Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference

This paper considers a scenario in which a source-destination pair needs to establish a confidential connection against an external eavesdropper, aided by the interference generated by another source-destination pair that exchanges public messages. The goal is to compute the maximum achievable secrecy degrees of freedom (S.D.o.F) region of a MIMO two-user wiretap network. First, a cooperative secrecy transmission scheme is proposed, whose feasible set is shown to achieve all S.D.o.F. pairs on the S.D.o.F. region boundary. In this way, the determination of the S.D.o.F. region is reduced to a problem of maximizing the S.D.o.F. pair over the proposed transmission scheme. The maximum achievable S.D.o.F. region boundary points are obtained in closed form, and the construction of the precoding matrices achieving the maximum S.D.o.F. region boundary is provided. The proposed expressions are functions of the number of antennas at each terminal, and apply to any number of antennas, thus constituting an advancement over prior works that have considered only fixed antenna configurations.

[1]  A. Lee Swindlehurst,et al.  Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer , 2011, 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications.

[2]  Symeon Chatzinotas,et al.  Joint Power Control in Wiretap Interference Channels , 2014, IEEE Transactions on Wireless Communications.

[3]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[4]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[5]  Aylin Yener,et al.  How many antennas does a cooperative jammer need for achieving the degrees of freedom of multiple antenna Gaussian channels in the presence of an eavesdropper? , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[6]  H. Vincent Poor,et al.  On unbounded path-loss models: effects of singularity on wireless network performance , 2009, IEEE Journal on Selected Areas in Communications.

[7]  Adrian Agustin,et al.  Improved Interference Alignment Precoding for the MIMO X Channel , 2011, 2011 IEEE International Conference on Communications (ICC).

[8]  Trung Quang Duong,et al.  On the Interference Alignment Designs for Secure Multiuser MIMO Systems , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[9]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[10]  M. Tao,et al.  Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel , 2010, IEEE Communications Letters.

[11]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[12]  Miguel R. D. Rodrigues,et al.  MIMO Gaussian Channels With Arbitrary Inputs: Optimal Precoding and Power Allocation , 2010, IEEE Transactions on Information Theory.

[13]  A. H. Kayran,et al.  On Feasibility of Interference Alignment in MIMO Interference Networks , 2009, IEEE Transactions on Signal Processing.

[14]  Onur Ozan Koyluoglu,et al.  Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.

[15]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[16]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[17]  Zhi Chen,et al.  On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer , 2014, IEEE Signal Processing Letters.

[18]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[19]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.

[20]  Wan Choi,et al.  Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.

[21]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[22]  Aylin Yener,et al.  Secure degrees of freedom of N ×N ×M wiretap channel with a K-antenna cooperative jammer , 2015, 2015 IEEE International Conference on Communications (ICC).

[23]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Athina P. Petropulu,et al.  Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Jianwei Xie,et al.  Secure degrees of freedom region of the Gaussian interference channel with secrecy constraints , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[27]  A. Lee Swindlehurst,et al.  MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.

[28]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[29]  A. Lee Swindlehurst,et al.  Cooperative Jamming in MIMO ad-hoc networks , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[30]  Aylin Yener,et al.  Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[31]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[32]  Athina P. Petropulu,et al.  Mobile jammers for secrecy rate maximization in cooperative networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[33]  Syed Ali Jafar,et al.  Degrees of Freedom of the K User M×N MIMO Interference Channel , 2008, ArXiv.

[34]  M. Saunders,et al.  Towards a Generalized Singular Value Decomposition , 1981 .

[35]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[36]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[37]  James S. Lehnert,et al.  Optimal cooperative jamming for security , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[38]  Keith Q. T. Zhang,et al.  Joint Space Decomposition-and-Synthesis Approach and Achievable DoF Regions for $K$ -User MIMO Interference Channels , 2014, IEEE Transactions on Signal Processing.

[39]  Jeffrey G. Andrews,et al.  MIMO Interference Alignment Over Correlated Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[40]  Syed Ali Jafar,et al.  Degrees of Freedom of the K User M times N MIMO Interference Channel , 2008, IEEE Trans. Inf. Theory.

[41]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.