Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01-12-2009 | Research Article

A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications

Authors: Yanbing Zhang, Huaiyu Dai

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2009

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recent research reveals that information security and information-hiding capabilities can be enhanced by proper exploitation of space-time techniques. Meanwhile, intrinsic properties of ultra-wideband (UWB) signals make it an outstanding candidate for secure applications. In this paper, we propose a space-time coding scheme for impulse radio UWB systems. A novel real orthogonal group code is designed for multi-antenna UWB signals to exploit the full spatial diversity gain and achieve the perfect communication secrecy. Its performance in a frequency-selective fading channel is analyzed. The transmission secrecy, including low probability of detection (LPD), low probability of intercept (LPI), and anti-jamming performance, is investigated, and some fundamental tradeoffs between these secrecy metrics are also addressed. A comparison of the proposed scheme with the direct sequence spread spectrum (DSSS) technique is carried out, which demonstrates that proper combination of UWB and space-time coding can provide substantial enhancement to wireless secure communications over other concurrent systems.

1. Introduction

The rapid expansion and proliferation of the wireless applications, especially in military and commercial use, have been prompting a corresponding increasing demand for transmission security. Currently, chief among the methods of information security is cryptography. Working at the network or higher layers mostly, cryptography aims to deny the unintended attempt on the information content by making various transformations of the original message. Protection against unintended disclosure of the information, however, can also be enhanced at the physical layer. Three features are generally desired for transmission secrecy—low probability of detection (LPD), low probability of intercept (LPI), and anti-jamming protection [1]. LPD, LPI, and anti-jamming properties may be viewed as the counterparts of the three important objectives in cryptography: secrecy, integrity, and availability.
It is well known that code division multiple access (CDMA) systems can provide an inherent physical layer security solution to wireless communications. However, if an eavesdropper can intercept a 2 https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq1_HTML.gif -bit sequence segment generated from an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq2_HTML.gif -stage linear feedback shift register, the characteristic polynomial and the entire spreading code can be reconstructed through certain algorithms [2]. This motivates researchers to study enhancing the physical layer built-in security of CDMA systems through secure scrambling [2] or random spreading codes [3]. In 1990s, chaos, a very universal phenomenon in many nonlinear systems, has also been found valuable in secure communication systems due to its extreme sensitivity to initial conditions and parameters [4]. As a hybrid approach, it was shown that CDMA systems employing time-varying pseudo-chaotic spreading sequences can provide improvements with respect to their conventional CDMA counterparts (employing binary-valued pseudo-noise spreading sequences) [5]. Techniques have also been proposed to use the characteristics of the radio channel itself to provide secure key distribution in a mobile radio environment, where the information bearing signal is modified to precompensate for the phase effects of the channel [6].
A recent breakthrough in wireless communications, multiple-input multiple-output (MIMO) technique, vastly expands the capacity and range of communications. An information-theoretic framework for investigating communication security in wireless MIMO links is proposed in [7]. One of the principal conclusions there is that proper exploitation of space-time diversity at the transmitter can enhance information security and information-hiding capabilities. Particularly, if a source with constant spatial inner products (see Section 3.1) is transmitted over an uninformed link, the cutoff rate of the channel will be equal to zero and the minimum probability of decoding error will be forced to one. There are many known signal constellations satisfying this perfect-secrecy property, like double unitary codes, square unitary codes, or space-time QPSK.
Reference [8] is an exemplary work of this principle, where the authors proposed a secure transmission scheme based on random space-time coding. The basic idea is multiplying a random coefficient to the symbol sequence to make the eavesdropper completely blind with the transmitted signal. However, this random space-time transmission scheme has some drawbacks as well. One is that since the weight should be randomly selected, it has to trade transmission power for secrecy. The other is that before the data transmission, a secure initialization method has to be adopted to set up the feedback channel.
Research interests in ultra-wideband (UWB) wireless communications have also proliferated in both industry and academia recently [9]. Besides many other advantages, UWB also offers salient features, like ultrashort pulse and noise-like power density, for secure communications [10, 11]. Intent to jointly exploit the advantages of MIMO and UWB has also been initiated. In particular, UWB-MIMO systems which employ space-time block coding have been proposed in [1214]. More recently, cooperative schemes have also been considered for such systems [15]. These works show performance improvement over the conventional single-input single-output (SISO) UWB systems for commonly adopted modulation and multiple-access techniques, in both single-user and multiuser scenarios. But to the best of our knowledge, there is no formal discussion on security issues when multiple antennas are introduced to UWB systems.
This motivates us to investigate a unitary space-time coding scheme for UWB systems, coined as USTC-UWB, which can simultaneously exploit the information security and information-hiding capabilities of space-time coding and UWB. Compared with general approaches in [7], USTC-UWB employs real space-time codes suitable for UWB signals and can work at any transmission rate. Based on the performance analysis in a multipath fading channel, we demonstrate that USTC-UWB can achieve superior LPD, LPI, and anti-jamming performances, making it an outstanding candidate for wireless secure communications. In the analysis, some fundamental trade-offs between the secrecy metrics are also explicitly addressed. A comparison of USTC-UWB with the direct sequence spread spectrum (DSSS) technique is also carried out, which further demonstrates its advantages.
The rest of the paper is organized as follows. Section 2 describes the system model and assumptions. The proposed USTC-UWB scheme is presented in Section 3, together with its BER performance analysis. Security metrics for USTC-UWB, including LPD, LPI, and anti-jamming properties, are analyzed in Section 4. The trade-off between anti-jamming and LPD performance is also addressed. In Section 5 the simulation results are presented. And finally, some concluding remarks are given in Section 6.

