Browse > Article
http://dx.doi.org/10.4218/etrij.15.2415.0002

Joint Beamforming and Jamming for Physical Layer Security  

Myung, Jungho (Communications & Internet Research Laboratory, ETRI)
Heo, Hwanjo (Communications & Internet Research Laboratory, ETRI)
Park, Jongdae (Communications & Internet Research Laboratory, ETRI)
Publication Information
ETRI Journal / v.37, no.5, 2015 , pp. 898-905 More about this Journal
Abstract
In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.
Keywords
Beamforming; jamming; physical layer security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Costa, "Writing on Dirty Paper," IEEE Trans. Info. Theory, vol. 29, no. 3, May 1983, pp. 439-441.   DOI
2 G.J. Foschini and M.J. Gans, "On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas," Wireless Pers. Commun., vol. 6, no. 3, Mar. 1998, pp. 311-335.   DOI
3 T.K.Y. Lo, "Maximum Ratio Transmission," IEEE Int. Conf. Commun., Vancouver, Canada, June 6-10, 1999, pp. 1310-1314.
4 C.B. Peel, B.M. Hochwald, and A.L. Swindlehurst, "A Vector-Perturbation Technique for Near-Capacity Multiantenna Multiuser Communication-Part I: Channel Inversion and Regularization," IEEE Trans. Commun., vol. 53, no. 1, Jan. 2005, pp. 195-202.   DOI
5 G. Caire and S. Shamai, "On the Achievable Throughput of a Multi-antenna Gaussian Broadcast Channel," IEEE Trans. Info. Theory, vol. 49, no. 7, July 2003, pp. 1691-1706.   DOI
6 P. Viswanath and D.N.C. Tse, "Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality," IEEE Trans. Info. Theory, vol. 49, no. 8, Aug. 2003, pp. 1912-1921.   DOI
7 C. Windpassisnger et al., "Precoding in Multi-antenna and Multiuser Communications," IEEE Trans. Wireless Commun., vol. 3, no. 4, July 2004, pp. 1305-1315.   DOI
8 Z. Shen et al., "Low Complexity User Selection Algorithms for Multiuser MIMO Systems with Block Diagonalization," IEEE Trans. Signal Process., vol. 54, no. 9, Sept. 2006, pp. 3658-3663.   DOI
9 R. Chen, R.W. Heath Jr., and J.G. Andrews, "Transmit Selection Diversity for Unitary Precoded Multiuser Spatial Multiplexing Systems with Linear Receivers," IEEE Trans. Signal Process., vol. 55, no. 3, Mar. 2007, pp. 1159-1171.   DOI
10 A.D. Wyner, "The Wire-Tap Channel," The Bell Sys. Tech. J., vol. 54, no. 8, Oct. 1975, pp. 1355-1387.   DOI
11 M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Thory, vol. 54, no. 6, June 2008, pp. 2515-2534.   DOI
12 A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Info. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469.   DOI
13 E.G. Larsson and E.A. Jorswieck, "Competition versus Cooperation on the MISO Interference Channel," IEEE J. Sel. Areas Commun., vol. 26, no. 7, Sept. 2008, pp. 1059-1069.   DOI
14 A. Khisti and G.W. Wornell, "Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Info. Theory, vol. 56, no. 7, July 2010, pp. 3088-3104.   DOI
15 R. Liu and H.V. Poor, "Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages," IEEE Trans. Info. Theory, vol. 55, no. 3, Mar. 2009, pp. 1235-1249.   DOI
16 T. Liu and S. Shamai, "A Note on the Secrecy Capacity of the Multiple Antenna Wiretap Channel," IEEE Trans. Info. Theory, vol. 55, no. 6, June 2009, pp. 2547-2553.   DOI
17 X. Chen et al., "On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI," IEEE Int. Conf., Sydney, Australia, June 10-14, 2014, pp. 2052-2057.
18 F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Info. Theory, vol. 57, no. 8, Aug. 2011, pp. 4961-4972.   DOI
19 J. Zhang et al., "Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis," IEEE Commun. Lett., July 2014, pp. 1627-1630.
20 N. Yang et al., "Physical Layer Security of TAS/MRC with Antenna Correlation," IEEE Trans. Info. Forensics Security, Jan. 2013, pp. 254-259.
21 S. Goel and R. Negi, "Guaranteeing Secrecy Using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-2189.   DOI
22 N. Sklavos and X. Zhang, Wireless Security and Cryptography: Specifications and Implementations, Boca Raton, FL, USA: CRC Press, 2007.
23 X. Chen, C. Yuen, and Z. Zhang, "Exploiting Large-Scale MIMO Techniques for Physical Layer Security with Imperfect Channel State Information," IEEE GLOBECOM, Austin, TX, USA, Dec. 8-12, 2014, pp. 1648-1653.
24 S. Vishwanath, N. Jindal, and A. Goldsmith, "Duality, Achievable Rates, and Sum Capacity of Gaussian MIMO Broadcast Channels," IEEE Trans. Info. Theory, vol. 49, no. 10, Oct. 2003, pp. 2658-2668.   DOI