Apply Artificial Noise To Secure Fading Relay Networks: A SER-Based Approach

We apply the concept of artificial and controlled interference in a triangular relay network with an untrusted relay aiming at enhancing the wireless communication secrecy between the source and the destination node. In order to shield the square quadrature amplitude modulated (QAM) signals transmitted from the source node to the relay, the destination node designs and transmits artificial noise (AN) symbols to jam the relay reception. The objective of our considered AN design is to degrade the error probability performance at the untrusted relay, for different types of channel state information (CSI) at the destination. By considering perfect knowledge of the instantaneous CSI of the source-to-relay and relay-to-destination links, we first present an analytical expression for the symbol error rate (SER) performance at the relay. Based on the assumption of an average power constraint at the destination node, we then derive the optimal phase and power distribution of the AN that maximizes the SER at the relay. Furthermore, we obtain the optimal AN design for the case where only statistical CSI is available at the destination node. For both cases, our study reveals that the Gaussian distribution is generally not optimal to generate AN symbols. In particular, the conducted numerical results show that the Gaussian distributed AN is far from optimal. The presented AN design takes into account practical parameters for the communication links, such as QAM signaling and maximum likelihood decoding.

[1]  Luca Sanguinetti,et al.  A Tutorial on the Optimization of Amplify-and-Forward MIMO Relay Systems , 2012, IEEE Journal on Selected Areas in Communications.

[2]  Yasutada Oohama,et al.  Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.

[3]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[4]  Abbas El Gamal,et al.  Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[7]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[8]  A. Lee Swindlehurst,et al.  Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[9]  M. L. Meade,et al.  Signals and Systems: Models and Behaviour , 1986 .

[10]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[11]  Dongtang Ma,et al.  Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming , 2013, IEEE Transactions on Signal Processing.

[12]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[13]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[14]  Meixia Tao,et al.  Secure beamforming for MIMO two-way transmission with an untrusted relay , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Mandy Eberhart,et al.  Digital Communication Over Fading Channels , 2016 .

[16]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[17]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[18]  Feifei Gao,et al.  Optimal Training Design for Channel Estimation in Amplify and Forward Relay Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[19]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[20]  Marius Pesavento,et al.  Downlink Opportunistic Scheduling with Low-Rate Channel State Feedback: Error Rate Analysis and Optimization of the Feedback Parameters , 2010, IEEE Transactions on Communications.

[21]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[22]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[23]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[24]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[25]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[26]  D. F. Hays,et al.  Table of Integrals, Series, and Products , 1966 .

[27]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[28]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[29]  A. Lee Swindlehurst,et al.  Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[30]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[31]  Marius Pesavento,et al.  Enhancing physical layer security in untrusted relay networks with artificial noise: A symbol error rate based approach , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[32]  Ramjee Prasad,et al.  Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art , 2012, J. Cyber Secur. Mobil..

[33]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[34]  Matthew R. McKay,et al.  Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.

[35]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[36]  John A. Nelder,et al.  A Simplex Method for Function Minimization , 1965, Comput. J..

[37]  Shlomo Shamai,et al.  New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages , 2011, IEEE Transactions on Information Theory.

[38]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[39]  Helmut Bölcskei,et al.  Crystallization in Large Wireless Networks , 2007, IEEE Transactions on Information Theory.

[40]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[41]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[42]  J. Boutros,et al.  On communication over fading channels , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.

[43]  Mukesh Singhal,et al.  Design of an architecture for multiple security levels in wireless sensor networks , 2010, 2010 Seventh International Conference on Networked Sensing Systems (INSS).

[44]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[45]  Soung Chang Liew,et al.  Physical-layer network coding: Tutorial, survey, and beyond , 2011, Phys. Commun..

[46]  Amitav Mukherjee,et al.  Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay , 2013, IEEE Communications Letters.

[47]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[48]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[49]  Ananthanarayanan Chockalingam,et al.  Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI , 2013, 2013 IEEE International Conference on Communications (ICC).

[50]  Erik Dahlman,et al.  4G: LTE/LTE-Advanced for Mobile Broadband , 2011 .

[51]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[52]  Raymond Knopp,et al.  A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..

[53]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[54]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[55]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[56]  Bharat K. Bhargava,et al.  A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..

[57]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.