Efficient Receive Beamformers for Secure Spatial Modulation against a Malicious Full-duplex Attacker with Eavesdropping Ability

06/02/2020 ∙ by Xinyi Jiang, et al. ∙ Nanjing University 0

In this paper, we consider a new secure spatial modulation scenario with a full-duplex (FD) malicious attacker Mallory owning eavesdropping capacity, where Mallory works on FD model and transmits a malicious jamming such as artificial noise (AN) to interfere with Bob. To suppress the malicious jamming on Bob from Mallory, a conventional maximum receive power (Max-RP) at Bob is presented firstly. Subsequently, to exploit the colored property of noise plus interference at Bob, a whitening-filter-based Max-RP (Max-WFRP) is proposed with an obvious performance enhancement over Max-RP. To completely remove the malicious jamming from Mallory, a Max-RP with a constraint of forcing the malicious jamming from Mallory to zero at Bob is proposed. To further improve secrecy rate (SR) by removing the ZF contraint (ZFC), the maximum signal-to-jamming-plus-noise ratio (Max-SJNR) is proposed. Our proposed methods have closed-form expressions. From simulation results, the four receive beamforming methods have an increasing order in performance: Max-RP, Max-RP with ZFC and Max-SJNR≈Max-WFRP. Additionally, the latter two harvest a substantial performance gains over Max-RP and Max-RP with ZFC in the low and medium signal-to-noise ratio regions.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

page 5

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

In multiple-input multiple-output (MIMO) systems, spatial modulation (SM) [7] is a promising technology which exploits both the index of activated antenna and amplitude phase modulation (APM) symbol to transmit messages. Recently, SM has exhibited its benefits of increasing energy efficiency [3] and avoiding the inner-channel interference (ICI). However, due to the broadcasting characteristic of wireless transmission, confidential information might be eavesdropped by illegal receivers. This is a problem of physical layer security [1, 4, 2, 16, 10]. In [16], the author enhance the legitimate security by joint precoding optimization with and without eavesdroppong channel state information (CSI) . In [11, 15], security is enhanced by emitting the artificial noise (AN) onto the null-space of the desired channel to interfere unknown eavesdropper and the latter derived the closed-form approximated expression ESR with the aid of AN in perfect and imperfect CSI, respectively. In [6], the authors emit the AN by a full-duplex desired receiver, where the confidential information is received and at the same time efficiently interfere the eavesdropper. Moreover, the authors in [8] investigate the power allocation between confidential message and AN so that we can get a fixed power allocation factor to achieve higher SR performance.

As for secure SM, the authors in [9, 14] investigate the transmit antenna selection (TAS) schemes, the former proposed leakage-based and Max-SR schemes achieving a good balance between complexity and SR performance, and the latter selected two antennas each time to improve SR performance. In [13], the author proposed three active antenna-group (AAG) selection methods which performed well in the low, medium and high SNR regions with low complexity, respectively. In [12], the author jointly optimized the problem of maximizing SR over TAS and AN projection with joint and separate solutions. Meanwhile, the author in [5] proposed deterministic and random antenna selection methods with the aid of zero-forcing precoding and fast radio-frequency switches to enhance the security of the PSM system.

However, in the aforementioned literature, the illegal receivers are all passive eavesdroppers, which only receive confidential message (CM) and don’t emit malicious jamming to the desired receiver. In such a situation, Bob cannot measure the CSI from Eve to Bob. It is impractical to know the CSIs from Alice to Eve and Eve to Bob in advance. If Eve becomes Mallory, which means it can send a malicious jamming towards Bob, this dilemma will disappear. Why? Due to the fact that Mallory emits jamming, Bob can estimate the CSI from Mallory to Bob. These estimated CSI can be used to suppress the jamming from Mallory. Similarly, Alice also obtain the CSI from Alice to Mallory, and prevent the interception from Eve with the help of AN. To simplify the derivation process, the perfect CSIs from Mallory and Alice to Bob are available in the following.

Considering the worst scenario, we propose a novel secure SM (FDM-SSM) system with a FD malicious attacker Mallory having eavesdropping ability. In our FDM-SSM system, Mallory can simultaneously send malicious jamming signal and intercept the CMs from Alice. Therefore, how to optimize the receive beamforming (RBF) such that the malicious jamming is reduced efficiently and the performance is improved obviously is a challenging issue. This motivates us to propose several RBF methods, and our main contributions are summarized as follows:

  1. To suppress the malicious interference from Mallory and achieve a high performance, the traditional maximum receive power (Max-RP) at Bob method is first presented via the system. However, consider the noise plus interference at Bob includes three parts: AN from Alice, malicious jamming from Mallory and receiver noise at Bob, which obviously is colored, the conventional Max-RP doesn’t exploit this colored property. Therefore, we propose an improved whitening-filter-based Max-RP (Max-WFRP). First, we compute the covariance matrix of colored noise plus interference at Bob, multiply the original receive vector at Bob from left by the root of the inverse of covariance matrix to whiten the colored jamming plus noise. By simulation, we find the proposed Max-WFRP harvests substantial performance gains over the conventional Max-RP in terms of SR and BER.

