Secure Alamouti MAC Transmissions

We investigate the physical layer security of synchronous multiple access transmissions using the Alamouti space-time block code in fading channels where multiple users communicate with a single intended receiver in the presence of an eavesdropper. We propose an artificial-noise-aided technique to secure the transmissions by having the Alamouti users collaborate with each other, without exchanging information, to degrade the eavesdropper’s channel. Unlike previous work, which assumes that the transmitters have complete knowledge of the legitimate as well as the eavesdropper’s channels, our proposed technique requires no communications between the users, minimal knowledge of the legitimate channel, and no channel knowledge regarding the eavesdropper.

[1]  Aydin Sezgin,et al.  Stacked OSTBC: Error Performance and Rate Analysis , 2007, IEEE Transactions on Signal Processing.

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  N. Seshadri,et al.  Increasing data rate over wireless channels , 2000, IEEE Signal Process. Mag..

[6]  Arogyaswami Paulraj,et al.  Space-time block codes: a capacity perspective , 2000, IEEE Communications Letters.

[7]  Babak Hassibi,et al.  High-rate codes that are linear in space and time , 2002, IEEE Trans. Inf. Theory.

[8]  Irene A. Stegun,et al.  Handbook of Mathematical Functions. , 1966 .

[9]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[10]  Markku J. Juntti,et al.  On the performance of space-time coded and spatially multiplexed MIMO systems with linear receivers , 2010, IEEE Transactions on Communications.

[11]  Nuwan S. Ferdinand,et al.  Physical Layer Security in MIMO OSTBC Line-of-Sight Wiretap Channels with Arbitrary Transmit/Receive Antenna Correlation , 2013, IEEE Wireless Communications Letters.

[12]  Wei Yu,et al.  Interference mitigation via joint detection in a fading environment , 2011, 2011 Information Theory and Applications Workshop.

[13]  Hlaing Minn,et al.  A Novel OFDMA Ranging Method Exploiting Multiuser Diversity , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Hamid Jafarkhani,et al.  MIMO-Assisted MPR-Aware MAC Design for Asynchronous WLANs , 2011, IEEE/ACM Transactions on Networking.

[16]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[17]  Robert G. Gallager,et al.  A perspective on multiaccess channels , 1984, IEEE Trans. Inf. Theory.

[18]  Suhas N. Diggavi,et al.  Algebraic properties of space-time block codes in intersymbol interference multiple-access channels , 2003, IEEE Trans. Inf. Theory.

[19]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.

[20]  Björn E. Ottersten,et al.  Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.

[21]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[22]  Aydin Sezgin,et al.  Capacity achieving high rate space-time block codes , 2005, IEEE Communications Letters.

[23]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[24]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[25]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[26]  Siavash M. Alamouti,et al.  A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..

[27]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[28]  Yun Hee Kim,et al.  Secrecy diversity in MISOME wiretap channels , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[29]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.