Abstract
To enhance the information security in multiple input multiple output (MIMO) wireless communication systems, nonlinear transmission is studied in this paper by pushing the power amplifier (PA) at the transmitter to operate in the nonlinear region, even near to the saturate point. Linearization reception technique is then adopted at the legal user’s receiver to remove the distortion caused by the nonlinear PA, so that the distortion-free signal can be drawn, and correct demodulation and decoding could be achieved. While for the eavesdroppers, the information required to complete the nonlinear reception could hardly be obtained, since the critical training sequence is designed to be invisible to the eavesdropping users, so the security transmission between the legitimate users can be obtained. Then, the security capacity by nonlinear transmission is analyzed in the MIMO–OFDM systems, where the signal to distortion plus noise ratio is derived, and the upper approximation is also presented. Numerical simulations are carried out to verify the effectiveness of the proposed scheme with practical reception algorithm, and it is shown that obvious security capacity can be acquired with both memory and memoryless PAs.












Similar content being viewed by others
Data Availability
Data generated and/or analyzed during the current study are available from the corresponding author on reasonable request.
Code Availability
Data generated and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Xu, D., & Zhu, H. (2023). Proactive eavesdropping of physical layer security aided suspicious communications in fading channels. IEEE Transactions on Information Forensics and Security, 18, 1111–1126.
Halak, B., Yilmaz, Y., & Shiu, D. (2022). Comparative analysis of energy costs of asymmetric verses symmetric encryption-based security applications. IEEE Access, 10, 76707–76719.
Anant, A., & Prasad, R. (2022). Public private data partnerships enabling privacy technologies. In 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (pp. 86–91) Herning, Denmark.
Yerrapragada, A. K., Eisman, T., & Kelley, B. (2021). Physical layer security for beyond 5G: Ultra secure low latency communications. IEEE Open Journal of the Communications Society, 2, 2232–2242.
Jiang, X., Li, P., Zou, Y., Li, B., & Wang, R. (2022). Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors. IEEE Transactions Communications, 70(9), 6164–6180.
Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.
Wyner, A. D. (1975). The wire-tap channel. Bell System Techical Journal, 54(8), 1355–1387.
Muratkar, T. S., Bhurane, A., Sharma, P. K., & Kothari, A. (2022). Physical layer security analysis in ambient backscatter communication with node mobility and imperfect channel estimation. IEEE Communications Letter, 26(1), 27–30.
Dai, B., Li, C., Liang, Y., Ma, Z., & Shamai, S. (2022). Self-secure capacity-achieving feedback schemes of Gaussian multiple-access wiretap channels with degraded message sets. IEEE Transactions on Information Forensics and Security, 17, 1583–1596.
Wang, D., Bai, B., Zhao, W., & Han, Z. (2019). A survey of optimization approaches for wireless physical layer security. IEEE Communications Surveys & Tutorials, 21(2), 1878–1911.
Wang, Z., Guo, J., Chen, Z., Yu, L., Wang, Y., & Rao, H. (2022). Robust secure UAV relay-assisted cognitive communications with resource allocation and cooperative jamming. Journal of Communications and Networks, 24(2), 139–153.
Ahn, S., Park, S. I., Kang, J., & Jeong, S. (2021). Pilot and data power allocation in Poisson interference field with protected zone for physical-layer security. IEEE Wireless Communications Letters, 10(2), 271–275.
Jee, J., Kwon, G., & Park, H. (2021). Joint precoding and power allocation for multiuser MIMO system with nonlinear power amplifiers. IEEE Transactions on Vehicular Technology, 70(9), 8883–8897.
Nidhi, Khan, B., Mihovska, A., Prasad, R., & Velez, F.J. (2022). A study on cross-carrier scheduler for carrier aggregation in beyond 5G networks. In 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC) (pp. 1–4). Gran Canaria. Spain.
Zhang, W., Chen, J., Kuo, Y., & Zhou, Y. (2019). Transmit beamforming for layered physical layer security. IEEE Transactions on Vehicular Technology, 68(10), 9747–9760.