  2. To completely eliminate the malicious jamming signal from Mallory, a Max-RP with zero-forcing constraint (ZFC) is proposed to force the malicious jamming from Mallory to zero and meanwhile maximize the receive power of CMs at Bob. However, due to the strict ZFC, the transmit space of CMs is also reduced dramatically. To remove the ZFC, a maximum signal-to-jamming-plus-noise ratio (Max-SJNR) is proposed to strike a good balance between suppressing jamming and improving performance. From simulation results, the proposed Max-SJNR performs much better than the proposed Max-RP with ZFC in terms of SR and BER performance.

The rest of this paper is organized as follows. Section II presents the FDM-SSM system model and gives a definition for its average SR. In Section III, the RBF schemes for Max-SR are proposed and their closed-form expression is given. In Section IV, numerical simulation results are presented. Finally, we draw our conclusions in Section V.

Notations: Boldface lower case and upper case letters denote vectors and matrices, respectively. denotes conjugate and transpose operation. represents expectation operation. denotes 2-norm.

Ii System Model


Fig. 1: Block diagram for secure FDM-SSM network.

As shown in Fig. 1, the FDM-SSM system considered consists of a legal transmitter (Alice) with transmit antennas (TAs),a receiver (Bob) with receive antennas (RAs), and a FD malicious (Mallory) with antennas. Here, Mallory works on FD model. In other words, he intercepts the CMs from Alice and transmits a malicious jamming towards Bob.

In general, it is noted that is not a power of 2. For a SM system, the number of active antennas are chosen from , where is equal to . And Alice activates one of TAs to emit -ary APM symbol and uses the index of activated antenna to convey spatial bits. As a result, bits per channel use can be transmitted. The transmit signal with the aid of AN from Alice and the jamming signal sent from Mallory can be expressed as

(1)

and

(2)

respectively, where is the power allocation factor and denotes the total transmit power of Alice. Accordingly, is the th column of , indicating that the th antenna is chosen to transmit symbol , which is equiprobably drawn from discrete -ary APM constellation for with . Moreover, matrix is the AN projection matrix and is the AN vector. In (2), is the transmit power of Mallory and is the transmit beamforming matrix with of jamming vector .

Let , , and denote the channel gain matrices from Alice to Bob, from Alice to Mallory, from Mallory to Bob, and Mallory’s self-interference, respectively. Then the receive signal at Bob and Mallory after receive beamforming can be respectively expressed as

(3)

and

(4)

where and are the receive beamforming vectors at Bob and Mallory. In addition, and denote the complex additive white Gaussian noise (AWGN) vectors at Bob and Mallory, respectively. Meanwhile, is the transmit antennas selection matrix constituted by the specially selected columns of , which is determined by the leakage-based method in [9]. In (4), is the self-interference observed at Mallory. Consider Mallory design the matrix by null-space projection method, i.e., is the null-space of the RBF with . As a result, Mallory can eliminate the self-interference. The average SR is given as

(5)

where

(6)

and

(7)

where . , , , and . Herein, , , , and are the possible transmit vectors. Besides, , and . and are the covariance matrices of interference plus noise of Bob and Mallory respectively, where

(8)

and

(9)

According to [11], it is known that premultiplying by will not change the mutual information, which results in and .

Iii Proposed Three Receive Beamforming Schemes at Bob

For the newly proposed FDM-SSM system, the design of receive beamforming at Bob is very important to improve the system performance. In this section, the conventional Max-RP is presented, and three high-performance RBF schemes are proposed as follows: Max-WFRP, Max-RP with ZFC, and Max-SJNR. Finally, complexity comparison is made among them.

Iii-a Conventional Max-RP

In this subsection, we derive the Max-RP from Max-SJNR rule. According to the definition of SJNR, we first write the SJNR at Bob as follows

SJNR
(10)

As mentioned in Section II, , and is the th column of . To simplify the above optimization, w

is approximated as a white noise, i.e.,

, (III-A) can be rewritten as

SJNR (11)

Hence, the optimization problem of Max-SJNR reduces to

(12)

which actually is a Max-RP. The Lagrangian function associated with the above optimization is defined as

(13)

whose first-order derivative with respect to is set to be zero as follows

(14)

which means the fact that

is the eigenvector corresponding to the largest eigen-value of the matrix

.

Iii-B Proposed Max-WFRP

In fact, the malicious jamming signal plus interference plus noise w is colored not white. Therefore, the conventional Max-RP method in Subsection A may not perform optimally in terms of SNR. In what follows, we propose the Max-WFRP method, which first whitens the colored noise plus interference at Bob using their covariance matrix, and then apply Max-RP method to maximize the average SNR.

