Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions

被引:16
作者
Fan, Ye [1 ,2 ]
Li, Ang [1 ]
Liao, Xuewen [1 ,3 ]
Leung, Victor C. M. [4 ,5 ]
机构
[1] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Fac Elect & Informat Engn, Xian 710049, Peoples R China
[2] Northwestern Polytech Univ, Sch Elect & Informat, Xian 710072, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[5] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
关键词
MU-MISO; physical layer security; jamming; symbol-level precoding; destructive region; PHYSICAL LAYER SECURITY; FREEDOM; NETWORKS; DOWNLINK; MIMO;
D O I
10.1109/TIFS.2020.3013210
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on the physical layer security for a K-user multiple-input-single-output (MISO) wiretap channel in the presence of a malicious eavesdropper, where we propose several interference exploitation (IE) precoding schemes for different types of the eavesdropper. Specifically, in the case where a common eavesdropper decodes the signal directly and Eve's full channel state information (CSI) is available at the transmitter, we show that the required transmit power can be further reduced by re-designing the 'destructive region' of the constellations for symbol-level precoding and re-formulating the power minimization problem. We further study the SINR balancing problems with the derived 'complete destructive region' with full, statistical and no Eve's CSI, respectively, and show that the SINR balancing problem becomes non-convex with statistical or no Eve's CSI. On the other hand, in the presence of a smart eavesdropper using maximal likelihood (ML) detection, the security cannot be guaranteed with all the existing approaches. To this end, we further propose a random jamming scheme (RJS) and a random precoding scheme (RPS), respectively. To solve the introduced convex/non-convex problems in an efficient manner, we propose an iterative algorithm for the convex ones based on the Karush-Kuhn-Tucker (KKT) conditions, and deal with the non-convex ones by resorting to Taylor expansions. Simulation results show that all proposed schemes outperform the existing works in secrecy performance, and that the proposed algorithm improves the computation efficiency significantly.
引用
收藏
页码:402 / 417
页数:16
相关论文
共 36 条
[1]   Performance Analysis of Cryptographic Pseudorandom Number Generators [J].
Aljohani, Mohammad ;
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Alassafi, Madini O. .
IEEE ACCESS, 2019, 7 :39794-39805
[2]   Symbol-Level Multiuser MISO Precoding for Multi-Level Adaptive Modulation [J].
Alodeh, Maha ;
Chatzinotas, Symeon ;
Ottersten, Bjorn .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (08) :5511-5524
[3]  
Alodeh M, 2017, INT CONF ACOUST SPEE, P3779, DOI 10.1109/ICASSP.2017.7952863
[4]   Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel [J].
Alodeh, Maha ;
Chatzinotas, Symeon ;
Ottersten, Bjoern .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (09) :2239-2252
[5]   Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond [J].
Binh Van Nguyen ;
Jung, Hyoyoung ;
Kim, Kiseon .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) :131-137
[6]   Achievable Secure Degrees of Freedom of K-User MISO Broadcast Channel With Imperfect CSIT [J].
Fan, Ye ;
Liao, Xuewen ;
Gao, Zhenzhen ;
Leung, Victor C. M. .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (03) :933-936
[7]   Physical Layer Security Based on Interference Alignment in K-User MIMO Y Wiretap Channels [J].
Fan, Ye ;
Liao, Xuewen ;
Vasilakos, Athanasios V. .
IEEE ACCESS, 2017, 5 :5747-5759
[8]   Power Minimizer Symbol-Level Precoding: A Closed-Form Suboptimal Solution [J].
Haqiqatnejad, Alireza ;
Kayhan, Farbod ;
Ottersten, Bjorn .
IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (11) :1730-1734
[9]   Symbol-Level Precoding Design Based on Distance Preserving Constructive Interference Regions [J].
Haqiqatnejad, Alireza ;
Kayhan, Farbod ;
Ottersten, Bjorn .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (22) :5817-5832
[10]   Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things [J].
Hu, Lin ;
Wen, Hong ;
Wu, Bin ;
Pan, Fei ;
Liao, Run-Fa ;
Song, Huanhuan ;
Tang, Jie ;
Wang, Xiumin .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :219-228