Defining Spatial Secrecy Outage Probability for Exposure Region-Based Beamforming

With the increasing number of antennae in base stations, there is considerable interest in using beamforming to improve physical layer security, by creating an “exposure region” that enhances the received signal quality for a legitimate user and reduces the possibility of leaking information to a randomly located passive eavesdropper. This paper formalizes this concept by proposing a novel definition for the security level of such a legitimate transmission, called the spatial secrecy outage probability (SSOP). By performing a theoretical and numerical analysis, it is shown how the antenna array parameters can affect the SSOP and its analytic upper bound. While this approach may be applied to any array type and any fading channel model, it is shown here how the security performance of a uniform linear array varies in a Rician fading channel by examining the analytic SSOP upper bound.

[1]  Xianbin Wang,et al.  Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.

[2]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[3]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[4]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[5]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[6]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[7]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[9]  Ting Wang,et al.  Enhancing wireless communication privacy with artificial fading , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[10]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[11]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[12]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[13]  Raghupathy Sivakumar,et al.  Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[14]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[15]  Joy Kuri,et al.  Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[16]  Shihao Yan,et al.  Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.

[17]  Roger F. Woods,et al.  Creating secure wireless regions using configurable beamforming , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[18]  Shihao Yan,et al.  Line-Of-Sight Based Beamforming for Security Enhancements in Wiretap Channels , 2014, 2014 International Conference on IT Convergence and Security (ICITCS).

[19]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[20]  Chenxi Liu,et al.  Location-based beamforming for Rician wiretap channels , 2015, 2016 Australian Communications Theory Workshop (AusCTW).

[21]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[22]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[23]  Joseph R. Cavallaro,et al.  Investigation of secure wireless regions using configurable beamforming on WARP , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[24]  Srinivasan Seshan,et al.  Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries , 2009, Pervasive.

[25]  Sung-Ju Lee,et al.  STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.

[26]  Tony Q. S. Quek,et al.  Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.

[27]  Jie Xiong,et al.  ArrayTrack: A Fine-Grained Indoor Location System , 2011, NSDI.

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[29]  Benjamin Allen,et al.  Adaptive Array Systems: Fundamentals and Applications , 2005 .

[30]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[31]  Raghupathy Sivakumar,et al.  Aegis: Physical Space Security for Wireless Networks With Smart Antennas , 2010, IEEE/ACM Transactions on Networking.

[32]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[33]  B.D. Van Veen,et al.  Beamforming: a versatile approach to spatial filtering , 1988, IEEE ASSP Magazine.

[34]  Huiming Wang,et al.  On Transmission Secrecy Outage of a Multi-Antenna System With Randomly Located Eavesdroppers , 2014, IEEE Communications Letters.

[35]  D. Grunwald,et al.  Enhancing WLAN security with smart antennas: a physical layer response for information assurance , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.