Khandaker, M. R. A., Masouros, C., & Wong, K. (2018). Constructive interference based secure precoding: A new dimension in physical layer security. IEEE Transactions on Information Forensics and Security, 13(9), 2256–2268.
Ajayi, I., Medjahdi, Y., Kaddour, F., & Mroueh, L. (2021). Impact of imperfect channel state information on physical layer security by precoding and diversity. In International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). (pp. 322–327).
Tang, J., Jiao, L., Zeng, K., Wen, H., & Qin, K. Y. (2020). Physical layer secure MIMO communications against eavesdroppers with arbitrary number of antennas. IEEE Transactions on Information Forensics and Security, 16, 466–481.
Lee, D. (2021). Secrecy analysis of relay-user selection in AS-AF systems over Nakagami fading channels. IEEE Transactions on Vehicular Technology, 70(3), 2378–2388.
Ouyang, C., Wu, S., Jiang, C., Cheng, J., Xiao, A., & Yang, H. (2020). Security enhancement via antenna selection in MIMOME channels with discrete inputs. IEEE Transactions on Communications, 68(8), 5041–5055.
Nguyen, H. C., de Carvalho, E., & Prasad, R. (2014). Multi-user interference cancellation schemes for carrier frequency offset compensation in uplink OFDMA. IEEE Transactions on Wireless Communications, 13(3), 1164–1171.
Gregorio, F., Werner, S., Laakso, T. I., & Cousseau, J. (2007). Receiver cancellation technique for nonlinear power amplifier distortion in SDMA–OFDM systems. IEEE Transactions on Vehicular Technology, 56(5), 2499–2516.
Aggarwal, P., Pradhan, A., & Bohara, V. A. (2021). A downlink multiuser MIMO–OFDM system with nonideal oscillators and amplifiers: Characterization and performance analysis. IEEE Systems Journal, 15(1), 715–726.
Hua, L., Wang, Y., Lian, Z., Su, Y., & Xie, Z. (2022). Low-complexity PAPR-aware precoding for massive MIMO–OFDM downlink systems. IEEE Wireless Communications Letters, 11(7), 1339–1343.
Zhang, S. Y., & Shahrrava, B. (2020). A hybrid PAPR reduction scheme for OFDM systems using perfect sequences. IEEE Transactions on Broadcasting, 66(1), 177–186.
Moghaddam, M. H., Aghdam, S. R., Mazzali, N., & Eriksson, T. (2022). Statistical modeling and analysis of power amplifier nonlinearities in communication systems. IEEE Transactions on Communications, 70(2), 822–835.
Li, B., Zou, Y., Zhu, J., & Cao, W. (2021). Impact of hardware impairment and co-channel interference on security-reliability trade-off for wireless sensor networks. IEEE Transactions on Wireless Communications, 20(11), 7011–7025.
Mashdour, S., Moradikia, M., & Yeoh, P. L. (2020). Secure mm-wave communications with imperfect hardware and uncertain eavesdropper location. Transactions on Emerging Telecommunications Technologies, 31(10), e4016.
Sheikholeslami, A., Goeckel, D., & Pishro-Nik, H. (2013). Everlasting secrecy by exploiting non-idealities of the eavesdropper’s receiver. IEEE Journal on Selected Areas in Communications, 31(9), 1828–1839.
Güvenkaya, E., Hamamreh, J. M., & Arslan, H. (2017). On physical-layer concepts and metrics in secure signal transmission. Physical Communication, 25, 14–25.
Zhu, J., Ng, D. W. K., Wang, N., Schober, R., & Bhargava, V. K. (2017). Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Transactions on Wireless Communications, 16(3), 2001–2016.
Liu, Y., Zhang, L., Xia, X., Quan, X., Shao, S., & Tang, Y. (2020). Digital predistortion for MIMO transmitters using multi-channel error feedback adaptation. IEEE Access, 8, 209345–209355.
Ren, J. (2020). Digital predistortion architecture with feedback channel nonlinear blind identification and compensation. IEEE Microwave and Wireless Components Letters, 30(11), 1112–1115.
Wang, S., Cao, W., Hou, R., & Eriksson, T. (2022). A digital predistortion for concurrent dual-band power amplifier linearization based on periodically nonuniform sampling theory. IEEE Transactions on Microwave Theory and Techniques, 70(1), 466–475.
Salman, M. B., & Guvensen, G. M. (2021). An efficient QAM detector via nonlinear post-distortion based on FDE bank under PA impairments. IEEE Transactions on Communications, 69(10), 7108–7120.
Aggarwal, P., & Bohara, V. A. (2019). End-to-end theoretical evaluation of a nonlinear MIMO–OFDM system in the presence of digital predistorter. IEEE Systems Journal, 13(3), 2309–2319.
Xu, J., Jiang, W., Ma, L., Li, M., Yu, Z., & Geng, Z. (2019). Augmented time-delay twin support vector regression-based behavioral modeling for digital predistortion of RF power amplifier. IEEE Access, 7, 59832–59843.
Chen, D., Zhao, Y., Zhou, Y., Ji, Q., Chen, Z., & Tian, F. Modified generalized memory polynomial model of RF power amplifiers. In IEEE 4th International Conference on Electronic Information and Communication Technology (ICEICT). (pp. 317–319).
Li, Y., Wang, X., & Zhu, A. (2022). Reducing power consumption of digital predistortion for RF power amplifiers using real-time model switching. IEEE Transactions on Microwave Theory and Techniques, 70(3), 1500–1508.
Papoulis, A. (1991). Probability, Random Variables and Stochastic Processes, 3nded (p. 307). McGraw-Hill.
Khina, A., Kochman, Y., & Khisti, A. (2018). The MIMO wiretap channel decomposed. IEEE Transactions on Information Theory, 64(2), 1046–1063.
Rawat D.B. (2016) Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. In IEEE Conference on Communications and Network Security (CNS). (pp. 465–471).
Jiang, W., Chen, B., Zhao, J., Xiong, Z., & Ding, Z. (2021). Joint active and passive beamforming design for the IRS-assisted MIMOME–OFDM secure communications. IEEE Transactions on Vehicular Technology, 70(10), 10369–10381.
Golub, G., & Loan, C. F. V. (2013). Matrix Computations (4th ed.). Baltimore: The Johns Hopkins University Press.
Alina, Z., & Amrani, O. (2016). On digital post-distortion techniques. IEEE Transactions on Signal Processing, 64(3), 603–614.
He, H., Lyu, S., & Feng, B. (2023). Secure transmission over multiple access wiretap channel by cross-time interference injection. IEEE Transactions on Communications, 71(1), 370–380.
Dong, Y., Xu, Y., Zhang, T., & Xia, Y. (2024). Optimality of the proper gaussian signal in complex MIMO wiretap channels. IEEE Transactions on Information Forensics and Security, 19, 1401–1414.
Sanandaji, N., & Falahati, A. (2020). A hidden OSTBC scheme to enhance physical layer security by employing a pseudorandom precoder. IEEE Transactions on Communications, 68(1), 363–375.
Hua, Y., & Maksud, A. (2023). Continuous encryption functions for security over networks. Signal Processing, 203, 108807. https://doi.org/10.1016/j.sigpro.2022.108807
Acknowledgements
The work was supported in part by the Natural Science Foundation of Shannxi Province under Grant 2019JM-532, and in part by the Major Scientific and Technological Innovation Project of Shandong Province of China (2020CXGC010705, 2021ZLGX05, 2022ZLGX04).
Funding
Natural Science Foundation of Shannxi Province, 2019JM-532, jieling wang,Major Scientific and Technological Innovation Project of Shandong Province, 2020CXGC010705, jieling wang, 2021ZLGX05, jieling wang, 2022ZLGX04, jieling wang
Author information
Authors and Affiliations
Contributions
Menghan Li: Conceptualization, Methodology, Software, Data curation, Writing—original draft. Jieling Wang: Validation, Formal analysis, Writing—original draft, review and editing, Supervision, Project administration. Ba-Zhong Shen: Conceptualization, Formal analysis. Yejun Zhou: Methodology, Formal analysis.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, M., Wang, J., Shen, BZ. et al. Security Capacity by Nonlinear Transmission in MIMO Systems for Physical Layer Security. Wireless Pers Commun 137, 593–613 (2024). https://doi.org/10.1007/s11277-024-11437-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-11437-0