skip to main content
10.1145/1815396.1815665acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

An approach to secure wireless communications using randomized eigenvector-based jamming signals

Published: 28 June 2010 Publication History

Abstract

In this paper, we propose a novel approach for providing secure wireless communications in transmit-receive diversity systems. In this approach, we precode the information-bearing signal with a uniquely generated randomized eigenvector-based jamming signal to impair the eavesdropper's received signal, while the main channel, the link between the transmitter and the desired receiver, remains unaffected. Unlike existing methods, our approach can be applied to any antenna array configuration, even when the receiver and eavesdropper utilize more antennas than the transmitter, with no benefits to the eavesdropper's information detection capability from employing more antenna elements. Moreover, our proposed approach can provide more degrees of freedom for the jamming signal, significantly increasing the provided level of security. Additionally, our scheme does not assume any knowledge about the eavesdropper or even the number of collaborating eavesdroppers. Our simulation results show a secrecy capacity increase of about 7 bits/s/Hz for a 4 x 4 antenna configuration under typical transmit power constraints, which results in significant improvement in security performance and enables physically secure wireless communications.

References

[1]
P. Almers, E. Bonek, A. Burr, and et al. Survey of channel and radio propagation models for wireless MIMO systems. EURASIP Journal on Wireless Communications and Networking, 2007, Article ID 19070, 19 pages, 2007.
[2]
D. S. Bernstein. Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear System Theory. Princeton University Press, Princeton, New Jersey, 2005.
[3]
P. A. Dighe and R. K. M. S. S. Jamuar. Analysis of transmit-receive diversity in Rayleigh fading. IEEE Transactions on Communications, 51(8):694--703, Apr. 2003.
[4]
L. Dong, Z. Han, A. Petropulu, and H. V. Poor. Cooperative jamming for wireless physical layer security. In Proc. of 2009 IEEE Workshop on Statistical Signal Processing (SSP 2009), Cardiff, Wales, UK, 2009.
[5]
S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Comm., 7(6):2180--2189, June 2008.
[6]
P. K. Gopala, L. Lai, and H. E. Gamal. On the secrecy capacity of fading channels. IEEE Trans. Inform. Theory, 54(10):4687--4698, Sept. 2008.
[7]
S. Jin, M. R. McKay, K.-K. Wong, and X. Gao. Transmit beamforming in Rayleigh product MIMO channels: Capacity and performance analysis. IEEE Transactions on Signal Processing, 56(10):5204--5221, Oct. 2007.
[8]
M. Kang and M.-S. Alouini. Largest eigenvalue of complex wishart matrices and performance analysis of MIMO MRC systems. IEEE Journal on Selected Areas in Communications, 21(3):418--426, Apr. 2003.
[9]
H. Lee, S. Park, and I. Lee. Transmit beamforming method based on maximum-norm combining for MIMO systems. IEEE Transactions on Wireless Communications, 8(4):2067--2075, Apr. 2009.
[10]
X. Li, J. Hwu, and E. P. Ratazzi. Using antenna array redundancy and channel diversity for secure wireless transmissions. Journal of Communications, 2(3):224--32, May 2007.
[11]
Y. Liang, H. V. Poor, and S. Shamai. Secure communication over fading channels. IEEE Trans. Inform. Theory, 54(6):2470--2492, June 2008.
[12]
T. K. Y. Lo. Maximum ratio transmission. IEEE Transactions on Communications, 47(10):1458--1461, Oct. 1999.
[13]
R. Negi and S. Goelm. Secret communication using artificial noise. In Proc. of IEEE Vehicular Tech. Conf, volume 3, pages 1906--1910, Dallas TX, Sept. 2005.
[14]
S. Shafiee, N. Liu, and S. Ulukus. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Trans. Inform. Theory, 55(9):4033--4039, Sept. 2009.
[15]
N. Sklavos and X. Zhang. Wireless Security and Cryptography: Specifications and Implementations. CRC Press, Boca Raton, FL, 2007.
[16]
A. L. Swindlehurst. Fixed SINR solutions for the MIMO wiretap channel. In Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pages 2437--2440, Taipei, Taiwan, Apr. 2009.
[17]
A. D. Wyner. The wire-tap channel. Bell System Technical Journal, 54(8):1355--1387, 1975.

Cited By

View all
  • (2020)Cyber security in New SpaceInternational Journal of Information Security10.1007/s10207-020-00503-wOnline publication date: 12-May-2020
  • (2018)IoT Physical Layer Security Enhancement2018 Global Information Infrastructure and Networking Symposium (GIIS)10.1109/GIIS.2018.8635755(1-4)Online publication date: Oct-2018
  • (2017)A Lower Bound on Secrecy Capacity for MIMO Wiretap Channel Aided by a Cooperative Jammer With Channel Estimation ErrorIEEE Access10.1109/ACCESS.2017.26849015(4636-4645)Online publication date: 2017
  • Show More Cited By

Index Terms

  1. An approach to secure wireless communications using randomized eigenvector-based jamming signals

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
      June 2010
      1371 pages
      ISBN:9781450300629
      DOI:10.1145/1815396
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • Computer and Information Society

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. physical layer security
      2. secrecy capacity

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      IWCMC '10
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)Cyber security in New SpaceInternational Journal of Information Security10.1007/s10207-020-00503-wOnline publication date: 12-May-2020
      • (2018)IoT Physical Layer Security Enhancement2018 Global Information Infrastructure and Networking Symposium (GIIS)10.1109/GIIS.2018.8635755(1-4)Online publication date: Oct-2018
      • (2017)A Lower Bound on Secrecy Capacity for MIMO Wiretap Channel Aided by a Cooperative Jammer With Channel Estimation ErrorIEEE Access10.1109/ACCESS.2017.26849015(4636-4645)Online publication date: 2017
      • (2015)On secrecy rate analysis of MIMO wiretap channel aided by a cooperative jammer with channel estimation error2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2015.7343426(906-910)Online publication date: Aug-2015
      • (2012)Securing wireless communications in transmit-beamforming systems by precoding jamming noise signalsSecurity and Communication Networks10.1002/sec.3895:9(1028-1036)Online publication date: 1-Sep-2012
      • (2011)Impact of Interference on Secrecy Capacity in a Cognitive Radio Network2011 IEEE Global Telecommunications Conference - GLOBECOM 201110.1109/GLOCOM.2011.6133652(1-6)Online publication date: Dec-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media