As , and are the independent and identically distributed i.e.,i.i.d, random vectors, w has a mean vector of all-zeros and covariance matrix

(15)

Observing (III-B), it is evident that the covariance matrix

is a positive definite matrix, its eigenvalue decomposition (EVD) is in the form

, where is an unitary matrix, and is a diagonal matrix with being the th eigenvalue of matrix . Let us define the WF matrix satisfying , which yields

(16)

where . Applying the WF matrix in (16) on yields a new system model,

(17)

where has covariance matrix . Similar to (12), we have the form of Max-WFRP

(18)

Hence, can be set to be the eigenvector to the largest eigen-value of the matrix .

Iii-C Proposed Max-RP with ZFC

In order to completely eliminate the malicious jamming from Mallory, in that follows, we propose the ZF method of maximizing the receive power of confidential messages at Bob by projecting the malicious jamming signal onto the null-space of channel matrix from Alice to Bob. The corresponding Max-RP with ZFC optimization problem is formalized as

(19)

To simplify the above optimization, let us define a new matrix

, and its singular value decomposition (SVD) is

(20)

where spans the null-space of the column space of matrix . Now, to remove the first constraint, let us introduce a new beamforming vector as follows , which satisfies . Substituting the above equation in forms the following unstrained optimization

(21)

Using the generalized Rayleigh-Ritz theorem, the new beamforming vector is directly equal to the eigenvector corresponding to the largest eigen-value of the matrix

(22)

i.e., . Accordingly, the optimal value of is given by

(23)

Iii-D Proposed Max-SJNR

The ZF constraint in (19

) is extremely strict and reduces the degrees of freedom of transmit space of CMs. Below, after this constraint is removed, a Max-SJNR is proposed to maximize the average SJNR,

(24)

which can make a good balance between reducing the malicious jamming and improving the performance, where SJNR is defined as

(25)

Using the generalized Rayleigh-Ritz theorem, the beamforming vector of maximizing the SJNR can be directly obtained from the eigenvector corresponding to the largest eigen-value of the matrix

(26)

Actually, the Max-SJNR is equivalent to the Max-WFRP proposed by us, which will be verified in the next section.

Iii-E Computational Complexity Analysis

Now, the approximate computational complexities of the four RBF methods are analyzed. First, the complexity of the traditional Max-RP method is about floating-point operations (FLOPs). For the proposed Max-WFRP, its computational complexity is approximated as . Accordingly, the complexity of Max-RP with ZFC method is . Besides, the computational complexity of the proposed Max-SJNR is approximated as, which is slightly higher than proposed Max-WFRP method. Generally, their complexities have an increasing order as follows: Max-RP, Max-RP with ZFC, Max-WFRP, Max-SJNR.

Iv Simulation and Discussion

In this section, numerical simulations are presented to make a performance comparison among three proposed methods and conventional Max-RP from three different aspects: average SR, cumulative density function (CDF) of SR and the BER. Simulation parameters are set as follows: , , W, , and modulation scheme being QPSK.

Fig. 2: Curves of average SR versus SNR for different of Mallory.

Fig. 2 plots the curves of SR versus SNR for two different interference power: W and W. From Fig. 2, it is seen that the proposed Max-WFRP and Max-SJNR methods perform much better than Max-RP with ZFC and Max-RP. The conventional Max-RP is the worst one among all beamformers in terms of SR due to the fact that it omits the colored property of noise plus interference at Bob. Conversely, Max-WFRP achieves the best one among four methods. Additionally, the SR performance of the proposed Max-RP with ZFC method approaches those of Max-SJNR, Max-WFRP, and conventional Max-RP in the high SNR region. In summary, they have an increasing order in SR performance: Max-RP, Max-RP with ZFC, and Max-WFRP Max-SJNR.

Fig. 3: Average BER curves of Bob for four RBF methods with W.

Fig. 4: CDF curves of SR for SNR=-5dB, 5dB and W.

Fig. 3 illustrates the curves of average BER versus SNR for the above four methods. From Fig. 3, it is seen that the proposed Max-SJNR and the proposed Max-WFRP still obviously exceed the remaining two methods Max-RP with ZFC and conventional Max-RP in terms of BER performance. Similarly, Max-SJNR is still overlapped with Max-WFRP and the performance difference between them is trivial. In particular, as SNR increases, the BER performance gains achieved by Max-WFRP and Max-SJNR over Max-RP with ZFC and conventional Max-RP become more significant. Similar to Fig. 2, there is the same increasing order in BER performance: Max-RP, Max-RP with ZFC, and Max-WFRP Max-SJNR. Fig. 4 shows the CDF curves of SR for the four methods with two different value of SNRs: -5dB and 5dB. From Fig. 4 , we find the same performance tendency as shown in Fig. 3.

