LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Romero-Zurita, N; Ghogho, M; McLernon, D; Swami, A (2015)
Languages: English
Types: Other
Subjects:

Classified by OpenAIRE into

arxiv: Computer Science::Information Theory, Computer Science::Cryptography and Security
ACM Ref: Data_CODINGANDINFORMATIONTHEORY
We address the physical layer security question of whether a multiple antenna receiver can enhance the secrecy rate of the multiple-input multiple-output wiretap channel by transmitting artificial noise from some of its antennas to jam a multiple antenna eavesdropper. To answer this question we use a QoS-MMSE approach to formulate a global constrained optimisation problem that is efficiently solved after approximating it by a semidefinite program. Results suggest that an improvement in secrecy rate is possible by transmitting artificial noise from an appropriately chosen number of the receiver's antennas. We introduce two antenna configuration selection strategies to reduce system complexity and obtain the best secrecy performance.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Y.-W. Hong, P.-C. Lan, and C.-C. Kuo, “Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • [2] S. Shafiee and S. Ulukus, “Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,” in IEEE International Symposium on Information Theory. ISIT 2007, Jun. 2007, pp. 2466-2470.
    • [3] A. Khisti and G. Wornell, “Secure Transmission With Multiple Antennas II: The MIMOME Wiretap Channel,” IEEE Trans. on Information Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • [4] F. Oggier and B. Hassibi, “The Secrecy Capacity of the MIMO Wiretap Channe,” IEEE Trans. on Information Theory, vol. 57, no. 8, pp. 4961- 4972, Aug. 2011.
    • [5] R. Bustin, R. Liu, H. V. Poor, and S. Shamai, “An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel,” EURASIP Journal in Wireless Comms. Networks., vol. 2009, pp. 3:1-3:8, Mar. 2009.
    • [6] S. Fakoorian and A. Swindlehurst, “Full Rank Solutions for the MIMO Gaussian Wiretap Channel with an Average Power Constraint,” IEEE Trans. on Signal Processing, vol. 61, no. 10, pp. 2620-2631, May 2013.
    • [7] Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, “Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1714-1727, Sep. 2013.
    • [8] S. Goel and R. Negi, “Guaranteeing Secrecy using Artificial Noise,” IEEE Trans. on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • [9] R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M. Bloch, S. Ulukus, and A. Yener, “Cooperative Security at the Physical Layer: A Summary of Recent Advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16-28, Sep. 2013.
    • [10] J. Huang and A. Swindlehurst, “Cooperative Jamming for Secure Communications in MIMO Relay Networks,” IEEE Trans. on Signal Processing, vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • [11] S. Fakoorian and A. Swindlehurst, “Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer,” IEEE Trans. on Signal Processing, vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
    • [12] X. He and A. Yener, “Cooperation with an Untrusted Relay: A Secrecy Perspective,” IEEE Trans. on Information Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • [13] Z. Ding, K. Leung, D. Goeckel, and D. Towsley, “On the Application of Cooperative Transmission to Secrecy Communications,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 359-368, Feb. 2012.
    • [14] W. Li, M. Ghogho, B. Chen, and C. Xiong, “Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis,” IEEE Communications Letters, vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • [15] N. Romero-Zurita, D. McLernon, and M. Ghogho, “PHY Layer Security in Multiple Antenna Systems by Joint Transmitter/Receiver Artificial Noise Generation through Semidefinite Programming,” in IET Intelligent Signal Processing Conference 2013 (ISP 2013), Dec. 2013, pp. 1-6.
    • [16] A. Mukherjee and A. Swindlehurst, “Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI,” IEEE Trans. on Signal Processing, vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • [17] A. Charnes and W. W. Cooper, “Programming with linear fractional functionals,” Naval Research Logistics Quarterly, vol. 9, no. 3-4, pp. 181-186, 1962.
    • [18] J. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones,” Optimization Methods & Software, vol. 11-2, no. 1-4, Sp. Iss. SI, pp. 625-653, 1999.
    • [19] N. Romero-Zurita, D. McLernon, and M. Ghogho, “Physical Layer Security by Robust Masked Beamforming and Protected Zone Optimisation,” IET Communications, vol. 8, no. 8, pp. 1248-1257, May 2014.
    • [20] N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, “PHY Layer Security Based on Protected Zone and Artificial Noise,” IEEE Signal Processing Letters, vol. 20, no. 5, pp. 487-490, May. 2013.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article