Browse > Article
http://dx.doi.org/10.3837/tiis.2016.05.012

Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel  

Wang, Shu (Information and Navigation College, Air Force Engineering University)
Da, Xinyu (Information and Navigation College, Air Force Engineering University)
Chu, Zhenyong (Information and Navigation College, Air Force Engineering University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.5, 2016 , pp. 2166-2180 More about this Journal
Abstract
We investigate the opposite of artificial noise (AN)-assisted communication in multiple-input-multiple-output (MIMO) wiretap channels for the multiuser case by taking the side of the eavesdropper. We first define a framework for an AN-assisted multiuser multiple-input-multiple-output (MU-MIMO) system, for which eavesdropping methods are proposed with and without knowledge of legitimate users' channel state information (CSI). The proposed method without CSI is based on a modified joint approximate diagonalization of eigen-matrices algorithm, which eliminates permutation indetermination and phase ambiguity, as well as the minimum description length algorithm, which blindly estimates the number of secret data sources. Simulation results show that both proposed methods can intercept information effectively. In addition, the proposed method without legitimate users' CSI performs well in terms of robustness and computational complexity.
Keywords
Physical layer security; artificial noise(AN); joint approximate diagonalization of eigen-matrices (JADE) algorithm; wiretapping;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Goel, R. Negi, “Guaranteeing Secrecy Using Artificial Noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June. 2008. Article (CrossRef Link).   DOI
2 X. Chen and R. Yin, “Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback,” IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503–506, October. 2013. Article (CrossRef Link).   DOI
3 Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay selection for security enhancement in cognitive relay networks,” IEEE Commun. Lett., vol. 4, no. 1, pp. 46–49, February. 2015. Article (CrossRef Link).   DOI
4 A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no.8, pp. 1355-1387, August. 1975. Article (CrossRef Link).   DOI
5 A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. of 2009 Allerton Conf. Commun., Control, Comput., pp. 1134-1141. September. 30-October. 2, 2009. Article (CrossRef Link).
6 N. Li, X. Tao, and J. Xu, “Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation,” IEEE Commun. Lett., vol. 19, no. 2, pp. 295–298, February. 2015. Article (CrossRef Link).   DOI
7 M. Pei, J. Wei, K. Wong, and X. Wang, “Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no.2, pp. 544-549, February. 2012. Article (CrossRef Link).   DOI
8 T. Shang-Ho, H. Vincent, “Power Allocation for Artificial-Noise Secure MIMO Precoding Systems,” IEEE Transactions on. Signal Processing, vol. 62, no.13, pp. 3479-3492, July. 2014. Article (CrossRef Link).   DOI
9 N. Li, X. Tao, H. Wu, J. Xu and Q. Cui "Large System Analysis of Artificial Noise Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum-rate and Optimal Power Allocation," IEEE Vehicular Technology Society, to appear. Article (CrossRef Link).
10 Q. Li, W. Ma, and S. Anthony, “A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels,” IEEE Signal Processing Letters, vol. 21, no.1, pp. 118–121, January. 2014. Article (CrossRef Link).   DOI
11 F. Wu, W. Wang, B. Yao and Q.Y. Yin, "Effective eavesdropping in the Artificial noise aided security scheme," in Proc. of 2013 IEEE/CIC International Conference on Communications in China (ICCC), pp. 214 - 218, August.12-14, 2013. Article (CrossRef Link).
12 L. Lu, L. Jin, and K. Huang, "Eavesdropping Against Artificial Noise: Hyperplane Clustering," in Proc. of IEEE International Conference on Information Science and Technology, pp. 1571-1575, March. 23-25, 2013. Article (CrossRef Link).
13 D. T. Pham and J. Cardoso., “Blind separation of instantaneous mixtures of nonstationary sources,” IEEE Trans. Signal Process., vol. 49, no.9, pp.1837-1848, September. 2001. Article (CrossRef Link).   DOI
14 S. Liu, Y. Hong, and E. Viterbo, "Artificial Noise Revisited: When Eve Has more Antennas than Alice," in Proc. of IEEE Int. Conf. Signal Process. Commun. (SPCOM), pp. 1-5, July.22-25, 2014. Article (CrossRef Link).
15 J. Rissanen, F. R. Hill; R. L. Pickholtz "Estimating the number of signals using the eigenvalues of the correlation matrix," in Proc. of Military Communications Conference 1989 (MILCOM '89). Conference Record. Bridging the Gap. Interoperability, Survivability, Security, pp. 353-358, October 15-18, 1989. Article (CrossRef Link).
16 Q. H. Spencer, A. L. Swindlehurst, and M. Haardt., “Zero forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. Signal Process., vol. 52, no.2,.pp.461-471, February. 2004. Article (CrossRef Link).   DOI
17 F. Gu, Z. Hang, and Y. Xiao, "Multichannel blind deconvolution of complex I/Q independent sources with phase recovery," in Proc. of International Conference on Wireless Communications and Signal Processing (WCSP), pp.1-6, October 24-26,2013. Article (CrossRef Link).