Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region

A novel approach for ensuring confidential wireless communication is proposed and analysed from a geometrical perspective. In this method, both the legitimate receiver and transmitter generate artificial noise (AN) to impair the eavesdropper's channel. The authors use the concept of insecure region to characterise the security performance when the eavesdropper's channel is unknown. The insecure region is defined as the region where the eavesdropper may decode the secret message. With the aim of minimising the size of the insecure region, an optimum power allocation strategy between the information bearing signal and the AN is proposed. Simulation results show that the proposed method achieves a good performance.

[1]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[2]  Jing Wang,et al.  Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[3]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[4]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  Chong-Yung Chi,et al.  Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[9]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[10]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[11]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[12]  Zhi Xue,et al.  Securing Communication via Transmission of Artificial Noise by Both Sides: Bipolar-Beamforming Optimization , 2013 .

[13]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[14]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.