Physical Layer Secure Communication based on MIMO Channel Constellation Flipping

被引:0
作者
Gao, Tong [1 ]
Lu, Xianhui [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Sch Cyber Secur & Technol, Univ Chinese Acad Sci, Beijing, Peoples R China
来源
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 | 2024年
基金
中国国家自然科学基金;
关键词
MIMO secure communication; Precoding; Physical layer security; SVD;
D O I
10.1109/TrustCom60117.2023.00192
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We proposed a physical layer secure communication system for massive MIMO systems, utilizing channel entropy as the foundation. Our approach involves extracting a mask key and a flip key from the singular value decomposition (SVD) of the channel matrix. The mask key ensures the protection of the flip key during transmission. By applying a random flip to the constellation diagram of the transmitted message based on the flip key, we introduce a scrambling effect that cannot be deciphered by eavesdroppers. The flip key is securely delivered to the receiver, allowing for the proper demodulation of the message by eliminating the constellation flip. To address the computational burden associated with estimating massive MIMO channels, we employ precoding of the downlink channel guide signal in the system design. This reduces the channel estimation overhead at the terminal. However, it also creates an equivalent channel for the eavesdropper, enabling them to correctly decode the precoded signal and compromise communication security. Our scheme counters this by introducing the constellation diagram flipping, which cannot be extracted by eavesdroppers, thereby preventing correct decoding. Simulation experiments confirm even with a large number of antennas, the eavesdropper is unable to completely counteract the effects of constellation flipping, thus ensuring communication security. In summary, by exploiting the singular value decomposition and employing constellation diagram flipping, our physical layer secure MIMO communication system based on channel entropy achieves secure communication even in the presence of powerful eavesdroppers.
引用
收藏
页码:1408 / 1415
页数:8
相关论文
共 31 条
  • [1] What Will 5G Be?
    Andrews, Jeffrey G.
    Buzzi, Stefano
    Choi, Wan
    Hanly, Stephen V.
    Lozano, Angel
    Soong, Anthony C. K.
    Zhang, Jianzhong Charlie
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) : 1065 - 1082
  • [2] Secure Active and Passive Beamforming in IRS-Aided MIMO Systems
    Asaad, Saba
    Wu, Yifei
    Bereyhi, Ali
    Mueller, Ralf R.
    Schaefer, Rafael F.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1300 - 1315
  • [3] Cover TM, 1999, Elements of information theory, DOI DOI 10.1002/0471200611.CH2
  • [4] Intelligent Omni Surface-Assisted Secure MIMO Communication Networks With Artificial Noise
    Fang, Sisai
    Chen, Gaojie
    Abdullah, Zaid
    Li, Yonghui
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (06) : 1231 - 1235
  • [5] Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature
    Fang, Song
    Liu, Yao
    Ning, Peng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1515 - 1527
  • [6] Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications
    Feng, Jun
    Yang, Laurence T.
    Zhang, Ronghao
    Qiang, Weizhong
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (10) : 7009 - 7018
  • [7] Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
    Feng, Jun
    Yang, Laurence T.
    Zhu, Qing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 857 - 868
  • [8] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [9] Goldsmith A. J., 2005, Wireless communications
  • [10] Gupta A. K., 1999, Matrix variate distributions