A new jamming technique for secrecy in multi-antenna wireless networks

被引:4
作者
Bakr, Omar [1 ]
Mudumbai, Raghuraman [2 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[2] Univ Iowa, Dept Elect & Comp Engn, Iowa City, IA 52242 USA
来源
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2010年
基金
美国国家科学基金会;
关键词
TAP CHANNEL; NOISE;
D O I
10.1109/ISIT.2010.5513559
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms.
引用
收藏
页码:2513 / 2517
页数:5
相关论文
共 21 条
[1]  
[Anonymous], EUROPEAN T TELECOMMU
[2]  
BABAKHANI A, 2008, IEEE INT SOL STAT CI, P188
[3]  
BAKR O, 2009, ALL C COMM CONTR COM
[4]  
BLACHMAN N., 1957, IEE WESCON 1957 C RE, VII, P61
[5]   SOME INFORMATION THEORETIC SADDLEPOINTS [J].
BORDEN, JM ;
MASON, DM ;
MCELIECE, RJ .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 1985, 23 (01) :129-143
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]  
DOBRUSHIN RL, 1959, RADIO ENG ELECT, V4, P1
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[10]   Independent component analysis:: algorithms and applications [J].
Hyvärinen, A ;
Oja, E .
NEURAL NETWORKS, 2000, 13 (4-5) :411-430