2. System Model

Consider a peer-to-peer UWB communication system equipped with M transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq3_HTML.gif receive antennas. The transmitted waveform at the i th transmit antenna during https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq4_HTML.gif time frames can be described as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq5_HTML.gif represents the pulse repetition time (frame) interval corresponding to one symbol transmission. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq6_HTML.gif is the transmitted monocycle with the pulse duration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq7_HTML.gif , which is modulated by the (real) space-time code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq8_HTML.gif . Typically, the duration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq9_HTML.gif is between 0.2–2 nanoseconds, resulting in a transmitted signal of ultra-wideband, while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq10_HTML.gif is hundred or thousand times longer than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq11_HTML.gif [9, 13]. The factor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq12_HTML.gif ensures that the total transmitted power is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq13_HTML.gif . For simplicity, the random time-hopping (TH) codes for multiple access are omitted ([13]).
A class of unitary space-time signals is proposed in [16] for flat-fading channels where neither the transmitter nor the receiver necessarily knows the fading coefficients. Suppose that signals are transmitted in blocks of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq14_HTML.gif time samples, over which interval the fading coefficients are approximately constant. Then, this space-time coding design admits a constellation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq15_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq16_HTML.gif is the data rate in bits per channel use) signals https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq17_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq18_HTML.gif , with the property that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq19_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq20_HTML.gif complex-valued matrices obeying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq21_HTML.gif (We use superscripts T and H in this paper to respectively denote the transpose and conjugate transpose operations.).
Extending this discussion to UWB systems, and assuming https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq22_HTML.gif (without loss of generality), the transmit signal matrix can be formed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq23_HTML.gif is a unitary matrix to be designed.
Due to its large bandwidth, the channel observed by UWB signals is usually subject to frequency selective fading. So an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq24_HTML.gif -path tapped-delay line model is adopted in the discussion, for which the impulse response from the i th transmit antenna to the j th receive antenna can be described as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ3_HTML.gif
(3)
with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq25_HTML.gif representing the delay and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq26_HTML.gif the complex amplitude of the l th path, respectively. At the receiver, we employ an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq27_HTML.gif -finger Rake receiver to exploit the multipath diversity inherent in UWB systems, each adopting the delayed versions of the received monocycle as the reference waveform. It can be shown that if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq28_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq29_HTML.gif , and the autocorrelation function of the pulse https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq30_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq31_HTML.gif , all L correlators' outputs at the j th receive antenna can be collected into a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq32_HTML.gif (equivalently https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq33_HTML.gif ) matrix
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq34_HTML.gif is the circularly symmetric complex Gaussian background noise with spectral height https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq35_HTML.gif , and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq36_HTML.gif matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq37_HTML.gif collects the multipath gain as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ5_HTML.gif
(5)
The decision rule for the ML decoder with channel state information (CSI) can be stated as ([17, Chapter 7])
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ6_HTML.gif
(6)

