skip to main content
10.1145/1815396.1815665acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

An approach to secure wireless communications using randomized eigenvector-based jamming signals

Published:28 June 2010Publication History

ABSTRACT

In this paper, we propose a novel approach for providing secure wireless communications in transmit-receive diversity systems. In this approach, we precode the information-bearing signal with a uniquely generated randomized eigenvector-based jamming signal to impair the eavesdropper's received signal, while the main channel, the link between the transmitter and the desired receiver, remains unaffected. Unlike existing methods, our approach can be applied to any antenna array configuration, even when the receiver and eavesdropper utilize more antennas than the transmitter, with no benefits to the eavesdropper's information detection capability from employing more antenna elements. Moreover, our proposed approach can provide more degrees of freedom for the jamming signal, significantly increasing the provided level of security. Additionally, our scheme does not assume any knowledge about the eavesdropper or even the number of collaborating eavesdroppers. Our simulation results show a secrecy capacity increase of about 7 bits/s/Hz for a 4 x 4 antenna configuration under typical transmit power constraints, which results in significant improvement in security performance and enables physically secure wireless communications.

References

  1. P. Almers, E. Bonek, A. Burr, and et al. Survey of channel and radio propagation models for wireless MIMO systems. EURASIP Journal on Wireless Communications and Networking, 2007, Article ID 19070, 19 pages, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. S. Bernstein. Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear System Theory. Princeton University Press, Princeton, New Jersey, 2005.Google ScholarGoogle Scholar
  3. P. A. Dighe and R. K. M. S. S. Jamuar. Analysis of transmit-receive diversity in Rayleigh fading. IEEE Transactions on Communications, 51(8):694--703, Apr. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Dong, Z. Han, A. Petropulu, and H. V. Poor. Cooperative jamming for wireless physical layer security. In Proc. of 2009 IEEE Workshop on Statistical Signal Processing (SSP 2009), Cardiff, Wales, UK, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Comm., 7(6):2180--2189, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. K. Gopala, L. Lai, and H. E. Gamal. On the secrecy capacity of fading channels. IEEE Trans. Inform. Theory, 54(10):4687--4698, Sept. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Jin, M. R. McKay, K.-K. Wong, and X. Gao. Transmit beamforming in Rayleigh product MIMO channels: Capacity and performance analysis. IEEE Transactions on Signal Processing, 56(10):5204--5221, Oct. 2007. Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Kang and M.-S. Alouini. Largest eigenvalue of complex wishart matrices and performance analysis of MIMO MRC systems. IEEE Journal on Selected Areas in Communications, 21(3):418--426, Apr. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Lee, S. Park, and I. Lee. Transmit beamforming method based on maximum-norm combining for MIMO systems. IEEE Transactions on Wireless Communications, 8(4):2067--2075, Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Li, J. Hwu, and E. P. Ratazzi. Using antenna array redundancy and channel diversity for secure wireless transmissions. Journal of Communications, 2(3):224--32, May 2007.Google ScholarGoogle ScholarCross RefCross Ref
  11. Y. Liang, H. V. Poor, and S. Shamai. Secure communication over fading channels. IEEE Trans. Inform. Theory, 54(6):2470--2492, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. K. Y. Lo. Maximum ratio transmission. IEEE Transactions on Communications, 47(10):1458--1461, Oct. 1999.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Negi and S. Goelm. Secret communication using artificial noise. In Proc. of IEEE Vehicular Tech. Conf, volume 3, pages 1906--1910, Dallas TX, Sept. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Shafiee, N. Liu, and S. Ulukus. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Trans. Inform. Theory, 55(9):4033--4039, Sept. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N. Sklavos and X. Zhang. Wireless Security and Cryptography: Specifications and Implementations. CRC Press, Boca Raton, FL, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. L. Swindlehurst. Fixed SINR solutions for the MIMO wiretap channel. In Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pages 2437--2440, Taipei, Taiwan, Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. D. Wyner. The wire-tap channel. Bell System Technical Journal, 54(8):1355--1387, 1975.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An approach to secure wireless communications using randomized eigenvector-based jamming signals

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
        June 2010
        1371 pages
        ISBN:9781450300629
        DOI:10.1145/1815396

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader