Physical layer secure MIMO communications against eavesdroppers with arbitrary number of antennas

J Tang, L Jiao, K Zeng, H Wen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IEEE Transactions on Information Forensics and Security, 2020ieeexplore.ieee.org
Recently, MIMO (multiple-input-multiple-output) physical layer secure transmission has
attracted great attentions. However, current schemes cannot defend against the passive
eavesdroppers with arbitrary number of antennas. To address this problem, in this work, we
propose a practical physical layer MIMO secure communication scheme (PLSC) to defend
against such an eavesdropper with arbitrary number of antennas. In the proposed scheme,
the transmitter first independently generates a random binary sequence as the “key bits …
Recently, MIMO (multiple-input-multiple-output) physical layer secure transmission has attracted great attentions. However, current schemes cannot defend against the passive eavesdroppers with arbitrary number of antennas. To address this problem, in this work, we propose a practical physical layer MIMO secure communication scheme (PLSC) to defend against such an eavesdropper with arbitrary number of antennas. In the proposed scheme, the transmitter first independently generates a random binary sequence as the “key bits (KB)” to “encrypt” (XOR) the confidential information. After that, the transmitter sends the “encrypted information” over the wireless channel, along with mapping key bits to the legitimate receiver simultaneously. The key principle lies in that the KB information is coded in the indexes of the activated/non-activated antennas combination of the legitimate user. Then, the legitimate receiver first observes his/her activated antenna indexes to obtain the corresponding key bits. After that, he/she demodulates the “encrypted information” at the activated antennas, and finally “decrypts” (XOR) the confidential information by using the observed key bits. However, due to the uniqueness and independence of MIMO wireless channel, for any other eavesdroppers who suffer an independent channel from legitimate users, we prove that it cannot observe any information about KB from the received signals, regardless of how many antennas it has used. Consequently, without knowledge of KB, it cannot decrypt any information about the confidential information, too. The reliability and security of PLSC are theoretically demonstrated. The simulation and numerical results fully verified the validity and effectiveness of the proposed scheme.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果