DOI QR코드

DOI QR Code

Joint Beamforming and Jamming for Physical Layer Security

  • Myung, Jungho (Communications & Internet Research Laboratory, ETRI) ;
  • Heo, Hwanjo (Communications & Internet Research Laboratory, ETRI) ;
  • Park, Jongdae (Communications & Internet Research Laboratory, ETRI)
  • Received : 2015.02.05
  • Accepted : 2015.06.08
  • Published : 2015.10.01

Abstract

In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.

Keywords

References

  1. M. Costa, "Writing on Dirty Paper," IEEE Trans. Info. Theory, vol. 29, no. 3, May 1983, pp. 439-441. https://doi.org/10.1109/TIT.1983.1056659
  2. G.J. Foschini and M.J. Gans, "On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas," Wireless Pers. Commun., vol. 6, no. 3, Mar. 1998, pp. 311-335. https://doi.org/10.1023/A:1008889222784
  3. T.K.Y. Lo, "Maximum Ratio Transmission," IEEE Int. Conf. Commun., Vancouver, Canada, June 6-10, 1999, pp. 1310-1314.
  4. C.B. Peel, B.M. Hochwald, and A.L. Swindlehurst, "A Vector-Perturbation Technique for Near-Capacity Multiantenna Multiuser Communication-Part I: Channel Inversion and Regularization," IEEE Trans. Commun., vol. 53, no. 1, Jan. 2005, pp. 195-202. https://doi.org/10.1109/TCOMM.2004.840638
  5. G. Caire and S. Shamai, "On the Achievable Throughput of a Multi-antenna Gaussian Broadcast Channel," IEEE Trans. Info. Theory, vol. 49, no. 7, July 2003, pp. 1691-1706. https://doi.org/10.1109/TIT.2003.813523
  6. P. Viswanath and D.N.C. Tse, "Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality," IEEE Trans. Info. Theory, vol. 49, no. 8, Aug. 2003, pp. 1912-1921. https://doi.org/10.1109/TIT.2003.814483
  7. S. Vishwanath, N. Jindal, and A. Goldsmith, "Duality, Achievable Rates, and Sum Capacity of Gaussian MIMO Broadcast Channels," IEEE Trans. Info. Theory, vol. 49, no. 10, Oct. 2003, pp. 2658-2668. https://doi.org/10.1109/TIT.2003.817421
  8. C. Windpassisnger et al., "Precoding in Multi-antenna and Multiuser Communications," IEEE Trans. Wireless Commun., vol. 3, no. 4, July 2004, pp. 1305-1315. https://doi.org/10.1109/TWC.2004.830852
  9. Z. Shen et al., "Low Complexity User Selection Algorithms for Multiuser MIMO Systems with Block Diagonalization," IEEE Trans. Signal Process., vol. 54, no. 9, Sept. 2006, pp. 3658-3663. https://doi.org/10.1109/TSP.2006.879269
  10. R. Chen, R.W. Heath Jr., and J.G. Andrews, "Transmit Selection Diversity for Unitary Precoded Multiuser Spatial Multiplexing Systems with Linear Receivers," IEEE Trans. Signal Process., vol. 55, no. 3, Mar. 2007, pp. 1159-1171. https://doi.org/10.1109/TSP.2006.887147
  11. A.D. Wyner, "The Wire-Tap Channel," The Bell Sys. Tech. J., vol. 54, no. 8, Oct. 1975, pp. 1355-1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  12. M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Thory, vol. 54, no. 6, June 2008, pp. 2515-2534. https://doi.org/10.1109/TIT.2008.921908
  13. A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Info. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469. https://doi.org/10.1109/TIT.2008.921861
  14. E.G. Larsson and E.A. Jorswieck, "Competition versus Cooperation on the MISO Interference Channel," IEEE J. Sel. Areas Commun., vol. 26, no. 7, Sept. 2008, pp. 1059-1069. https://doi.org/10.1109/JSAC.2008.080904
  15. A. Khisti and G.W. Wornell, "Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Info. Theory, vol. 56, no. 7, July 2010, pp. 3088-3104. https://doi.org/10.1109/TIT.2010.2048445
  16. R. Liu and H.V. Poor, "Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages," IEEE Trans. Info. Theory, vol. 55, no. 3, Mar. 2009, pp. 1235-1249. https://doi.org/10.1109/TIT.2008.2011448
  17. T. Liu and S. Shamai, "A Note on the Secrecy Capacity of the Multiple Antenna Wiretap Channel," IEEE Trans. Info. Theory, vol. 55, no. 6, June 2009, pp. 2547-2553. https://doi.org/10.1109/TIT.2009.2018322
  18. F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Info. Theory, vol. 57, no. 8, Aug. 2011, pp. 4961-4972. https://doi.org/10.1109/TIT.2011.2158487
  19. J. Zhang et al., "Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis," IEEE Commun. Lett., July 2014, pp. 1627-1630.
  20. N. Yang et al., "Physical Layer Security of TAS/MRC with Antenna Correlation," IEEE Trans. Info. Forensics Security, Jan. 2013, pp. 254-259.
  21. X. Chen, C. Yuen, and Z. Zhang, "Exploiting Large-Scale MIMO Techniques for Physical Layer Security with Imperfect Channel State Information," IEEE GLOBECOM, Austin, TX, USA, Dec. 8-12, 2014, pp. 1648-1653.
  22. X. Chen et al., "On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI," IEEE Int. Conf., Sydney, Australia, June 10-14, 2014, pp. 2052-2057.
  23. S. Goel and R. Negi, "Guaranteeing Secrecy Using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-2189. https://doi.org/10.1109/TWC.2008.060848
  24. N. Sklavos and X. Zhang, Wireless Security and Cryptography: Specifications and Implementations, Boca Raton, FL, USA: CRC Press, 2007.

Cited by

  1. Joint distributed beamforming and jamming schemes in decode-and-forward relay networks for physical layer secrecy vol.2017, pp.1, 2015, https://doi.org/10.1186/s13638-017-0997-x
  2. Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks vol.2018, pp.None, 2015, https://doi.org/10.1155/2018/4143061