Abstract
In this paper, we propose a hybrid scheme called transmit antenna selection and receiver’s artificial noise (TAS–rAN) for security enhancement in multiple-input single-output (MISO) wiretap channels. In this scheme, by using TAS protocol, the transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver would send artificial noise (AN) to confuse the potential eavesdropper. For the proposed protocol, we consider Rayleigh fading channels with different parameters for the main channel and the eavesdropper’s channel, and derive new closed-form expressions for the exact secrecy outage probability and the asymptotic secrecy outage probability. We demonstrate that the proposed TAS–rAN protocol can offer higher secure performances than both existed single TAS and TAS–Alamouti schemes. Comparing to the existing schemes with AN-aided by full-duplex receiver, our TAS–rAN strategy considers the multi-antenna transmitter with TAS protocol, and the secrecy outage probability is improved with increasing the antenna number. The numerical simulation results verify our analysis.
Funding statement: Funding: This research was supported in part by the National Nature Science Foundation of China under grant nos 61471392, 61102092 and 61301161.
Acknowledgments
The authors would like to thank the reviewers and the guest editor for their comments and suggestions.
References
[1] Y.Liang, H. V.Poor, and S. S.Shitz, “Information theoretic security,” Found. Trends Commun. Inf. Theory, vol. 5, no. 4–5, pp. 355–580, 2009.10.1561/0100000036Search in Google Scholar
[2] B.Azimi-Sadjadi, E.Ekrem, H. E.Gamal, E.Erkip, S.Goel, L.Greenstein, et al., Securing Wireless Communications at the Physical Layer. New York: Springer, 2010.Search in Google Scholar
[3] M.Bloch and J.Barros, Physical-Layer Security from Information Theory to Security Engineering. Cambridge and New York: Cambridge University Press, 2011.10.1017/CBO9780511977985Search in Google Scholar
[4] X.Zhou, L.Song, and Y.Zang (eds.), Physical Layer Security in Wireless Communications. New York: CRC Press, 2013.Search in Google Scholar
[5] A.Mukherjee, S.Fakoorian, J.Huang, and A.Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surv. Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014.Search in Google Scholar
[6] C. E.Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.10.1002/j.1538-7305.1949.tb00928.xSearch in Google Scholar
[7] A. D.Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.Search in Google Scholar
[8] I.Csiszar and J.Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.10.1109/TIT.1978.1055892Search in Google Scholar
[9] S. K.Leung-Yan-Cheong and M. E.Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451–456, July 1978.10.1109/TIT.1978.1055917Search in Google Scholar
[10] [label=10] R.Bassily, E.Ekrem, X.He, E.Tekin, J.Xie, M. R.Bloch, et al., “Cooperative security at the physical layer – A summary of recent advances,” IEEE Signal Process Mag., vol. 30, no. 5, pp. 16–28, Sep. 2013.10.1109/MSP.2013.2260875Search in Google Scholar
[11] Y. W. P.Hong, L.Pang-Chang, and C. C. J.Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches,” IEEE Signal Process Mag., vol. 30, no. 5, pp. 29–40, Sep. 2013.10.1109/MSP.2013.2256953Search in Google Scholar
[12] W. K.Harrison, J.Almeida, M. R.Bloch, S. W.McLaughlin, and J.Barros, “Coding for secrecy: An overview of error-control coding techniques for physical-layer security,” IEEE Signal Process Mag., vol. 30, no. 5, pp. 41–50, 2013.10.1109/MSP.2013.2265141Search in Google Scholar
[13] Y.Nan, M.Elkashlan, P. L.Yeoh, and J.Yuan, “An introduction to transmit antenna selection in MIMO wiretap channels,” ZTE Commun., vol. 11, no. 3, pp. 26–32, Sep. 2013.Search in Google Scholar
[14] J.Mietzner, R.Schober, L.Lampe, W. H.Gerstacker, and P. A.Hoeher, “Multiple-antenna techniques for wireless communications – A comprehensive literature survey,” IEEE Commun. Surv. Tutorials, vol. 11, no. 2, pp. 87–105, Second Quarter 2009.10.1109/SURV.2009.090207Search in Google Scholar
[15] S.Shafiee, L.Nan, and S.Ulukus, “Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel,” IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033–4039, Sept. 2009.Search in Google Scholar
[16] L.Tie and S.Shamai, “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, 2009.Search in Google Scholar
[17] F.Oggier and B.Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, Aug. 2011.Search in Google Scholar
[18] D.Vouyioukas, “A survey on beamforming techniques for wireless MIMO relay networks,” Int. J. Antennas Propag., vol. 2013, no. Article ID 745018, pp. 1–21, 2013.Search in Google Scholar
[19] S.Goel and R.Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008.Search in Google Scholar
[20] A.Khisti and G. W.Wornell, “Secure transmission with multiple antennas part I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, July 2010.Search in Google Scholar
[21] L.Wei-Cheng, C.Tsung-Hui, M.Wing-Kin, and C.Chong-Yung, “QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach,” IEEE Trans. Signal Process, vol. 59, no. 3, pp. 1202–1216, Mar. 2011.Search in Google Scholar
[22] A.Mukherjee and A. L.Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process, vol. 59, no. 1, pp. 351–361, Jan. 2011.10.1109/TSP.2010.2078810Search in Google Scholar
