Space–Time Line Code for Enhancing Physical Layer Security of Multiuser MIMO Uplink Transmission

In this article, we investigate a secure uplink multiple-input multiple-output communication system, in which the multiple users transmit information to a legitimate access point (AP) when a passive eavesdropper exists. A secure multiple access method is proposed for single-antenna users by employing space–time line codes (STLCs), which enables noncoherent detection at the legitimate AP without channel state information (CSI) and achieves full spatial diversity. While extending the secure STLC scheme from the single-antenna to two-antenna users by combining the STLC with artificial noise (AN) injection, we design a low-complexity AN signals with the optimal power control scheme. The proposed AN is ensured to be eliminated after STLC decoding at the legitimate AP, while sustained in eavesdropper’s received signals as interference. Theoretical sum secrecy rates are derived by considering time-varying fading channels with the uncertainty of CSI at the users, and the numerical results verify that the proposed STLC schemes outperform the existing secure transmission schemes in terms of the sum secrecy rate.

[1]  Robert W. Heath,et al.  Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.

[2]  Caijun Zhong,et al.  Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation , 2017, IEEE Transactions on Information Forensics and Security.

[3]  Xiang Cheng,et al.  Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Jingon Joung,et al.  Space–Time Line Code for Massive MIMO and Multiuser Systems With Antenna Allocation , 2018, IEEE Access.

[5]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[6]  Taejoon Kim,et al.  Training and Data Structures for AN-Aided Secure Communication , 2019, IEEE Systems Journal.

[7]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[8]  Jingon Joung,et al.  Uneven Power Amplifier Shuffling for Space-Time Line Code Systems , 2018, IEEE Access.

[9]  Yuanyuan Yang,et al.  Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel , 2018, IEEE Systems Journal.

[10]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[11]  Zhi Ding,et al.  Blind MIMO channel identification from second order statistics using rank deficient channel convolution matrix , 2003, IEEE Trans. Signal Process..

[12]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[13]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[14]  Bang Chul Jung,et al.  Machine Learning Based Blind Decoding for Space–Time Line Code (STLC) Systems , 2019, IEEE Transactions on Vehicular Technology.

[15]  Naofal Al-Dhahir,et al.  Secure Alamouti MAC Transmissions , 2017, IEEE Transactions on Wireless Communications.

[16]  Sofiène Affes,et al.  Cramer-Rao Lower Bounds for NDA SNR Estimates of Square QAM Modulated Transmissions , 2010, IEEE Transactions on Communications.

[17]  Cihan Tepedelenlioglu,et al.  SNR estimation for nonconstant modulus constellations , 2005, IEEE Transactions on Signal Processing.

[18]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[19]  Quanzhong Li,et al.  Joint Position, Decoding Order, and Power Allocation Optimization in UAV-Based NOMA Downlink Communications , 2020, IEEE Systems Journal.

[20]  Jianhua Ge,et al.  Improving Physical-Layer Security for Wireless Communication Systems Using Duality-Aware Two-Way Relay Cooperation , 2019, IEEE Systems Journal.

[21]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[22]  Mohammad Javad Saber,et al.  Physical-Layer Security Analysis of Mixed SIMO SWIPT RF and FSO Fixed-Gain Relaying Systems , 2019, IEEE Systems Journal.

[23]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[24]  Bang Chul Jung,et al.  Space–time line coded regenerative two‐way relay systems with power control , 2019, Electronics Letters.

[25]  Hsiao-Hwa Chen,et al.  Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading—A Physical Layer Security Approach , 2019, IEEE Systems Journal.

[26]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[27]  Tharmalingam Ratnarajah,et al.  Secure Communications through Rayleigh Fading SIMO Channel with Multiple Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.

[28]  Huiming Wang,et al.  Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI , 2015, IEEE Signal Processing Letters.

[29]  Qian Liu,et al.  Secure Hybrid Beamformers Design in mmWave MIMO Wiretap Systems , 2020, IEEE Systems Journal.

[30]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[31]  Hamid Jafarkhani,et al.  Secure space-time block coding via artificial noise alignment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[32]  Gan Zheng,et al.  Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.

[33]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[34]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[35]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[36]  Aylin Yener,et al.  Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.

[37]  Kang An,et al.  Secure Communications Over Cell-Free Massive MIMO Networks With Hardware Impairments , 2020, IEEE Systems Journal.

[38]  Yangyang Zhang,et al.  Probabilistically Robust SWIPT for Secrecy MISOME Systems , 2016, IEEE Transactions on Information Forensics and Security.

[39]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[40]  Jihoon Choi,et al.  Artificial Noise Injection and Its Power Loading Methods for Secure Space-Time Line Coded Systems , 2019, Entropy.

[41]  Qinye Yin,et al.  Two-step transmission with artificial noise for secure wireless SIMO communications , 2014, Science China Information Sciences.

[42]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[43]  Yan Zhang,et al.  Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.

[44]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[45]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[46]  Sofiène Affes,et al.  Closed-Form CRLBs for SNR Estimation From Turbo-Coded BPSK-, MSK-, and Square-QAM-Modulated Signals , 2014, IEEE Transactions on Signal Processing.

[47]  Joonhyuk Kang,et al.  Secrecy-Aware Altitude Optimization for Quasi-Static UAV Base Station Without Eavesdropper Location Information , 2019, IEEE Communications Letters.

[48]  Xiao Ma,et al.  Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications , 2018, IEEE Transactions on Vehicular Technology.

[49]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[50]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[51]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[52]  Jingon Joung,et al.  Space–Time Line Codes With Power Allocation for Regenerative Two-Way Relay Systems , 2019, IEEE Transactions on Vehicular Technology.

[53]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[54]  Jingon Joung,et al.  Multiuser Space–Time Line Code With Optimal and Suboptimal Power Allocation Methods , 2018, IEEE Access.

[55]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[56]  Tobias J. Oechtering,et al.  Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[57]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[58]  Jingon Joung,et al.  Energy Efficient Space–Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints , 2018, IEEE Access.

[59]  Robert W. Heath,et al.  Interpolation based transmit beamforming for MIMO-OFDM with limited feedback , 2004, IEEE Transactions on Signal Processing.

[60]  A. Lee Swindlehurst,et al.  On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.

[61]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[62]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.