A new approach to null space-based noise signal generation for secure wireless communications in transmit-receive diversity systems

An effective method was recently proposed to increase secrecy capacity in MIMO wireless communication systems. By adding artificially generated noise signal into the information-bearing signal, this method can degrade the eavesdropper's receiving signal, but does not affect the desired receiver. This method, however, can only be used in systems where the transmit antenna has more elements than the receive antenna. In this paper, we present a novel noise signal generation approach to enable secure wireless communications in a transmit-receive diversity system. In this approach, we generate our jamming noise signal based on the null space of an equivalent channel of the system. The presented wireless security mechanism can be applied to systems with arbitrary antenna configurations, unlike existing methods that only work for specific array configurations. In addition, the eavesdropper cannot increase its information detection capability by employing more antenna elements. With this scheme, we also enable more degrees of freedom for selecting parameters for jamming noise signal generation, making the decoding at the eavesdropper even harder due to the increased search space. We performed Monte Carlo simulations to evaluate the proposed method in an urban macro cellular environment using the 3rd Generation Partnership Project (3GPP) spatial channel model. Our simulation results show that the proposed approach can significantly increase secrecy capacity, which is independent of the eavesdropper's position and the element number of its antenna.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  T.K.Y. Lo,et al.  Maximum ratio transmission , 1999, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311).

[3]  Ranjan K. Mallik,et al.  Analysis of transmit-receive diversity in Rayleigh fading , 2003, IEEE Trans. Commun..

[4]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[5]  Roy D. Yates,et al.  The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints , 2006, 2006 IEEE International Symposium on Information Theory.

[7]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[8]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[9]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[10]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[11]  P. Stoica,et al.  MIMO transmit beamforming under uniform elemental power constraint , 2007, SPAWC 2007.

[12]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[13]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[14]  Matthew R. McKay,et al.  Transmit Beamforming in Rayleigh Product MIMO Channels: Capacity and Performance Analysis , 2008, IEEE Transactions on Signal Processing.

[15]  Inkyu Lee,et al.  Transmit beamforming method based on maximum-norm combining for MIMO systems , 2009, IEEE Transactions on Wireless Communications.

[16]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[17]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[18]  D. Bernstein Matrix Mathematics: Theory, Facts, and Formulas , 2009 .

[19]  Michael Hempel,et al.  An approach to secure wireless communications using randomized eigenvector-based jamming signals , 2010, IWCMC.