Physical Layer Security in MIMO Backscatter Wireless Systems

被引:65
作者
Yang, Qian [1 ,2 ]
Wang, Hui-Ming [1 ,2 ]
Zhang, Yi [1 ,2 ]
Han, Zhu [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
基金
中国国家自然科学基金;
关键词
MIMO backscatter wireless communication; RFID; physical layer security; artificial noise; optimization; WIRETAP CHANNELS; OPTIMIZATION; SECRECY; COMMUNICATION; PRIVACY;
D O I
10.1109/TWC.2016.2604800
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Backscatter wireless communication is an emerging technique widely used in low-cost and low-power wireless systems, especially in passive radio frequency identification (RFID) systems. Recently, the requirement of high data rates, data reliability, and security drives the development of RFID systems, which motivates our investigation on the physical layer security of a multiple-input multiple-output (MIMO) RFID system. In this paper, we propose a noise-injection precoding strategy to safeguard the system security with the resource-constrained nature of the backscatter system taken into consideration. We first consider a multi-antenna RFID tag case and investigate the secrecy rate maximization (SRM) problem by jointly optimizing the energy supply power and the precoding matrix of the injected artificial noise at the RFID reader. We exploit the alternating optimization method and the sequential parametric convex approximation method, respectively, to tackle the non-convex SRM problem and show an interesting fact that the two methods are actually equivalent for our SRM problem with the convergence of a Karush-Kuhn-Tucker point. To facilitate the practical implementation for resource-constrained RFID devices, we propose a fast algorithm based on projected gradient. We also consider a single-antenna RFID tag case and develop a low-complexity algorithm, which yields the global optimal solution. Simulation results show the superiority of our proposed algorithms in terms of the secrecy rate and computational complexity.
引用
收藏
页码:7547 / 7560
页数:14
相关论文
共 56 条
[31]   On Cooperative Relaying Schemes for Wireless Physical Layer Security [J].
Li, Jiangyuan ;
Petropulu, Athina P. ;
Weber, Steven .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) :4985-4997
[32]   Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization [J].
Li, Qiang ;
Hong, Mingyi ;
Wai, Hoi-To ;
Liu, Ya-Feng ;
Ma, Wing-Kin ;
Luo, Zhi-Quan .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1714-1727
[33]   Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization [J].
Li, Qiang ;
Ma, Wing-Kin .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2704-2717
[34]   Semidefinite Relaxation of Quadratic Optimization Problems [J].
Luo, Zhi-Quan ;
Ma, Wing-Kin ;
So, Anthony Man-Cho ;
Ye, Yinyu ;
Zhang, Shuzhong .
IEEE SIGNAL PROCESSING MAGAZINE, 2010, 27 (03) :20-34
[35]   GENERAL INNER APPROXIMATION ALGORITHM FOR NON-CONVEX MATHEMATICAL PROGRAMS [J].
MARKS, BR ;
WRIGHT, GP .
OPERATIONS RESEARCH, 1978, 26 (04) :681-683
[36]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573
[37]  
Mukherjee A, 2011, CONF REC ASILOMAR C, P265, DOI 10.1109/ACSSC.2011.6189999
[38]  
Negi R, 2005, IEEE VTS VEH TECHNOL, P1906
[39]   The Secrecy Capacity of the MIMO Wiretap Channel [J].
Oggier, Frederique ;
Hassibi, Babak .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) :4961-4972
[40]   Convex primal decomposition for multicarrier linear MIMO transceivers [J].
Palomar, DP .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (12) :4661-4674