iCoding: Countermeasure Against Interference and Eavesdropping in Wireless Communications

被引:0
作者
Liu, Yicheng [1 ]
Li, Zhao [1 ]
Shin, Kang G. [2 ]
Yan, Zheng [1 ]
Liu, Jia [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Shaanxi, Peoples R China
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[3] Natl Inst Informat, Ctr Strateg Cyber Resilience Res & Dev, Tokyo 1018430, Japan
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Interference; Wireless communication; Eavesdropping; Communication system security; Security; Signal to noise ratio; Symbols; Receivers; Jamming; Standards; secure communication; coding; interference management; channel capacity; spectral efficiency; TRANSMISSIONS; ALIGNMENT; DESIGN;
D O I
10.1109/TIFS.2024.3468902
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of wireless communication technologies, interference management (IM) and security/privacy in data transmission have become critically important. On one hand, due to the broadcast nature of wireless medium, the interference superimposed on the desired signal can destroy the integrity of data transmission. On the other hand, malicious receivers (Rxs) may eavesdrop a legitimate user's transmission and thus breach the confidentiality of communication. To counter these threats, we propose a novel encoding method, called immunizing coding (iCoding), which handles both IM and physical-layer security simultaneously. By exploiting both channel state information (CSI) and data carried in the interference, an iCoded signal is generated and sent by the legitimate transmitter (Tx). The iCoded signal interacts with the interference at the desired/legitimate Rx, so that the intended data can be recovered without the influence of disturbance, i.e., immunity to interference. In addition, since the data carried in the iCoded signal which is obtained via encoding the desired data and interference cooperatively, is different from the original desired data, the eavesdropper cannot access unauthorized information by wiretapping the desired signal, thus achieving immunity to eavesdropping. Our theoretical analysis, experimental and numerical evaluation have shown iCoding to effectively manage interference while preventing potential eavesdropping, hence enhancing the legitimate user's transmission and secrecy thereof.
引用
收藏
页码:9188 / 9203
页数:16
相关论文
共 26 条
  • [1] A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry
    Angueira, Pablo
    Val, Inaki
    Montalban, Jon
    Seijo, Oscar
    Iradier, Eneko
    Fontaneda, Pablo Sanz
    Fanari, Lorenzo
    Arriola, Aitor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02): : 810 - 838
  • [2] A General Relaying Transmission Protocol for MIMO Secrecy Communications
    Ding, Zhiguo
    Peng, Mugen
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (11) : 3461 - 3471
  • [3] Wireless-Assisted Key Establishment Leveraging Channel Manipulation
    Fang, Song
    Markwood, Ian
    Liu, Yao
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (01) : 263 - 275
  • [4] Fang S, 2019, IEEE INFOCOM SER, P2530, DOI [10.1109/infocom.2019.8737394, 10.1109/INFOCOM.2019.8737394]
  • [5] Interference Alignment for the K-User MIMO Interference Channel
    Ghasemi, Akbar
    Motahari, Abolfazl Seyed
    Khandani, Amir Keyvan
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 1401 - 1411
  • [6] Interference Alignment for Physical Layer Security in Multi-User Networks With Passive Eavesdroppers
    Hu, Lin
    Tan, Shuai
    Wen, Hong
    Wu, Jinsong
    Fan, Jiabing
    Chen, Songlin
    Tang, Jie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3692 - 3705
  • [7] Cooperative Jamming for Secure Communications in MIMO Relay Networks
    Huang, Jing
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 4871 - 4884
  • [8] Jungnickel V, 2013, IEEE INT CONF COMM, P905, DOI 10.1109/ICCW.2013.6649363
  • [9] Li Z., 2017, P IEEE INFOCOM C COM, P1
  • [10] Interference Steering to Manage Interference in IoT
    Li, Zhao
    Liu, Yinghou
    Shin, Kang G.
    Liu, Jia
    Yan, Zheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10458 - 10471