3. Unitary Space-Time Coding for UWB Systems

Conveying information with ultrashort pulses, UWB signals can resolve many paths and thus are rich in multipath diversity. This has motivated research toward using Rake receivers to collect the available diversity and thus enhance the performance of UWB communication systems. On the other hand, multi-antenna-based space-time systems offer an effective means of enabling space diversity, which has the potential to improve not only error performance but also capacity. In this section, we consider the construction of space-time codes for UWB systems. A novel unitary space-time code is designed, which can exploit the full spatial diversity and fulfill the purpose of secure communications. In Section 3.1, we first elaborate the design of this space-time code, and then its performance is characterized by a union bound on the block error probability in Section 3.2.

3.1. Construction of Unitary Space-Time Codes for UWB

Rank and determinant criteria are proposed in [18] for space-time code design. That is, in order to achieve the maximum diversity, the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq38_HTML.gif has to be full rank for any different codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq39_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq40_HTML.gif . It is shown in [19] that all optimal (full-rank) space-time group codes are unitary, which coincide with the secure space-time code structure found in [7].
A family of complex-valued space-time codes is devised in [20] by use of rotated constellation and the Hadamard transform, which can achieve full-rate and full diversity. However, since UWB systems employ baseband transmission, it is necessary to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq41_HTML.gif to be real. In the following, we propose a class of real orthogonal group codes for UWB signals based on Hadamard transform and rotation matrices, which also admit more general transmit antenna settings. For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq42_HTML.gif , with m an integer, a Hadamard matrix is generated by a simple recursion
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ7_HTML.gif
(7)
with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq43_HTML.gif . So our group codes can be defined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ8_HTML.gif
(8)
where the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq44_HTML.gif matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq45_HTML.gif is recursively generated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ9_HTML.gif
(9)
with the initial rotation matrix given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ10_HTML.gif
(10)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq46_HTML.gif , this group code falls into the category of real orthogonal design and admits the perfect-secrecy property (constant spatial inner product) as well (Following the definition in [7], we call https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq47_HTML.gif the spatial inner product of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq48_HTML.gif in this paper.). Also note that the squared https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq49_HTML.gif norm for every column and row of the matrices so generated (corresponding to the total transmit power in space and time, resp.) is equal to 1. This design works well for any transmission rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq50_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq51_HTML.gif transmit antennas. For odd values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq52_HTML.gif a similar design can be applied for a few special cases with some performance loss. For example, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq53_HTML.gif , a code based on 3-dimensional rotation matrix can be employed:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ11_HTML.gif
(11)
with the group codes given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ12_HTML.gif
(12)
The code design for general odd https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq54_HTML.gif constitutes our future work. In the following, we give some performance analysis of this code for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq55_HTML.gif cases.

3.2. Performance of USTC-UWB System

Suppose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq56_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq57_HTML.gif are two different transmitted ST codewords, then the pairwise error probability (PEP) conditioned on the channel matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq58_HTML.gif , is given by [20]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ13_HTML.gif
(13)
which is tightly upper bounded as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ14_HTML.gif
(14)
The square distance between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq59_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq60_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq61_HTML.gif is the l th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq62_HTML.gif (cf., (5)).
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq63_HTML.gif is real and symmetric, the eigenvalue decomposition leads to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ16_HTML.gif
(16)
where the columns https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq64_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq65_HTML.gif are the orthogonal eigenvectors of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq66_HTML.gif , and the diagonal matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq67_HTML.gif contains its eigenvalues https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq68_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq69_HTML.gif . Using (16), the expression (14) can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ17_HTML.gif
(17)
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq70_HTML.gif , the average pair-wise error probability can be calculated by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ18_HTML.gif
(18)
where in the last line, we use the fact that the moment generation function for an exponential ranodm variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq71_HTML.gif with mean https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq72_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq73_HTML.gif . Therefore, at the high signal-to-noise ratio (SNR) region, this probability is upper-bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ19_HTML.gif
(19)
where r is the rank of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq74_HTML.gif .
For the group code we design above, it can be shown that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq75_HTML.gif has full rank, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq76_HTML.gif (thus full diversity is achieved). Following the similar approach in [19] we can get that all the eigenvalues are identical, given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ20_HTML.gif
(20)
Without loss of generality, we can assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq77_HTML.gif is transmitted, therefore the block probability of error could be bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ21_HTML.gif
(21)

