Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission

Among the plenty of studies on physical layer security, multi-antenna signal processing and nodes cooperation are two widely adopted techniques. However, in practical systems there are many single-antenna devices that do not support cooperative transmission either. To guarantee the information security in this scenario, we propose a novel transmission strategy that exploits the temporal characteristics of a multipath fading channel. Specifically, we apply this strategy to a time-reversal-based communication system. We consider a joint design of signal waveform and artificial noise. Based on this approach, specific transmission schemes are designed for the cases with and without eavesdropper's channel state information (CSI), respectively. The numerical results show the superiority of our proposed schemes in terms of security enhancement even when the eavesdropper's CSI is unavailable.

[1]  Brian M. Sadler,et al.  Reduced-complexity UWB time-reversal techniques and experimental results , 2007, IEEE Transactions on Wireless Communications.

[2]  Li Wang,et al.  SNR Analysis of Time Reversal Signaling on Target and Unintended Receivers in Distributed Transmission , 2016, IEEE Transactions on Communications.

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  K. J. Ray Liu,et al.  Why Time Reversal for Future 5G Wireless? [Perspectives] , 2016, IEEE Signal Processing Magazine.

[5]  Ming Li,et al.  Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.

[6]  K. J. Ray Liu,et al.  Time-Reversal Wideband Communications , 2013, IEEE Signal Processing Letters.

[7]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[8]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Theodore S. Rappaport,et al.  Millimeter-Wave Enhanced Local Area Systems: A High-Data-Rate Approach for Future Wireless Networks , 2014, IEEE Journal on Selected Areas in Communications.

[10]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[11]  Unil Yun,et al.  A Time-Reversal-Based Transmission Using Predistortion for Intersymbol Interference Alignment , 2015, IEEE Transactions on Communications.

[12]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[13]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.