Securing MIMO Wiretap Channel With Learning-Based Friendly Jamming Under Imperfect CSI

被引:0
作者
Tuan, Bui Minh [1 ]
Nguyen, Diep N. [1 ]
Trung, Nguyen Linh [2 ]
Nguyen, Van-Dinh [3 ]
Huynh, Nguyen Van [4 ]
Hoang, Dinh Thai [1 ]
Krunz, Marwan [5 ]
Dutkiewicz, Eryk [1 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[2] Vietnam Natl Univ, Univ Engn & Technol, Fac Elect & Telecommun, Hanoi 100000, Vietnam
[3] Vin Univ, Coll Engn & Comp Sci, Hanoi 100000, Vietnam
[4] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, England
[5] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
基金
澳大利亚研究理事会;
关键词
Jamming; Security; Internet of Things; Eavesdropping; Array signal processing; Encryption; Communication system security; Channel estimation; Wireless networks; Surveillance; Anti-eavesdropping; autoencoder; friendly jamming (FJ); Internet of Things (IoT) security; multiple-input-multiple-output (MIMO); mutual information neural estimation (MINE); mutual information; physical-layer security (PLS); wiretap channel; PHYSICAL-LAYER SECURITY; INTERFERENCE; COMPLEXITY; CAPACITY; INTERNET; NETWORK;
D O I
10.1109/JIOT.2025.3536702
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible in practice. This challenge is even more acute in low-end IoT devices. We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels. In particular, we first develop an autoencoder-based communication architecture with FJ, namely, AEFJ, to jointly maximize the secrecy rate and minimize the block error rate (BLER) at the receiver without requiring perfect CSI of the legitimate channels. In addition, to deal with the case without CSI, we leverage the mutual information neural estimation (MINE) concept and design a MINE-based FJ scheme that can achieve comparable security performance to the conventional FJ methods that require perfect CSI. Extensive simulations in a multiple-input-multiple-output (MIMO) system demonstrate that our proposed solution can effectively deal with eavesdropping attacks in various settings. Moreover, the proposed framework can seamlessly integrate MIMO security and detection tasks into a unified end-to-end learning process. This integrated approach can significantly maximize the throughput and minimize the BLER, offering a good solution for enhancing communication security in wireless communication systems.
引用
收藏
页码:16009 / 16022
页数:14
相关论文
共 40 条
[1]  
Abughalwa M., 2024, IN PRESS
[2]   Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks [J].
Akgun, Berk ;
Koyluoglu, Onur Ozan ;
Krunz, Marwan .
IEEE Transactions on Communications, 2017, 65 (02) :956-968
[3]  
Barber D, 2004, ADV NEUR IN, V16, P201
[4]  
Belghazi MI, 2018, PR MACH LEARN RES, V80
[5]  
Bengio Y., 2017, Deep learning
[6]   Post-quantum cryptography [J].
Bernstein, Daniel J. ;
Lange, Tanja .
NATURE, 2017, 549 (7671) :188-194
[7]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[8]   A Robust Beamforming Approach to Guarantee Instantaneous Secrecy Rate [J].
Choi, Jinho .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) :1076-1085
[9]  
Chu NH, 2023, Arxiv, DOI arXiv:2308.02242
[10]  
Erpek Tugba, 2018, IEEE INT C COMMUNICA