Secure M-PSK communication via directional modulation

In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M-PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M-PSK symbol. Due to the difference between the channels of the legitimate receiver and the eavesdropper, the signals received by the eavesdropper generally encompass a phase component different than the actual symbols. As a result, the transceiver which employs directional modulation can impose a high symbol error rate on the eavesdropper without requiring to know the eavesdropper's channel. The optimal directional modulation beamformer is designed to minimize the consumed power subject to satisfying a specific resulting phase and minimal signal amplitude at each antenna of the legitimate receiver. The simulation results show that the directional modulation results in a much higher symbol error rate at the eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing precoding at the transmitter.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[3]  B. Hassibi,et al.  The MIMO wiretap channel , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[4]  Erica L. Daly,et al.  Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.

[5]  Arsenia Chorti Helping interferer physical layer security strategies for M-QAM and M-PSK systems , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[6]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[10]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[11]  Jochen Schiller,et al.  Mobile Communications , 1996, IFIP — The International Federation for Information Processing.

[12]  Zhu Han,et al.  Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Vijay K. Madisetti,et al.  The Digital Signal Processing Handbook , 1997 .

[14]  Christos Masouros,et al.  Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization , 2015, IEEE Transactions on Signal Processing.

[15]  Zhu Han,et al.  Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[16]  Symeon Chatzinotas,et al.  Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.

[17]  Zhi Ding,et al.  On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.

[18]  Nathaniel E. Helwig,et al.  An Introduction to Linear Algebra , 2006 .

[19]  Raghuraman Mudumbai,et al.  A new jamming technique for secrecy in multi-antenna wireless networks , 2010, 2010 IEEE International Symposium on Information Theory.

[20]  Zhu Han,et al.  Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[21]  A. Lee Swindlehurst,et al.  Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[22]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[23]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[24]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[25]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[26]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[27]  A. Robert Calderbank,et al.  MIMO Wireless Communications , 2007 .

[28]  Symeon Chatzinotas,et al.  Joint Power Control in Wiretap Interference Channels , 2014, IEEE Transactions on Wireless Communications.

[29]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[30]  Joong Soo Ma,et al.  Mobile Communications , 2003, Lecture Notes in Computer Science.

[31]  Ross D. Murch,et al.  A transmit preprocessing technique for multiuser MIMO systems using a decomposition approach , 2004, IEEE Transactions on Wireless Communications.