Joint Transmit Antenna Selection and Artificial Noise for Security in MIMO Wiretap Channels

Article Preview

Abstract:

In this paper, We propose a effective method which joint transmit antenna selection (TAS) and artificial noise to promote communication security in MIMO wiretap channels. Firstly, based on TAS protocol, the transmitter selects one antenna (the max-antenna) that maximizes the instantaneous signal-noise-ratio (SNR) at the receiver. Secondly, the transmitter uses the max-antenna to transmit valid data, and simultaneously, uses the remaining antennas to transmit artificial noise which only affects the eavesdropper. Thirdly, The receiver and the eavesdropper employ maximal-ratio combining (MRC) to combine the received signals. We focus on the practical scenario where the transmitter does not have any channel state information (CSI) of the eavesdroppers channel. Our joint TAS and artificial noise scheme (TAS-AN) have low complexity, and can enhance the systems security. The numerical simulation results verify our analysis.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1452-1457

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Wyner: The wire-tap channel. Bell System Technology Journal, vol. 54, no. 8 (1975) , pp.1355-1387.

DOI: 10.1002/j.1538-7305.1975.tb02040.x

Google Scholar

[2] L. Lai, H. E. Gamal, and H. V. Poor: The Wiretap Channel With Feedback: Encryption Over the Channel. IEEE Transactions on Information Theory, vol. 54, no. 11 (2008) , pp.5059-5067.

DOI: 10.1109/tit.2008.929914

Google Scholar

[3] M. Bloch and J. Barros, Physical-Layer Security From Information Theory to Security Engineering. Cambridge, New York: Cambridge University Press (2011).

Google Scholar

[4] Y. Liang, H. V. Poor, and S. S. (Shitz): Information Theoretic Security. Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5 ( 2009) , pp.355-580.

DOI: 10.1561/0100000036

Google Scholar

[5] T. Liu and S. Shamai: A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, vol. 55, no. 6 (2009) , pp.2547-2553.

DOI: 10.1109/tit.2009.2018322

Google Scholar

[6] S. Shafiee, N. Liu, and S. Ulukus: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Transactions on Information Theory, vol. 55, no. 9 (2009) , pp.4033-4039.

DOI: 10.1109/tit.2009.2025549

Google Scholar

[7] F. Oggier and B. Hassibi: The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory, vol. 57, no. 8 (2011) , pp.4961-4972.

DOI: 10.1109/tit.2011.2158487

Google Scholar

[8] S. Goel and R. Negi: Guaranteeing Secrecy using Artificial Noise. IEEE Transactions on Wireless Communications, vol. 7, no. 6 (2008) , pp.2180-2189.

DOI: 10.1109/twc.2008.060848

Google Scholar

[9] A. Mukherjee and A. L. Swindlehurst: Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE Transactions on Signal Processing, vol. 59, no. 1 (2011) , pp.351-361.

DOI: 10.1109/tsp.2010.2078810

Google Scholar

[10] W. -C. Liao, T. -H. Chang, W. -K. Ma, and C. -Y. Chi: QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach. IEEE Transactions on Signal Processing, vol. 59, no. 3 (2011) , pp.1202-1216.

DOI: 10.1109/tsp.2010.2094610

Google Scholar

[11] S. A. A. Fakoorian and A. L. Swindlehurst: MIMO interference channel with confidential messages: achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security, vol. 6, no. 3 (2011) , pp.640-649.

DOI: 10.1109/tifs.2011.2156788

Google Scholar

[12] T. Gucluoglu and T. M. Duman: Performance analysis of transmit and receive antenna selection over flat fading channels. IEEE Transactions on Wireless Communications, vol. 7, no. 8 (2008) , pp.3056-3065.

DOI: 10.1109/twc.2008.061087

Google Scholar

[13] H. Alves, R. D. Souza, and M. Debbah: Enhanced physical layer security through transmit antenna selection. in IEEE GlobeCOM 2011 (2011) , pp.879-883.

DOI: 10.1109/glocomw.2011.6162582

Google Scholar

[14] H. Alves, R. D. Souza, M. Debbah, and M. Bennis: Performance of transmit antenna selection physical layer security schemes. IEEE Signal Processing Letters, vol. 19, no. 6 (2012) , pp.372-375.

DOI: 10.1109/lsp.2012.2195490

Google Scholar

[15] N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings: Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. IEEE Transactions on Communications, vol. 61, no. 1 (2013) , pp.144-154.

DOI: 10.1109/tcomm.2012.12.110670

Google Scholar

[16] N. Yang, H. A. Suraweera, I. B. Collings, and Y. Chau: Physical Layer Security of TAS/MRC With Antenna Correlation. IEEE Transactions on Information Forensics and Security, vol. 8, no. 1 (2013) , pp.254-259.

DOI: 10.1109/tifs.2012.2223681

Google Scholar

[17] B. Tan, K. Li, and K. The: Transmit Antenna Selection Systems: A Performance Comparison of Different Types of Receiver Schemes. IEEE Vehicular Technology Magazine, vol. 8, no. 3 (2013) , pp.104-112.

DOI: 10.1109/mvt.2013.2252300

Google Scholar

[18] S. Yan, N. Yang, R. Malaney, and J. Yuan: Transmit Antenna Selection with Alamouti Scheme in MIMO Wiretap Channels. Information on http: /arxiv. org/abs/1303. 5157v1.

DOI: 10.1109/glocom.2013.6831148

Google Scholar