ratio regions.

[1]  Weidang Lu,et al.  Security Enhancement for NOMA-UAV Networks , 2020, IEEE Transactions on Vehicular Technology.

[2]  Joachim Speidel,et al.  Antenna Selection Method of Maximizing Secrecy Rate for Green Secure Spatial Modulation , 2019, IEEE Transactions on Green Communications and Networking.

[3]  Lajos Hanzo,et al.  Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation , 2014, Proceedings of the IEEE.

[4]  Liuqing Yang,et al.  Secure Precoding Aided Spatial Modulation via Transmit Antenna Selection , 2019, IEEE Transactions on Vehicular Technology.

[5]  Gayan Amarasuriya Aruma Baduge,et al.  Effects of Pilot Contamination Attacks in Multi-Cell Multi-User Massive MIMO Relay Networks , 2019, IEEE Transactions on Communications.

[6]  Tolga M. Duman,et al.  Physical Layer Security for Space Shift Keying Transmission With Precoding , 2016, IEEE Wireless Communications Letters.

[7]  Sheng Chen,et al.  Secure Communications for Dual-Polarized MIMO Systems , 2017, IEEE Transactions on Signal Processing.

[8]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[9]  Wei Xie,et al.  Spatial Sparsity Based Secure Transmission Strategy for Massive MIMO Systems Against Simultaneous Jamming and Eavesdropping , 2020, IEEE Transactions on Information Forensics and Security.

[10]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.

[11]  Jiangzhou Wang,et al.  Chunk-based resource allocation in OFDMA systems - part I: chunk allocation , 2009, IEEE Transactions on Communications.

[12]  Feng Shu,et al.  High-Performance Power Allocation Strategies for Secure Spatial Modulation , 2019, IEEE Transactions on Vehicular Technology.

[13]  Harald Haas,et al.  Spatial Modulation , 2008, IEEE Transactions on Vehicular Technology.

[14]  Ning Li,et al.  Secrecy Performance Analysis of Artificial-Noise-Aided Spatial Modulation in the Presence of Imperfect CSI , 2018, IEEE Access.

[15]  Zhu Han,et al.  Joint Source-Relay Secure Precoding for MIMO Relay Networks With Direct Links , 2017, IEEE Transactions on Communications.

[16]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[17]  Lie-Liang Yang,et al.  Secure Spatial Modulation With a Full-Duplex Receiver , 2017, IEEE Wireless Communications Letters.

[18]  Feng Shu,et al.  Two High-Performance Schemes of Transmit Antenna Selection for Secure Spatial Modulation , 2018, IEEE Transactions on Vehicular Technology.

[19]  Xianbin Wang,et al.  Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA , 2019, IEEE Transactions on Vehicular Technology.

[20]  Jinho Choi,et al.  Full-Duplexing Jamming Attack for Active Eavesdropping , 2016, 2016 6th International Conference on IT Convergence and Security (ICITCS).

[21]  Jie Tang,et al.  Joint Precoding Optimization for Secure SWIPT in UAV-Aided NOMA Networks , 2020, IEEE Transactions on Communications.

[22]  Li Wang,et al.  Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.

[23]  Lajos Hanzo,et al.  Transmit Antenna Selection and Beamformer Design for Secure Spatial Modulation With Rough CSI of Eve , 2019, IEEE Transactions on Wireless Communications.