4. Security Performance Analysis

There are a variety of metrics used to describe the security properties in a wireless communications system from different aspects. The most important of them is LPD, LPI, and anti-jamming capability. LPD is concerned with preventing adversaries from detecting a radio transmission. Low probability of being detected also means low probability of being jammed by hostile transmitters, which is especially preferable for military communications. Even after being detected, a good secure communication system is still expected to have a strong ability to prevent being intercepted and jammed; therefore these properties should be considered equally important. In this section, we analyze the LPD, LPI, and anti-jamming performance of the proposed USTC-UWB scheme.

4.1. Low Probability of Detection (LPD)

When the channel is unknown, a common detecting approach for the eavesdropper is to use radiometer [10, 11], which measures the energy in a bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq78_HTML.gif over a time interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq79_HTML.gif . The received signal is fed to a bandpass filter with bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq80_HTML.gif , followed by the squaring device and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq81_HTML.gif -second integrator. The output of the integrator is sent to a comparator with a fixed threshold level. If the integrator output is higher than the threshold, the presence of a signal is declared.
Performance of the radiometer in practical systems has been well studied in [10, 11]. In this subsection, we investigate the asymptotic behavior of a radiometer by considering the exponent of the detection error probability. When the product of the observation interval and the bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq82_HTML.gif , the output statistics of the radiometer can be modeled as Gaussian [11]. Assuming that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq83_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq84_HTML.gif are two hypotheses that correspond to the absence and presence of the signal, respectively, then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ22_HTML.gif
(22)
where the mean and the variance are given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq85_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq86_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq87_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq88_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq89_HTML.gif denotes the SNR.
To study the asymptotic behavior, we keep the observation interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq90_HTML.gif fixed, and assume that the number of the observations https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq91_HTML.gif goes to infinity as in [7]. The Chernoff error exponent is defined as the exponentially decreasing rate of the detection error probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq92_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ23_HTML.gif
(23)
As a negative value, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq93_HTML.gif is required to be as large as possible (close to 0) for LPD. By the large deviation technique [7]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ24_HTML.gif
(24)
In general, it is very difficult to get an explicit expression for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq94_HTML.gif from (24). But in secure communication scenarios, we can assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq95_HTML.gif (which generally holds for UWB signals). This assumption implies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq96_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq97_HTML.gif is obtained for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq98_HTML.gif in (24) as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ25_HTML.gif
(25)
This nice and simple relationship coincides with the intuition that a system with larger time-bandwidth product owns better secure properties.
In a secure communications system, the intended communicators (transmitter/receiver) should avoid signal detection/interception, which implies that the minimum transmit power should be used at the transmitter end and the highest sensitive receiver employed at the receiver end. But the communications should also prevent signal jamming, in this regard the transmitter should use the maximum transmit power and employ the least sensitive receiver (see Section 4.3). Therefore, certain trade-off exists between these objectives. Equation (25) also explicitly illuminates the trade-off between anti-jamming and LPD performance: while the performance of the desired user in the presence of jamming will certainly benefit from a larger transmit power, such an SNR increase inevitably leads to a higher probability of being detected by the eavesdropper.

