Abstract
We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms.
Original language | English (US) |
---|---|
Title of host publication | 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings |
Pages | 2513-2517 |
Number of pages | 5 |
DOIs | |
State | Published - 2010 |
Event | 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Austin, TX, United States Duration: Jun 13 2010 → Jun 18 2010 |
Publication series
Name | IEEE International Symposium on Information Theory - Proceedings |
---|---|
ISSN (Print) | 2157-8103 |
Conference
Conference | 2010 IEEE International Symposium on Information Theory, ISIT 2010 |
---|---|
Country/Territory | United States |
City | Austin, TX |
Period | 06/13/10 → 06/18/10 |
Bibliographical note
KAUST Repository Item: Exported on 2020-10-01Acknowledgements: Omar Bakr’s research is sponsored by a fellowship from King AbdullahUniversity of Science and Technology. The authors would also like toacknowledge the students, faculty and sponsors of the Berkeley WirelessResearch Center, and the National Science Foundation Infrastructure GrantNo. 0403427.
This publication acknowledges KAUST support, but has no KAUST affiliated authors.
ASJC Scopus subject areas
- Theoretical Computer Science
- Information Systems
- Applied Mathematics
- Modeling and Simulation