Improving the Secrecy Rate via Combining the Artificial Noise with the Masked Beamforming Scheme

Author(s):  
Fangbiao Li ◽  
Zhi Xue ◽  
Yongkai Zhou ◽  
Liang Pang
Author(s):  
Jianhua He ◽  
Guangheng Zhao ◽  
Lu Wang ◽  
Xue Sun ◽  
Lei Yang

AbstractIn this paper, we investigate the secrecy performance of short-packet transmissions in ultra-reliable and low-latency communications (URLLC). We consider the scenario where a multi-antenna source communicates with a single-antenna legitimate receiver requiring ultra-high reliability and low latency, in the presence of a single-antenna eavesdropper. In order to safeguard URLLC, the source transmits the artificial noise (AN) signal together with the confidential signal to confuse the eavesdropper. We adopt a lower bound on the maximal secrecy rate as the secrecy performance metric for short-packet transmissions in URLLC, which takes the target decoding error probabilities at the legitimate receiver and the eavesdropper into account. Using this metric, we first derive a compact expression of the generalized secrecy outage probability (SOP). Then, we formally prove that the generalized SOP is a convex function with respect to the power allocation factor between the confidential signal and the AN signal. We further determine the optimal power allocation factor that minimizes the generalized SOP. The results presented in this work can be useful for designing new secure transmission schemes for URLLC.


Author(s):  
Tong Shen ◽  
Tingting Liu ◽  
Yan Lin ◽  
Yongpeng Wu ◽  
Feng Shu ◽  
...  

Abstract In this paper, two regional robust secure precise wireless transmission (SPWT) schemes for multi-user unmanned aerial vehicle (UAV), (1)regional signal-to-leakage-and-noise ratio (SLNR) and artificial-noise-to-leakage-and-noise ratio (ANLNR) (R-SLNR-ANLNR) maximization and (2) point SLNR and ANLNR (P-SLNR-ANLNR) maximization, are proposed to tackle with the estimation errors of the target users’ location. In the SPWT system, the estimation error for SPWT cannot be ignored. However, the conventional robust methods in secure wireless communications optimize the beamforming vector in the desired positions only in statistical means and cannot guarantee the security for each symbol. The proposed regional robust schemes are designed for optimizing the secrecy performance in the whole error region around the estimated location. Specifically, with the known maximal estimation error, we define the target region and wiretap region. Then, we design an optimal beamforming vector and an artificial noise projection matrix, which achieve the confidential signal in the target area having the maximal power while only few signal power is conserved in the potential wiretap region. Instead of considering the statistical distributions of the estimated errors into optimization, we optimize the SLNR and ANLNR of the whole target area, which significantly decreases the complexity. Moreover, the proposed schemes can ensure that the desired users are located in the optimized region, which are more practical than the conventional methods. Simulation results show that our proposed regional robust SPWT design is capable of substantially improving the secrecy rate compared to the conventional non-robust method. The P-SLNR-ANLNR maximization-based method has the comparable secrecy performance with lower complexity than that of the R-SLNR-ANLNR maximization-based method.


Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 5
Author(s):  
Pengfei Hou ◽  
Jianping Gong ◽  
Jumin Zhao

In this paper, we proposed a scheme that Injects artificial noise from the tag end (IANT) to enhance the physical layer security of the ambient backscatter communication (ABC) system. The difference between the ABC system and the traditional radio frequency identification system is whether it uses the radio frequency (RF) signals in the environment to supply energy and modulation information for passive tags. In the IANT scheme, we select the best tag to communicate with the reader according to the channel quality between tags and reader, and at the same time select another tag to generate artificial noise that affects the receiving effect of the eavesdropper. This paper uses the method of generating noise copies in the reader to reduce the interference of artificial noise on the signal received by the reader. The simulation results show that with the increase in channel quality between tags and reader and the increase in the number of tags, the proposed IANT scheme is significantly superior to the contrast scheme in terms of system achievable secrecy rate, effectively enhancing the physical layer security of the ABC system.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 651-659
Author(s):  
Ge Shi ◽  
Yong Li ◽  
Wei Cheng ◽  
Xiang Gao ◽  
Wenjie Zhang

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Quanzhong Li ◽  
Sai Zhao

By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary transmitter under the quality-of-service at the primary user and the transmit power constraint at the secondary transmitter. We consider the practical case that the channel state information (CSI) of the eavesdropper is imperfect, and we model the imperfect CSI by the worst-case model. We show that the robust secrecy rate maximization problem can be transformed to a series of semidefinite programmings based on S-procedure and rank-one relaxation. We also propose an effective method to recover the optimal rank-one solution. Simulations are provided to show the effectiveness of our proposed robust secure algorithm with comparison to the nonrobust secure design and traditional orthogonal multiple access schemes.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5396
Author(s):  
Wei Zhang ◽  
Bin Li ◽  
Mingnan Le ◽  
Jun Wang ◽  
Jinye Peng

Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive array (PSA) to produce the modulation with different polarization states (PSs) at different directions is investigated. A PSA, as a vector sensor, can be employed for more effective DM for an additional degree of freedom (DOF) provided in the polarization domain. The polarization information can be exploited to transmit different data streams simultaneously at the same directions, same frequency, but with different PSs in the desired directions to increase the channel capacity, and with random PSs off the desired directions to enhance PLS. The proposed method has the capability of concurrently projecting independent signals into different specified spatial directions while simultaneously distorting signal constellation in all other directions. The symbol error rate (SER), secrecy rate, and the robustness of the proposed DM scheme are analyzed. Design examples for single- and multi-beam DM systems are also presented. Simulations corroborate that (1) the proposed method is more effective for PLS; (2) the proposed DM scheme is more power-efficient than the traditional artificial noise aided DM schemes; and (3) the channel capacity is significantly improved compared with conventional scalar antenna arrays.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 587 ◽  
Author(s):  
Akashkumar Rajaram ◽  
Rui Dinis ◽  
Dushnatha Nalin K. Jayakody ◽  
Marko Beko

This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.


Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 515 ◽  
Author(s):  
Jingon Joung ◽  
Jihoon Choi ◽  
Bang Chul Jung ◽  
Sungwook Yu

In this paper, we consider a 2 × 2 space-time line coded (STLC) system having two-transmit and two-receive antennas. To improve the secrecy rate of the STLC system, in which an illegitimate receiver eavesdrops the information delivered from the STLC transmitter to the STLC receiver, we propose an artificial noise (AN) injection method. By exploiting the STLC structure, a novel AN for the STLC is designed and its optimal power loading factor is derived. Numerical results verify that the proposed secure STLC systems with the designed AN injection and the power control method can significantly improve the secrecy rate compared to the conventional STLC systems. It is observed that the proposed method is more effective if there is a significant gap between the main-channel and the eavesdropper-channel gains.


Sign in / Sign up

Export Citation Format

Share Document