4.2. Low Probability of Intercept (LPI)

As we discussed in Section 3.1, the group code we design has constant spatial inner product. When the channel is unknown to the receiver, the maximum-likelihood (ML) decoding is given by [16]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ26_HTML.gif
(26)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq99_HTML.gif denotes the trace of matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq100_HTML.gif . When the channel is known to the receiver, the ML decision rule is given by (6). So if we can keep the desired user informed, but the eavesdropper uninformed, the later will be absolutely blind to the transmitted information (see (26)). Thus a perfect secrecy can be achieved.
To reach this objective, we can use a reverse-channel estimation method motivated by [6]. That is, let the desired receiver transmit pilot signals periodically, by which the transmitter can estimate the channel state information. Once the transmitter gets the CSI, it can precode the transmit signal to compensate for the effect of the forward channel and make the composite channel effectively constant. Thus, the desired user can be regarded as equivalently informed, while the eavesdropper is still kept uninformed, assuming the independence of the channels between the transmitter and the desired user, and the eavesdropper. This approach is valid when channel reciprocity holds. Otherwise, some secured feedback can be adopted for this purpose [8].
Denote the received signals for the desired user and the eavesdropper by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq101_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq102_HTML.gif , respectively, given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq103_HTML.gif transmitted. Since the conditional probability density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq104_HTML.gif depends on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq105_HTML.gif only through the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq106_HTML.gif , with the constant spatial inner product property of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq107_HTML.gif (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq108_HTML.gif is independent with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq109_HTML.gif ), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ27_HTML.gif
(27)
So the mutual information is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ28_HTML.gif
(28)
That is, the received signal of the eavesdropper https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq110_HTML.gif does not contain any information of the transmitted signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq111_HTML.gif .
The secrecy capacity defined in [21] is then given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ29_HTML.gif
(29)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq112_HTML.gif is the precoding weight matrix and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq113_HTML.gif represents the channel between the transmitter and the desired receiver, which is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq114_HTML.gif block diagonal matrix with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq115_HTML.gif (see (5)) as the block diagonal elements. It is easy to see that the secrecy capacity is maximized by choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq116_HTML.gif under the constraints of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq117_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq118_HTML.gif .

4.3. Anti-Jamming Performance

Consider a passband jamming signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq119_HTML.gif with central frequency https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq120_HTML.gif , modeled as a continuous-time wide-sense stationary zero-mean random process with bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq121_HTML.gif and the power spectral density
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ30_HTML.gif
(30)
It follows that the autocorrelation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq122_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ31_HTML.gif
(31)
Then the received signal at receive antenna j can be modeled as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ32_HTML.gif
(32)
with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq123_HTML.gif denoting the transmit signal from i th transmit antenna at k th time interval as defined in (2).
The jamming signal appears at the output of a single correlator as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ33_HTML.gif
(33)
with a power of
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ34_HTML.gif
(34)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq124_HTML.gif is the frequency response of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq125_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq126_HTML.gif is the bandwidth of UWB pulse. Note that in the last line, we use the fact that the pulse has unit energy. We also assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq127_HTML.gif remains constant in the range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq128_HTML.gif and approximately takes the average value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq129_HTML.gif . Consider all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq130_HTML.gif correlators, the block error rate is bounded by (cf., (21))
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ35_HTML.gif
(35)
Direct-sequence spread spectrum signals are also widely used as a secure communications technique. With much larger bandwidth, UWB is expected to outperform DSSS for transmission secrecy [22]. An immediate conclusion from (25) is that UWB has a better asymptotic LPD performance than DSSS due to larger bandwidth and lower SNR, given the same observation interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq131_HTML.gif . This conforms to earlier observations in [10, 11]. In the following, we further examine the anti-jamming performance.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq132_HTML.gif denote the pseudo-random code sequence of the DSSS scheme (independent and identically distributed Bernoulli), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq133_HTML.gif the chip waveform, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq134_HTML.gif the bit interval, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq135_HTML.gif the chip interval, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq136_HTML.gif the spreading ratio [22]. Then the jamming signal at the output of the DSSS receiver is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ36_HTML.gif
(36)
For fair comparison with UWB, we assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq137_HTML.gif also takes the same form as the UWB pulse and has the energy of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq138_HTML.gif . Then, following a similar procedure as in the UWB case, it is not difficult to get the power of the jamming signal in DSSS systems as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ37_HTML.gif
(37)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq139_HTML.gif is the frequency response of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq140_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq141_HTML.gif is the bandwidth of the DSSS signal.
Comparing (34) and (37), it is observed that the output jamming power for DSSS is larger than that for UWB as long as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq142_HTML.gif , which means that UWB provides a better anti-jamming protection than DSSS.

