Physical Layer Security in MIMO Backscatter Wireless Systems

被引:64
作者
Yang, Qian [1 ,2 ]
Wang, Hui-Ming [1 ,2 ]
Zhang, Yi [1 ,2 ]
Han, Zhu [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
基金
中国国家自然科学基金;
关键词
MIMO backscatter wireless communication; RFID; physical layer security; artificial noise; optimization; WIRETAP CHANNELS; OPTIMIZATION; SECRECY; COMMUNICATION; PRIVACY;
D O I
10.1109/TWC.2016.2604800
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Backscatter wireless communication is an emerging technique widely used in low-cost and low-power wireless systems, especially in passive radio frequency identification (RFID) systems. Recently, the requirement of high data rates, data reliability, and security drives the development of RFID systems, which motivates our investigation on the physical layer security of a multiple-input multiple-output (MIMO) RFID system. In this paper, we propose a noise-injection precoding strategy to safeguard the system security with the resource-constrained nature of the backscatter system taken into consideration. We first consider a multi-antenna RFID tag case and investigate the secrecy rate maximization (SRM) problem by jointly optimizing the energy supply power and the precoding matrix of the injected artificial noise at the RFID reader. We exploit the alternating optimization method and the sequential parametric convex approximation method, respectively, to tackle the non-convex SRM problem and show an interesting fact that the two methods are actually equivalent for our SRM problem with the convergence of a Karush-Kuhn-Tucker point. To facilitate the practical implementation for resource-constrained RFID devices, we propose a fast algorithm based on projected gradient. We also consider a single-antenna RFID tag case and develop a low-complexity algorithm, which yields the global optimal solution. Simulation results show the superiority of our proposed algorithms in terms of the secrecy rate and computational complexity.
引用
收藏
页码:7547 / 7560
页数:14
相关论文
共 56 条
[1]  
Akbar MB, 2012, IEEE ANTENNAS PROP
[2]  
Alexandris K, 2014, PR IEEE SEN ARRAY, P329, DOI 10.1109/SAM.2014.6882408
[3]  
[Anonymous], 2016, P 26 INT C FIELD PRO
[4]  
[Anonymous], 2011, Complex-Valued Matrix Derivatives: With Applications in Signal Processing and Communications
[5]   A sequential parametric convex approximation method with applications to nonconvex truss topology design problems [J].
Beck, Amir ;
Ben-Tal, Aharon ;
Tetruashvili, Luba .
JOURNAL OF GLOBAL OPTIMIZATION, 2010, 47 (01) :29-51
[6]  
Bertsekas DP., 1999, NONLINEAR PROGRAMMIN
[7]  
Bloch M., 2011, Physical-layer security: from information theory to security engineering
[8]  
Boyd S., 2004, Convex optimization, DOI [10.1017/cbo97805118044 41, 10.1017/CBO9780511804441]
[9]   Backscatter Communication and RFID: Coding, Energy, and MIMO Analysis [J].
Boyer, Colby ;
Roy, Sumit .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (03) :770-785
[10]   Space Time Coding for Backscatter RFID [J].
Boyer, Colby ;
Roy, Sumit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (05) :2272-2280