A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh (Institute of Research and Development, Duy Tan University, Danang Department of Information and Communication) ;
  • Kong, Hyung Yun (Department of Electrical Engineering, University of Ulsan)
  • Received : 2014.02.18
  • Accepted : 2015.04.10
  • Published : 2015.10.31

Abstract

This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Keywords

References

  1. E. Silva et al., "Identity-based key management in mobile ad hoc networks: Techniques and applications," IEEE Wireless Commun., vol. 15, no. 5, pp. 46-52, 2008. https://doi.org/10.1109/MWC.2008.4653131
  2. J. Barros andM. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. ISIT, 2006, pp. 356-360.
  3. M. Bloch et al., "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008. https://doi.org/10.1109/TIT.2008.921908
  4. S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
  5. H. Jing and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, 2011. https://doi.org/10.1109/TSP.2011.2161295
  6. A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas; part ii: The mimome wiretap channel," IEEE Trans. Inf. Theory, on, vol. 56, no. 11, pp. 5515-5532, 2010. https://doi.org/10.1109/TIT.2010.2068852
  7. I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, 2009. https://doi.org/10.1109/TWC.2009.090323
  8. F. Oggier and B. Hassibi, "The secrecy capacity of the mimo wiretap channel," in Proc. IEEE ISIT, 2008, pp. 524-528.
  9. P. Parada and R. Blahut, "Secrecy capacity of simo and slow fading channels," in Proc. IEEE ISIT, 2005, pp. 2152-2155.
  10. L. Ruoheng et al.,"Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, 2008. https://doi.org/10.1109/TIT.2008.921879
  11. S. Shafiee and S. Ulukus, "Achievable rates in Gaussian miso channels with secrecy constraints," in Proc. IEEE ISIT, 2007, pp. 2466-2470.
  12. X. Sun et al., "Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints," Wireless Personal Communi., vol. 70, no. 4, pp. 1633-1652, 2013. https://doi.org/10.1007/s11277-012-0771-7
  13. L. Yupeng, L. Jiangyuan, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, 2013. https://doi.org/10.1109/TIFS.2013.2248730
  14. D. Zhiguo et al., "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, 2011. https://doi.org/10.1109/TWC.2011.040511.101694
  15. R. Bustin, L. Ruoheng, and H. V. Poor, "An mmse approach to the secrecy capacity of the mimo gaussian wiretap channel," in Proc. IEEE ISIT, 2009, pp. 2602-2606.
  16. A. Khisti et al. "On the gaussian mimo wiretap channel," in Proc. IEEE ISIT, 2007, pp. 2471-2475.
  17. A. L. Swindlehurst, "Fixed sinr solutions for the mimo wiretap channel," in Proc. IEEE ICASSP 2009, 2009, pp. 2437-2440.
  18. V. Aggarwal et al. "Secrecy capacity of a class of orthogonal relay eavesdropper channels," in Proc. IEEE ITA, 2009, pp. 295-300.
  19. L. Jiangyuan, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, 2011. https://doi.org/10.1109/TSP.2011.2159598
  20. M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE ITW, 2007, pp. 595-600.
  21. D. Lun et al., "Improving wireless physical layer security via cooperating relays," IEEE Proc. Signal Process., vol. 58, no. 3, pp. 1875-1888, 2010. https://doi.org/10.1109/TSP.2009.2038412
  22. J. MinChul and K. Il-Min, "Relay selection with anc and tdbc protocols in bidirectional relay networks," IEEE Trans. Commun., vol. 58, no. 12, pp. 3500-3511, 2010. https://doi.org/10.1109/TCOMM.2010.101210.090585
  23. P. Popovski and H. Yomo, "Wireless network coding by amplify-andforward for bi-directional traffic flows," IEEE Commun. Lett., vol. 11, no. 1, pp. 16-18, 2007. https://doi.org/10.1109/LCOMM.2007.061436
  24. L. Qiang et al., "Cognitive spectrum sharing with two-way relaying systems," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1233-1240, 2011. https://doi.org/10.1109/TVT.2010.2104334