Link adaptation for physical layer security over wireless fading channels

A secure link adaptation framework is proposed, which exploits the inherent fluctuations of wireless fading channels for high-performance communications and physical layer security in the presence of an eavesdropper. The authors use very sharp channel codes intended for reliability and demonstrate that they also provide security, when successfully incorporated in the link adaptation design framework and the security constraint is not very stringent. Two scenarios are considered in which the transmitter has access to the eavesdropper channel state information either instantaneously or statistically. The proposed secure link adaptation framework is formulated to maximise the spectral efficiency of the communication, whereas both reliability and security constraints are provisioned. Different designs are considered when the security constraint is quantified by instantaneous bit error rate (BER), average BER or leakage probability. For the problem with instantaneous BER constraint, an efficient analytical solution and a numerical solution are presented. A closed-form analytical solution is also provided for secure link adaptation with average BER constraint, whereas the problem with the leakage constraint is tackled numerically. Extensive results and detailed analysis are provided to draw insights on the effects of different design parameters on the performance.

[1]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[2]  Byung-Jae Kwak,et al.  LDPC codes for physical layer security , 2009, GLOBECOM 2009.

[3]  Georgios B. Giannakis,et al.  Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links , 2004, IEEE Transactions on Wireless Communications.

[4]  H. Vincent Poor,et al.  Multiple Antenna Secure Broadcast over Wireless Networks , 2007, ArXiv.

[5]  James M. Ortega,et al.  Iterative solution of nonlinear equations in several variables , 2014, Computer science and applied mathematics.

[6]  Stephen J. Wright,et al.  Numerical Optimization , 2018, Fundamental Statistical Inference.

[7]  Farshad Lahouti,et al.  Adaptive transmission policy design for delay-sensitive and bursty packet traffic over wireless fading channels , 2009, IEEE Transactions on Wireless Communications.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[10]  Fei Peng,et al.  Adaptive Modulation and Coding for IEEE 802.11n , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[11]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Farshad Lahouti,et al.  Quality of service constrained throughput optimisation for joint adaptive transmission with automatic repeat request over block-fading channels , 2009, IET Commun..

[14]  David J. C. MacKay,et al.  Performance of low density parity check codes as a function of actual and assumed noise levels , 2003, MFCSIT.

[15]  Mohamed-Slim Alouini,et al.  Adaptive Modulation over Nakagami Fading Channels , 2000, Wirel. Pers. Commun..

[16]  Andrea J. Goldsmith,et al.  Degrees of freedom in adaptive modulation: a unified view , 2001, IEEE Trans. Commun..

[17]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[18]  Shlomo Shamai,et al.  Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.

[19]  K. Arrow,et al.  QUASI-CONCAVE PROGRAMMING , 1961 .