Securing the MIMO Wiretap Channel with Polar Codes and Encryption

Polar codes have been proven to be capacity achieving for any binary-input discrete memoryless channel, while at the same time they can reassure secure and reliable transmission over the single-input single-output wireless channel. However, the use of polar codes to secure multiple-antenna transmission and reception has not yet been reported in the open literature. In this paper, we assume a multiple-input multiple-output wiretap channel, where the legitimate receiver and the eavesdropper are equipped with the same number of antennas. We introduce a protocol that exploits the properties of both physical and media access control layer security by employing polar coding and encryption techniques in a hybrid manner in order to guarantee secure transmission. A novel security technique is also proposed, where a cryptographic key is generated based on the information transmitted and renewed every transmission block without the need for a separate key exchange method. Finally, to illustrate the effectiveness of the proposed protocol, we prove the weak and strong security conditions, and we provide a practical method to achieve computational security for the cases where these conditions cannot be established.

[1]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[2]  Shengmei Zhao,et al.  A concatenation scheme of Polar codes and space-time block codes in multiple-input multiple-output channels , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[3]  Tobias J. Oechtering,et al.  Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Young-Sik Kim,et al.  A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding , 2014, IEEE Communications Letters.

[5]  Andrew Thangaraj,et al.  Robustness of Physical Layer Security Primitives Against Attacks on Pseudorandom Generators , 2014, IEEE Transactions on Communications.

[6]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[7]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[8]  U. Maurer The Strong Secret Key Rate of Discrete Random Triples , 1994 .

[9]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[10]  Emre Telatar,et al.  On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Walid Saad,et al.  On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[13]  Liang Zhang,et al.  On the polar codes for MIMO , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[14]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[15]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[16]  M. Lavanya,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .

[17]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[18]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[19]  H. Luetkepohl The Handbook of Matrices , 1996 .

[20]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[21]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[22]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[23]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[24]  Sennur Ulukus,et al.  Polar coding for the general wiretap channel , 2014, 2015 IEEE Information Theory Workshop (ITW).

[25]  Meixia Tao,et al.  Polar Coding for Secure Transmission in MISO Fading Wiretap Channels , 2014, ArXiv.

[26]  W. W. Peterson,et al.  Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.

[27]  W. W. PETERSONt,et al.  Cyclic Codes for Error Detection * , 2022 .

[28]  Rüdiger L. Urbanke,et al.  Polar Codes for Channel and Source Coding , 2009, ArXiv.

[29]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[30]  Trung Quang Duong,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI , 2015, IEEE Transactions on Communications.

[31]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[32]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[33]  Yongming Huang,et al.  Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.

[34]  Vincent Rijmen,et al.  ECRYPT yearly report on algorithms and keysizes , 2009 .

[35]  Kai Chen,et al.  Space-Time Polar Coded Modulation , 2013, ArXiv.

[36]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.