5. Numerical Results

In this section, some numerical examples are provided to better illustrate our main results in the previous sections. We employ UWB signals with frame interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq143_HTML.gif  nanoseconds and pulse duration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq144_HTML.gif  nanoseconds The second derivative of a Gaussian pulse is adopted as the transmit pulse
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_Equ38_HTML.gif
(38)
with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq145_HTML.gif chosen such that the pulse has unit energy.
First, the simulation BER and upper bound (21) for our proposed USTC-UWB scheme is presented in Figure 1. We can see that employing multiple antennas for UWB signals dramatically improves the BER performance and analytical bounds match the exact BER at the high SNR region, which testifies the validity of our analysis.
Figure 2 gives a schematic demonstration of the tradeoff between LPD and anti-jamming performance, where the relationship between the asymptotic detection error probability and the BER is visualized. Note that although an increase of SNR corresponds a lower BER, it also inevitably leads to a higher probability of being detected. However, a MIMO system can significantly reduce this probability compared with multiple-input single-output (MISO) or SISO systems.
Figure 3. compares the performance of unitary space-time coding for UWB and DSSS signals. The simulation parameters are set as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq146_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq147_HTML.gif as in [23]. We can see that UWB and DSSS systems possess the same diversity gain at high SNR. But UWB steadily outperforms DSSS due to better interference suppression (anti-jamming) capability.
Finally, the coverage range extension advantage of employing multiple antennas in UWB transmission is examined in Figure 4. A path link model in [24] is used in the simulation. We can see that compared to conventional SISO, MISO and MIMO schemes significantly increase the transmission distance of UWB system. For instance, at the target BER of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F571903/MediaObjects/13638_2008_Article_1701_IEq148_HTML.gif , SISO is able to cover a range of 1 m, while with 2 transmit antennas MISO can cover about 5 m. By using 2 antennas also at receiver end, the range can be extended to almost 12 m. It is also observed that since the path loss increases dramatically with the distance, the BER of all three schemes becomes very large after a certain distance. Note that this comparison assumes that the same power is used at transmit side; that is, for a certain transmission distance, multiple antennas result in a lower transmit power, thus reducing the probability of detection.

6. Conclusions

Motivated by some recent research progress on applying MIMO technique in UWB and secure communications, we propose a new unitary space-time coding scheme for impulse radio UWB systems. Its error rate and various transmission secrecy metrics are analyzed. The tradeoff between low probability of detection and anti-jamming is revealed, which indicates that any of these security features could not be solely enhanced without sacrificing another. Our work demonstrates that introducing properly designed space-time codes into UWB systems not only improves the performance of conventional single-antenna schemes but also offers prominent benefits on physical-layer transmission covertness, making it a strong candidate for wireless secure communications, especially for short-distance applications.

