Filter Optimization Aided Interference Management with Improved Secrecy

This paper proposes a novel matched filter optimization based approach to improve secrecy in a communication among two legitimate users. The presented optimization scheme, named as QoS-based filter design, minimizes the stop-band attenuation and uses quality-of- service constraints on the legitimate receiver and an eavesdropper. The resulting problem is relaxed to a convex problem. The filter coefficients are optimal regarding the legitimate receiver's matched filter auto-correlation function, however, it results in a sub-optimal filter for the eavesdropper secrecy constraints. Therefore, an additional post-processing is developed to match the secrecy constraints.

[1]  A. Lee Swindlehurst,et al.  QoS-constrained robust beamforming in MISO wiretap channels with a helper , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[2]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[3]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[5]  Gerd Ascheid,et al.  Beamforming Aided Interference Management with Improved Secrecy for Correlated Channels , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[6]  Eduard A. Jorswieck,et al.  On the zero forcing optimality for friendly jamming in MISO wiretap channels , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[7]  Gerd Ascheid,et al.  Beamforming Aided Interference Management for Improved Secrecy in Multicell Environments , 2014 .

[8]  J.L. Sullivan,et al.  New optimization algorithm for digital communication filters , 2002, Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, 2002..

[9]  Marco Baldi,et al.  Increasing Physical Layer Security through Scrambled Codes and ARQ , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[10]  Nikos D. Sidiropoulos,et al.  Far-Field Multicast Beamforming for Uniform Linear Antenna Arrays , 2007, IEEE Transactions on Signal Processing.

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Eduard A. Jorswieck,et al.  Beamforming for secrecy rate maximization under outage constraints and partial CSI , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[13]  Stephen P. Boyd,et al.  FIR Filter Design via Spectral Factorization and Convex Optimization , 1999 .

[14]  Lieven Vandenberghe,et al.  Convex optimization problems involving finite autocorrelation sequences , 2002, Math. Program..

[15]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[16]  Kouichi Sakurai,et al.  Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter , 2011, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  João M. F. Xavier,et al.  Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.