Secure communication in frequency selective channels with fade-avoiding subchannel usage

The random nature of fading channels is an enabling factor for achieving secrecy against eavesdropping. By considering the channel frequency selectivity, we propose an adaptive transmission scheme in which the faded subchannels of the legitimate channel are not used for conveying information. Thus, capacity reduction in legitimate channel is minimized while causing a reduction of the eavesdropper channel capacity proportional to the unused subchannels. Besides improving communication secrecy with the intelligent subchannel usage, populating the unused subchannels with artificially-generated noise that further disturbs the eavesdropper's reception is proposed. Since each receiver has its own channel state information (CSI) but not other's, eavesdroppers cannot discard the distortion which is integrated into the transmitted signal as a function of the legitimate pair's CSI. Positive secrecy capacity and outage probabilities are provided as well as error performance example in a communication scenario. It is showed that while careful usage of the subchannels in frequency selective channels improves the secrecy, introducing the fade-filling noise creates an error floor for the malicious nodes.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[3]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[4]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[5]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[6]  Shlomo Shamai,et al.  Fading Channels: Information-Theoretic and Communication Aspects , 1998, IEEE Trans. Inf. Theory.

[7]  Sergio VerdÂ,et al.  Fading Channels: InformationTheoretic and Communications Aspects , 2000 .

[8]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[9]  Shlomo Shamai,et al.  Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding , 2009, EURASIP J. Wirel. Commun. Netw..

[10]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[11]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  David Falconer,et al.  Frequency domain equalization for single-carrier broadband wireless systems , 2002, IEEE Commun. Mag..

[14]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[15]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[16]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[17]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.