Acknowledgment

This work was supported in part by the US National Science Foundation under Grant CCF-0515164, CNS-0721815 and CCF-0830462. Part of the results in this work appeared in [23].
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Tsay M-K, Liao C-H, Shyn C-S, Yang T-Y: Simultaneous AJ and LPD evaluations for secure communication. Proceedings of IEEE Military Communications Conference (MILCOM '07), October 2007, Orlando, Fla, USA Tsay M-K, Liao C-H, Shyn C-S, Yang T-Y: Simultaneous AJ and LPD evaluations for secure communication. Proceedings of IEEE Military Communications Conference (MILCOM '07), October 2007, Orlando, Fla, USA
2.
go back to reference Ling Q, Li T, Ren J: Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, March 2004, Pricenton, NJ, USA Ling Q, Li T, Ren J: Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. Proceedings of the 38th Asilomar Conference on Signals, Systems and Computers, March 2004, Pricenton, NJ, USA
3.
go back to reference Nguyen L: Self-encoded spread spectrum communications. Proceedings of IEEE Military Communications Conference (MILCOM '99), October 1999, Atlantic City, NJ, USA 1: 182-186.CrossRef Nguyen L: Self-encoded spread spectrum communications. Proceedings of IEEE Military Communications Conference (MILCOM '99), October 1999, Atlantic City, NJ, USA 1: 182-186.CrossRef
4.
go back to reference Yang T, Chua LO: Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I 1996, 43(9):817-819. 10.1109/81.536758CrossRef Yang T, Chua LO: Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I 1996, 43(9):817-819. 10.1109/81.536758CrossRef
5.
go back to reference Hwang Y, Papadopoulos HC: Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design. IEEE Transactions on Signal Processing 2004, 52(9):2637-2649. 10.1109/TSP.2004.832029CrossRef Hwang Y, Papadopoulos HC: Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design. IEEE Transactions on Signal Processing 2004, 52(9):2637-2649. 10.1109/TSP.2004.832029CrossRef
6.
go back to reference Koorapaty H, Hassan AA, Chennakeshu S: Secure information transmission for mobile radio. IEEE Communications Letters 2000, 4(2):52-55. 10.1109/4234.824754CrossRef Koorapaty H, Hassan AA, Chennakeshu S: Secure information transmission for mobile radio. IEEE Communications Letters 2000, 4(2):52-55. 10.1109/4234.824754CrossRef
7.
go back to reference Hero AO III: Secure space-time communication. IEEE Transactions on Information Theory 2003, 49(12):3235-3249. 10.1109/TIT.2003.820010MathSciNetCrossRefMATH Hero AO III: Secure space-time communication. IEEE Transactions on Information Theory 2003, 49(12):3235-3249. 10.1109/TIT.2003.820010MathSciNetCrossRefMATH
8.
go back to reference Li X, Chen M, Ratazzi EP: A randomized space-time transmission scheme for secret-key agreement. Proceedings of the 39th Annual Conference on Information Sciences and Systems (CISS '05), March 2005, Baltimore, Md, USA Li X, Chen M, Ratazzi EP: A randomized space-time transmission scheme for secret-key agreement. Proceedings of the 39th Annual Conference on Information Sciences and Systems (CISS '05), March 2005, Baltimore, Md, USA
9.
go back to reference Yang L, Giannakis GB: Ultra-wideband communications: an idea whose time has come. IEEE Signal Processing Magazine 2004, 21(6):26-54. 10.1109/MSP.2004.1359140CrossRef Yang L, Giannakis GB: Ultra-wideband communications: an idea whose time has come. IEEE Signal Processing Magazine 2004, 21(6):26-54. 10.1109/MSP.2004.1359140CrossRef
10.
go back to reference Bharadwaj A, Townsend JK: Evaluation of the covertness of time-hopping impulse radio using a multi-radiometer detection system. Proceedings of IEEE Military Communications Conference (MILCOM '01), November 2001, Washington, DC, USA 1: 128-134. Bharadwaj A, Townsend JK: Evaluation of the covertness of time-hopping impulse radio using a multi-radiometer detection system. Proceedings of IEEE Military Communications Conference (MILCOM '01), November 2001, Washington, DC, USA 1: 128-134.
11.
go back to reference McKinstry DR, Buehrer RM: Issues in the performance and covertness of UWB communications systems. Proceedings of IEEE Midwest Symposium on Circuits and Systems, August 2002, Tulsa, Okla, USA 3: 601-604. McKinstry DR, Buehrer RM: Issues in the performance and covertness of UWB communications systems. Proceedings of IEEE Midwest Symposium on Circuits and Systems, August 2002, Tulsa, Okla, USA 3: 601-604.
12.
go back to reference Yang L, Giannakis GB: Analog space-time coding for multi-antenna ultra-wideband transmissions. IEEE Transactions on Communications 2004, 52(3):507-517. 10.1109/TCOMM.2004.823644CrossRef Yang L, Giannakis GB: Analog space-time coding for multi-antenna ultra-wideband transmissions. IEEE Transactions on Communications 2004, 52(3):507-517. 10.1109/TCOMM.2004.823644CrossRef
