Intrinsic Secrecy of EGT and MRT Precoders for Proper and Improper Modulations

This paper makes an information theoretical analysis of the intrinsic secrecy level of M-QAM and M-PSK modulation schemes considering the use of equal gain transmission and maximum ratio transmission precoding techniques. In addition to the analysis of the conventional proper M-QAM and M-PSK constellations, a recently proposed family of improper versions of the M-QAM and M-PSK modulation schemes is also evaluated. With the exception of proper M-PSK, which verifies always full secrecy for the considered precoders, the main results show that for low order constellations, the amount of intrinsic secrecy provided by the combination of the precoder and modulation scheme is significant and, therefore, can be exploited in the design of a full secrecy solution. The theoretical derivations provided in this paper can be directly applied to quantify the minimal entropy that a secret key must have to fully secure the exchange of information for these transmission schemes.

[1]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[2]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[3]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[4]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[5]  Eduard A. Jorswieck,et al.  Improper Signaling on the Two-user SISO Interference Channel , 2012, ArXiv.

[6]  Marco Gomes,et al.  Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime , 2016, IEEE Signal Processing Letters.

[7]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[8]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[9]  Erry Gunawan,et al.  Ieee Transactions on Signal Processing, Accepted 1 Transmit Optimization with Improper Gaussian Signaling for Interference Channels , 2022 .

[10]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Bruce Schneier,et al.  Cryptographic Design Vulnerabilities , 1998, Computer.

[12]  Adão Silva,et al.  Exploiting reciprocal channel estimations for jamming to secure wireless communications , 2017, 2017 Wireless Days.

[13]  Syed Ali Jafar,et al.  Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.

[14]  Marco Gomes,et al.  Interleaved Coding for Secrecy with a Hidden Key , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[15]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[16]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[17]  Syed Ali Jafar,et al.  Interference Alignment With Asymmetric Complex Signaling—Settling the Høst-Madsen–Nosratinia Conjecture , 2009, IEEE Transactions on Information Theory.

[18]  Adão Silva,et al.  Retrospective Interference Alignment: Degrees of Freedom Scaling With Distributed Transmitters , 2017, IEEE Transactions on Information Theory.

[19]  Manjula Sandirigama,et al.  Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[20]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[21]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[23]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[24]  Il-Min Kim,et al.  Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.