Browse > Article
http://dx.doi.org/10.3837/tiis.2021.06.015

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers  

Liu, Xiaochen (Collage of Communications Engineering, University of Army Engineering University of PLA)
Gao, Yuanyuan (Collage of Communications Engineering, University of Army Engineering University of PLA)
Sha, Nan (Collage of Communications Engineering, University of Army Engineering University of PLA)
Zang, Guozhen (Collage of Communications Engineering, University of Army Engineering University of PLA)
Wang, Shijie (Collage of Communications Engineering, University of Army Engineering University of PLA)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.6, 2021 , pp. 2204-2224 More about this Journal
Abstract
This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.
Keywords
Physical-layer security; artificial noise; imperfect CSI; transmit power minimization; secrecy rate maximization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. Csiszar, and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.   DOI
2 J. Zhu, W. Xu, and N. Wang, "Secure Massive MIMO Systems With Limited RF Chains," IEEE Trans. Veh. Technol., vol. 66, no. 6, pp. 5455-5460, Jun. 2017.   DOI
3 S. Shafiee, and S. Ulukus, "Achievable Rates in Gaussian MISO Channels with Secrecy Constraints," in Proc. of 2007 IEEE International Symposium on Information Theory, Nice, France, pp. 2466-2470, 2007.
4 J. Li, A. P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.   DOI
5 F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, "Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT," IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017.   DOI
6 Wyner, and D. A., "The wire-tap channel," Bell Labs Tech., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.   DOI
7 G. J. Foschini, and M. J. Gans, "On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas," Wirel. Pers. Commun., vol. 6, no. 3, pp. 311-335, Mar. 1998.   DOI
8 S. Goel, and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.   DOI
9 F. Oggier, and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. of 2008 IEEE International Symposium on Information Theory, pp. 524-528, 2008.
10 T. R. Dean, and A. J. Goldsmith, "Physical-Layer Cryptography Through Massive MIMO," in Proc. of 2013 IEEE Information Theory Workshop (ITW), pp. 1-5, 2013.
11 J. Wang, and D. P. Palomar, "Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge," IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3086-3100, Aug. 2009.   DOI
12 L. Li, Z. Chen, and J. Fang, "Robust transmit design for secure AF relay networks based on worst-case optimization," in Proc. of 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, pp. 2719-2723, 2014.
13 Y. Huang, P. Zhang, Q. Wu, and J. Wang, "Secrecy performance of wireless powered communication networks with multiple eavesdroppers and outdated CSI," IEEE Access, vol. 6, pp. 33774-33788, 2018.   DOI
14 S. G. Nash, "Linear and Nonlinear Programming," International Encyclopedia of the Social & Behavioral Sciences, vol. 67, no. 2, pp. 8868-8874, 2001.
15 S. Ma, M. Hong, E. Song, X. Wang, and D. Sun, "Outage Constrained Robust Secure Transmission for MISO Wiretap Channels," IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5558-5570, Oct. 2014.   DOI
16 Q. Li, and W. K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.   DOI
17 J. Huang, and A. L. Swindlehurst, "Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.   DOI
18 X. Zhou, Z. Rezki, B. Alomair, and M. S. Alouini, "Achievable Rates of Secure Transmission in Gaussian MISO Channel with Imperfect Main Channel Estimation," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4470-4485, Jun. 2016.   DOI
19 C. Shen, T. H. Chang, K. Y. Wang, Z. Qiu, and C. Y. Chi, "Distributed Robust Multicell Coordinated Beamforming With Imperfect CSI: An ADMM Approach," IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2988-3003, Jun. 2012.   DOI
20 G. C. Alexandropoulos, and K. P. Peppas, "Secrecy outage analysis over correlated composite Nakagami-m Gamma fading channels," IEEE Commun. Lett., vol. 22, no. 1, pp. 77-80, Jan. 2017.   DOI
21 D. W. K. Ng, E. S. Lo, and R. Schober, "Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.   DOI
22 G. G. Raleigh, and J. M. Cioffi, "Spatio-temporal coding for wireless communications," IEEE Trans. Commun., vol. 46, no. 3, pp. 357-366, Mar. 1998.   DOI
23 L. El Ghaoui, and S. L. Niculescu, "Advances in linear matrix inequality methods in control: advances in design and control," Society for Industrial & Applied Mathematics Philadelphia Pa, 1999.
24 M. Grant and S. Boyd. (Mar. 2014). CVX: MATLAB Software for Disciplined Convex Programming, Version 2.1. [Online]. Available: http://cvxr.com/cvx
25 A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," J. Global Optim., vol. 47, no. 1,pp. 29-51, May 2010.   DOI
26 C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech., vol. 28, no. 4, pp. 656-715, Oct. 1949.   DOI
27 E. Telatar, "Capacity of Multi-antenna Gaussian Channels," Eur. Trans. Telecommun, vol. 10, no. 6, pp. 585-595, 1999.   DOI
28 K. Cumanan, G. C. Alexandropoulos, Z. Ding, and G. K. Karagiannidis, "Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis," IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7495-7505, Aug. 2017.   DOI
29 W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.   DOI
30 X. Zhou, and M. R. Mckay, "Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.   DOI
31 A. Khisti, and G. W. Wornell, "Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.   DOI
32 Y. Liu, L. Li, G. Alexandropoulos, and M. Pesavento, "Securing relay networks with artificial noise: An error performance-based approach," Entropy, vol. 19, no. 8, pp. 384, Jul. 2017.   DOI
33 J. Zhu, Y. Li, N. Wang, and W. Xu, "Wireless Information and Power Transfer in Secure Massive MIMO Downlink With Phase Noise," IEEE Wireless Commun. Lett., vol. 6, no. 3, pp. 298-301, Jun. 2017.   DOI
34 Z. Chu, H. Xing, M. Johnston, and S. L. Goff, "Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283-297, Jan. 2016.   DOI
35 Khisti, Wornell, and W. G., "Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.   DOI
36 Q. Li, Y. Zhang, J. Lin, and S. X. Wu, "Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI," IEEE Trans. Signal Process., vol. 65, no. 17, pp. 4684-4697, Sep. 2017.   DOI
37 Y. Huang, Z. Li, F. Zhou, and R. Zhu, "Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model," IEEE Access, vol. 5, pp. 14011-14019, 2017.   DOI