13.
go back to reference Siriwongpairat WP, Olfat M, Liu KJR: Performance analysis and comparison of time-hopping and direct-sequence UWB-MIMO systems. EURASIP Journal on Applied Signal Processing 2005, 2005(3):328-345. 10.1155/ASP.2005.328CrossRefMATH Siriwongpairat WP, Olfat M, Liu KJR: Performance analysis and comparison of time-hopping and direct-sequence UWB-MIMO systems. EURASIP Journal on Applied Signal Processing 2005, 2005(3):328-345. 10.1155/ASP.2005.328CrossRefMATH
14.
go back to reference Tyago A, Bose R: M-PAM space-time trellis codes for ultra-wideband multi-input multi-output communications. IET Communications 2008, 2(4):514-522. 10.1049/iet-com:20060405MathSciNetCrossRefMATH Tyago A, Bose R: M-PAM space-time trellis codes for ultra-wideband multi-input multi-output communications. IET Communications 2008, 2(4):514-522. 10.1049/iet-com:20060405MathSciNetCrossRefMATH
15.
go back to reference Abou-Rjeily C, Daniele N, Belfiore J-C: On the amplify-and-forward cooperative diversity with time-hopping ultra-wideband communications. IEEE Transactions on Communications 2008, 56(4):630-641.CrossRef Abou-Rjeily C, Daniele N, Belfiore J-C: On the amplify-and-forward cooperative diversity with time-hopping ultra-wideband communications. IEEE Transactions on Communications 2008, 56(4):630-641.CrossRef
16.
go back to reference Hochwald BM, Marzetta TL: Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading. IEEE Transactions on Information Theory 2000, 46(2):543-564. 10.1109/18.825818MathSciNetCrossRefMATH Hochwald BM, Marzetta TL: Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading. IEEE Transactions on Information Theory 2000, 46(2):543-564. 10.1109/18.825818MathSciNetCrossRefMATH
17.
go back to reference Paulraj AJ, Nabar R, Gore D: Introduction to Space-Time Wireless Communications. Cambridge University Press, Cambridge, UK; 2003. Paulraj AJ, Nabar R, Gore D: Introduction to Space-Time Wireless Communications. Cambridge University Press, Cambridge, UK; 2003.
18.
go back to reference Tarokh V, Seshadri N, Calderbank AR: Space-time codes for high data rate wireless communication: performance criterion and code construction. IEEE Transactions on Information Theory 1998, 44(2):744-765. 10.1109/18.661517MathSciNetCrossRefMATH Tarokh V, Seshadri N, Calderbank AR: Space-time codes for high data rate wireless communication: performance criterion and code construction. IEEE Transactions on Information Theory 1998, 44(2):744-765. 10.1109/18.661517MathSciNetCrossRefMATH
20.
go back to reference Damen MO, Abed-Meraim K, Belfiore J-C: Diagonal algebraic space-time block codes. IEEE Transactions on Information Theory 2002, 48(3):628-636. 10.1109/18.985979MathSciNetCrossRefMATH Damen MO, Abed-Meraim K, Belfiore J-C: Diagonal algebraic space-time block codes. IEEE Transactions on Information Theory 2002, 48(3):628-636. 10.1109/18.985979MathSciNetCrossRefMATH
21.
go back to reference Csiszar I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH Csiszar I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH
22.
go back to reference Sadler BM, Swami A: On the performance of episodic UWB and direct-sequence communication systems. IEEE Transactions on Wireless Communications 2004, 3(6):2246-2255. 10.1109/TWC.2004.837433CrossRef Sadler BM, Swami A: On the performance of episodic UWB and direct-sequence communication systems. IEEE Transactions on Wireless Communications 2004, 3(6):2246-2255. 10.1109/TWC.2004.837433CrossRef
23.
go back to reference Zhang Y, Dai H: A unitary space-time coding scheme for UWB systems and its application in wireless secure communications. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '06), May 2006, Toulouse, France 4: 485-488. Zhang Y, Dai H: A unitary space-time coding scheme for UWB systems and its application in wireless secure communications. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '06), May 2006, Toulouse, France 4: 485-488.
24.
go back to reference Siwiak K, Petroff A: A path link model for ultra wide band pulse transmissions. Proceedings of the 53rd IEEE Vehicular Technology Conference (VTC '01), May 2001, Rhodes, Greece 2: 1173-1175.CrossRef Siwiak K, Petroff A: A path link model for ultra wide band pulse transmissions. Proceedings of the 53rd IEEE Vehicular Technology Conference (VTC '01), May 2001, Rhodes, Greece 2: 1173-1175.CrossRef
Metadata
Title
A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications
Authors
Yanbing Zhang
Huaiyu Dai
Publication date
01-12-2009
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2009/571903

Other articles of this Issue 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Go to the issue

Premium Partner