MIMO Secret Communications Against an Active Eavesdropper

被引:37
作者
Li, Lingxiang [1 ,2 ]
Petropulu, Athina P. [1 ]
Chen, Zhi [2 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08854 USA
[2] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical-layer security; cooperative communications; multi-input multi-output; active eavesdropper; PHYSICAL LAYER SECURITY; GAUSSIAN WIRETAP CHANNEL; MULTIPLE-INPUT; MASSIVE MIMO; TRANSMISSION; CAPACITY; FREEDOM;
D O I
10.1109/TIFS.2017.2705618
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret in the presence of an active Eve, who is capable of jamming as well as eavesdropping and operates in full-duplex (FD) mode. As countermeasure, Bob operates in FD mode, using a subset of its antennas to receive, and the remaining antennas to transmit jamming noise. Alice and Bob employ linear precoding, and all nodes use Gaussian code books. In that context, our goal is to maximize the achievable secrecy degrees of freedom (S.D.o.F.) of the system. We provide the optimal receive/transmit antennas allocation at Bob, based on which we determine in closed form the maximum achievable S.D.o.F. We also provide a method for constructing the precoding matrices of Alice and Bob, based on which the maximum S.D.o.F. can be achieved. We further investigate the adverse scenario in which Eve knows Bob's transmission strategy and optimizes its transmit/receive antennas allocation in order to minimize the achievable S.D.o.F. For that case, we find the worst case achievable S.D.o.F. Numerical results validate the theoretical findings and demonstrate the performance of the proposed method.
引用
收藏
页码:2387 / 2401
页数:15
相关论文
共 43 条
[1]   Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers [J].
Al-nahari, Azzam .
IET COMMUNICATIONS, 2016, 10 (01) :50-56
[2]   Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme [J].
Amariucai, George T. ;
Wei, Shuangqing .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) :4660-4677
[3]  
[Anonymous], FUNDAMENTALS WIRELES
[4]  
Banawan K, 2016, IEEE INT SYMP INFO, P2444, DOI 10.1109/ISIT.2016.7541738
[5]  
Banawan K, 2016, IEEE INT SYMP INFO, P2814, DOI 10.1109/ISIT.2016.7541812
[6]  
Chiang HT, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P125, DOI 10.1109/MILCOM.2011.6127474
[7]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane Y. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) :1833-1847
[8]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[9]  
Fakoorian S. A. A., 2012, Proceedings of the 2012 IEEE International Symposium on Information Theory - ISIT, P2321, DOI 10.1109/ISIT.2012.6283927
[10]   Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer [J].
Fakoorian, S. Ali A. ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) :5013-5022