Robust Secure Transmission of Using Main-Lobe-Integration-Based Leakage Beamforming in Directional Modulation MU-MIMO Systems

In this paper, we make an investigation of robust beamforming for secure directional modulation in the multiuser multiple-input and multiple-output systems in the presence of direction angle measurement errors. When statistical knowledge of direction angle measurement errors is unavailable, a novel robust beamforming scheme of combining main-lobe-integration and leakage is proposed to simultaneously transmit multiple different independent parallel confidential message streams to the associated multiple distinct desired users. The proposed scheme includes two steps: designing the beamforming vectors of the useful confidential messages and constructing artificial noise (AN) projection matrix. Here, in its first step, the beamforming vectors for the useful confidential messages of desired user $k$ are given by minimizing the useful signal power leakage from the main-lobe of desired user $k$ to the sum of main-lobes of the remaining desired directions plus main-lobes of all eavesdropper directions. In its second step, the AN projection matrix is constructed by simultaneously maximizing the AN power leakage to all eavesdropper directions such that all eavesdroppers are disrupted seriously, where AN is viewed by the transmitter as a useful signal for eavesdroppers. Due to independent beamforming vectors for different desired users, a more secure transmission is achieved. Compared with conventional nonrobust methods, the proposed method can provide a significant improvement in bit error rate along the desired directions and secrecy-sum-rate toward multiple desired users without needing the statistical property or distribution of angle measurement errors.

[1]  Victor C. M. Leung,et al.  Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[2]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[3]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[4]  C.-C. Jay Kuo,et al.  Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems , 2013, Springer Briefs in Electrical and Computer Engineering.

[5]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[7]  Yuan Ding,et al.  A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters , 2014, IEEE Transactions on Antennas and Propagation.

[8]  Jun Li,et al.  Robust Synthesis Method for Secure Directional Modulation With Imperfect Direction Angle , 2016, IEEE Communications Letters.

[9]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[10]  Ali H. Sayed,et al.  A Leakage-Based Precoding Scheme for Downlink Multi-User MIMO Channels , 2007, IEEE Transactions on Wireless Communications.

[11]  Xiaofeng Tao,et al.  Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback , 2014, IEEE Communications Letters.

[12]  Feng Xia,et al.  Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones , 2017, IEEE Transactions on Industrial Informatics.

[13]  F. Gross Smart Antennas for Wireless Communications: With MATLAB , 2005 .

[14]  A. Hajimiri,et al.  Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.

[15]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[16]  Ali H. Sayed,et al.  A multi user beamforming scheme for downlink MIMO channels based on maximizing signal-to-leakage ratios , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[17]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[18]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[19]  Vincent Fusco,et al.  Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters , 2015, IEEE Antennas and Wireless Propagation Letters.

[20]  Feng Xia,et al.  CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking , 2017, IEEE Transactions on Vehicular Technology.

[21]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[22]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[23]  Xiaohu You,et al.  Adaptive robust Max-SLNR precoder for MU-MIMO-OFDM systems with imperfect CSI , 2016, Science China Information Sciences.

[24]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[25]  Erica L. Daly,et al.  Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.

[26]  Matthew R. McKay,et al.  Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.

[27]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[28]  Vincent Fusco,et al.  Directional Modulation Far-field Pattern Separation Synthesis Approach , 2015 .

[29]  Xiao Liu,et al.  Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs , 2017, Sensors.

[30]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[31]  Michael Mao Wang,et al.  An Efficient Power Allocation Scheme for Leakage-Based Precoding in Multi-Cell Multiuser MIMO Downlink , 2011, IEEE Communications Letters.

[32]  Jia Zhu,et al.  Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.

[33]  Feng Shu,et al.  Robust Synthesis Scheme for Secure Multi-Beam Directional Modulation in Broadcasting Systems , 2016, IEEE Access.

[34]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[35]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .