Detecting passive eavesdroppers in the MIMO wiretap channel

The MIMO wiretap channel comprises a passive eavesdropper that attempts to intercept communications between an authorized transmitter-receiver pair, with each node being equipped with multiple antennas. In a dynamic network, it is imperative that the presence of a passive eavesdropper be determined before the transmitter can deploy robust secrecy-encoding schemes as a countermeasure. This is a difficult task in general, since by definition the eavesdropper is passive and never transmits. In this work we adopt a method that allows the legitimate nodes to detect the passive eavesdropper from the local oscillator power that is inadvertently leaked from its RF front end. We examine the performance of non-coherent energy detection as well as optimal coherent detection schemes. We then show how the proposed detectors allow the legitimate nodes to increase the MIMO secrecy rate of the channel.

[1]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Yonghong Zeng,et al.  Multi-antenna based spectrum sensing for cognitive radios: A GLRT approach , 2010, IEEE Transactions on Communications.

[4]  Laurence B. Milstein,et al.  An RF Receiver Detection Technique for Cognitive Radio Coexistence , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[5]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[6]  N. C. Hamilton Aspects of direct conversion receiver design , 1991 .

[7]  K. Ramchandran,et al.  Detecting primary receivers for cognitive radio applications , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[8]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[9]  A. James Distributions of Matrix Variates and Latent Roots Derived from Normal Samples , 1964 .

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Carl W. Helstrom,et al.  Approximate inversion of Marcum's Q-function , 1998 .

[12]  L.E. Larson,et al.  Hidden Mobile Terminal Device Discovery in a UWB Environment , 2006, 2006 IEEE International Conference on Ultra-Wideband.