V Conclusion

In this paper, we have made an investigation of RBF methods in the newly proposed SSM system with a malicious full-duplex attacker having an eavedropping ability. First, the conventional Max-RP method was derived to design RBF, after that, three high-performance RBF design methods, Max-WFRP, Max-RP with ZF constraint, and Max-SJNR have been proposed to improve the SR performance of the system. From simulation results, the proposed Max-WFRP achieves the same performance as Max-SJNR. They are much better than conventional Max-RP and Max-RP with ZFC in terms of SR and BER performance and have the same order computational complexity as Max-RP and Max-RP with ZFC. Interestingly, the proposed Max-WFRP has a slightly lower complexity compared to the proposed Max-SJNR.

References

  • [1] S. R. Aghdam and T. M. Duman (2016) Physical layer security for space shift keying transmission with precoding. IEEE Wireless Commun. Lett. 5 (2), pp. 180–183. Cited by: §I.
  • [2] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. Chen (2017) A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutor. 19 (2), pp. 1027–1053. Cited by: §I.
  • [3] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo (2014) Spatial modulation for generalized MIMO: challenges, opportunities, and implementation. Proc. IEEE 102 (1), pp. 56–103. Cited by: §I.
  • [4] S. Gong, C. Xing, S. Chen, and Z. Fei (2017) Secure communications for dual-polarized MIMO systems. IEEE Trans. on Signal Process. 65 (16), pp. 4177–4192. Cited by: §I.
  • [5] Y. Huang, M. Wen, B. Zheng, X. Cheng, L. Yang, and F. Ji (2019) Secure precoding aided spatial modulation via transmit antenna selection. IEEE Trans. Veh. Technol. 68 (9), pp. 8893–8905. Cited by: §I.
  • [6] C. Liu, L. Yang, and W. Wang (2017) Secure spatial modulation with a full-duplex receiver. IEEE Wireless Commun. Lett. 6 (6), pp. 838–841. Cited by: §I.
  • [7] R. Y. Mesleh, H. Haas, S. Sinanovic, C. W. Ahn, and S. Yun (2008) Spatial modulation. IEEE Trans. Veh. Technol. 57 (4), pp. 2228–2241. Cited by: §I.
  • [8] F. Shu, X. Liu, G. Xia, T. Xu, J. Li, and J. Wang (2019) High-performance power allocation strategies for secure spatial modulation. IEEE Trans. Veh. Technol. 68 (5), pp. 5164–5168. Cited by: §I.
  • [9] F. Shu, Z. Wang, R. Chen, Y. Wu, and J. Wang (2018) Two high-performance schemes of transmit antenna selection for secure spatial modulation. IEEE Trans. Veh. Technol. 67 (9), pp. 8969–8973. Cited by: §I, §II.
  • [10] H. Wang, K. Huang, Q. Yang, and Z. Han (2017) Joint source-relay secure precoding for MIMO relay networks with direct links. IEEE Trans. Commun. 65 (7), pp. 2781–2793. Cited by: §I.
  • [11] L. Wang, S. Bashar, Y. Wei, and R. Li (2015) Secrecy enhancement analysis against unknown eavesdropping in spatial modulation. IEEE Commun. Lett. 19 (8), pp. 1351–1354. Cited by: §I, §II.
  • [12] G. Xia, Y. Lin, T. Liu, F. Shu, and L. Hanzo (2020) Transmit antenna selection and beamformer design for secure spatial modulation with rough CSI of eve. IEEE Trans. Wireless Commun. (), pp. 1–1. Cited by: §I.
  • [13] G. Xia, F. Shu, Y. Zhang, J. Wang, S. ten Brink, and J. Speidel (2019) Antenna selection method of maximizing secrecy rate for green secure spatial modulation. IEEE Trans. Green Commun. and Netw. 3 (2), pp. 288–301. Cited by: §I.
  • [14] S. Yan, N. Yang, R. Malaney, and J. Yuan (2014) Transmit antenna selection with alamouti coding and power allocation in MIMO wiretap channels. IEEE Trans. Wireless Commun. 13 (3), pp. 1656–1667. Cited by: §I.
  • [15] X. Yu, Y. Hu, Q. Pan, X. Dang, N. Li, and M. H. Shan (2018) Secrecy performance analysis of artificial-noise-aided spatial modulation in the presence of imperfect CSI. IEEE Access 6 (), pp. 41060–41067. Cited by: §I.
  • [16] N. Zhao, D. Li, M. Liu, Y. Cao, Y. Chen, Z. Ding, and X. Wang (2019) Secure transmission via joint precoding optimization for downlink MISO NOMA. IEEE Trans. Veh. Technol. 68 (8), pp. 7603–7615. Cited by: §I.