A Wireless Physical Layer Security Method based on Binary Exclusive-Or Jamming Message and CSI Alignment

Unlike these conventional approaches that employ zero-forcing beam-forming (ZFB) and noise-like jamming techniques to provide wireless physical layer security, in this study, a jamming signal is proposed to be transmitted by the destination and carry a binary information message (BIM). Further, legitimate channel coefficient states (CSIs) are avoided from being listened by eavesdroppers. By smartly superposing the jamming signal onto the desire signal, an interest relay node can effectively decode the respective BIMs but still keeping a considerably degraded decoding performances at eavesdroppers. The protected BIMs allow this relay to create an exclusive-or (XOR) BIM which is always secured and does not require any further protection. It shows that the proposed method is in superiority to the conventional methods. Their outage performances are fully analyzed and compared in this paper.

[1]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[2]  Yupeng Liu,et al.  Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Moustafa Youssef,et al.  Best relay selection for underlay cognitive radio systems with collision probability minimization , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[4]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[6]  Zhu Han,et al.  Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints , 2011, IEEE Transactions on Information Forensics and Security.

[7]  A. Robert Calderbank,et al.  Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels , 2009, 2009 Information Theory and Applications Workshop.

[8]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[11]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[12]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[13]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[14]  Ming Jiang,et al.  Opportunistic Selection for Decode-and-Forward Cooperative Networks with Secure Probabilistic Constraints , 2013, Wirel. Pers. Commun..