[23] P.Minyan, W.Jibo, W.Kai-Kit, and W.Xin, “Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544–549, 2012.10.1109/TWC.2011.120511.110567Search in Google Scholar
[24] Q.Li and W. -K.Ma, “Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization,” IEEE Trans. Signal Process, vol. 61, no. 10, pp. 2704–2717, May 2013.Search in Google Scholar
[25] L.Pin-Hsun, L.Szu-Hsiang, L.Shih-Chun, and S.Hsuan-Jung, “On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728–1740, 2013.Search in Google Scholar
[26] B. S.Tan, K. H.Li, and K. C.Teh, “Transmit antenna selection systems a performance comparison of different types of receiver schemes,” IEEE Veh. Technol. Mag., vol. 8, no. 3, pp. 104–112, Sept. 2013.10.1109/MVT.2013.2252300Search in Google Scholar
[27] H.Alves, R. D.Souza, and M.Debbah, Enhanced physical layer security through transmit antenna selection,” in Proc. IEEE GlobeCOM Workshops, Houston, TX, 2011, pp. 879–883.10.1109/GLOCOMW.2011.6162582Search in Google Scholar
[28] H.Alves, R. D.Souza, M.Debbah, and M.Bennis, “Performance of transmit antenna selection physical layer security schemes,” IEEE Signal Process Lett., vol. 19, no. 6, pp. 372–375, June 2012.10.1109/LSP.2012.2195490Search in Google Scholar
[29] Y.Nan, P. L.Yeoh, M.Elkashlan, R.Schober, and I. B.Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels,” IEEE Trans. Commun., vol. 61, no. 1, pp. 144–154, Jan. 2013.10.1109/TCOMM.2012.12.110670Search in Google Scholar
[30] Y.Nan, H. A.Suraweera, I. B.Collings, and Y.Chau, “Physical layer security of TAS/MRC with antenna correlation,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 1, pp. 254–259, Jan. 2013.10.1109/TIFS.2012.2223681Search in Google Scholar
[31] P. L.Yeoh, M.Elkashlan, Y.Nan, D. B.da Costa, and T. Q.Duong, “Unified analysis of transmit antenna selection in MIMO multirelay networks,” IEEE Trans. Veh. Technol., vol. 62, no. 2, pp. 933–939, Feb. 2013.10.1109/TVT.2012.2227862Search in Google Scholar
[32] N.Yang, P.Yeoh, M.Elkashlan, R.Schober, and J.Yuan, “MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining,” IEEE Commun. Lett., vol. 17, no. 9, pp. 1754–1757, 2013.Search in Google Scholar
[33] S.Yan, N.Yang, R.Malaney, and J.Yuan, “Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels,” IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656–1667, Mar. 2014.Search in Google Scholar
[34] D.Bharadia, E.McMilin, and S.Katti, “Full duplex radios,” in Proc. Sigcom 2013, Hong Kong, China, 2013.10.1145/2486001.2486033Search in Google Scholar
[35] Y. -S.Choi and H.Shirani-Mehr, “Simultaneous transmission and reception: Algorithm, design and system level performance,” IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 5992–6010, 2013.Search in Google Scholar
[36] L.Wei, M.Ghogho, C.Bin, and X.Chunlin, “Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1628–1631, 2012.Search in Google Scholar
[37] G.Zheng, I.Krikidis, J.Li, A. P.Petropulu, and B.Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. Signal Process, vol. 61, no. 20, pp. 4962–4974, 2013.Search in Google Scholar
[38] M.Bloch, J.Barros, M. R. D.Rodrigues, and S. W.McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, June 2008.Search in Google Scholar
[39] I. S.Gradshteyn and I. M.Ryzhik, Table of Integrals, Series, and Products, 7th ed. Orlando, FL: Academic, 2007.Search in Google Scholar
©2015 by De Gruyter
Articles in the same Issue
- Frontmatter
- A Triple-Band Monopole Planar Antenna for WLAN and WiMAX Applications
- Novel Compact Asymmetric Coplanar Strip (ACPS)-Fed Zeroth-Order Resonant Antennas with Bandwidth Enhancement
- A Wide Stop-Band Miniaturized Branch-Line Hybrid Coupler
- Using Microstrip LPF in Gysel Power Divider for Extreme Size Reduction and Higher Order Harmonic Suppression
- A Novel Compact UWB Bandpass Filter with Quad-Notched Bands Based on S-SCRLHs Resonator
- Space-Time-Coded Adaptive Spatial Modulation in Wireless MIMO Communication Systems
- A Unified Approach to Performance Analysis of Multihop Relay Fading Channels Using Generalized Gamma Model
- Bit Stream Recognition and Analysis in Cognitive Radio
- Improving Physical Layer Security via TAS and Full-Duplex Artificial-Noise-Added Receiver
- Design of OFDM Signal with Good Autocorrelation for Ground Penetrating Radar
- A New Microwave Asphalt Radar Rover for Thin Surface Civil Engineering Applications
Articles in the same Issue
- Frontmatter
- A Triple-Band Monopole Planar Antenna for WLAN and WiMAX Applications
- Novel Compact Asymmetric Coplanar Strip (ACPS)-Fed Zeroth-Order Resonant Antennas with Bandwidth Enhancement
- A Wide Stop-Band Miniaturized Branch-Line Hybrid Coupler
- Using Microstrip LPF in Gysel Power Divider for Extreme Size Reduction and Higher Order Harmonic Suppression
- A Novel Compact UWB Bandpass Filter with Quad-Notched Bands Based on S-SCRLHs Resonator
- Space-Time-Coded Adaptive Spatial Modulation in Wireless MIMO Communication Systems
- A Unified Approach to Performance Analysis of Multihop Relay Fading Channels Using Generalized Gamma Model
- Bit Stream Recognition and Analysis in Cognitive Radio
- Improving Physical Layer Security via TAS and Full-Duplex Artificial-Noise-Added Receiver
- Design of OFDM Signal with Good Autocorrelation for Ground Penetrating Radar
- A New Microwave Asphalt Radar Rover for Thin Surface Civil Engineering Applications