当前位置: X-MOL 学术IEEE Trans. Inform. Forensics Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions
IEEE Transactions on Information Forensics and Security ( IF 6.8 ) Pub Date : 2020-07-30 , DOI: 10.1109/tifs.2020.3013210
Ye Fan , Ang Li , Xuewen Liao , Victor C. M. Leung

In this paper, we focus on the physical layer security for a $K$ -user multiple-input-single-output (MISO) wiretap channel in the presence of a malicious eavesdropper, where we propose several interference exploitation (IE) precoding schemes for different types of the eavesdropper. Specifically, in the case where a common eavesdropper decodes the signal directly and Eve’s full channel state information (CSI) is available at the transmitter, we show that the required transmit power can be further reduced by re-designing the ‘destructive region’ of the constellations for symbol-level precoding and re-formulating the power minimization problem. We further study the SINR balancing problems with the derived ‘complete destructive region’ with full, statistical and no Eve’s CSI, respectively, and show that the SINR balancing problem becomes non-convex with statistical or no Eve’s CSI. On the other hand, in the presence of a smart eavesdropper using maximal likelihood (ML) detection, the security cannot be guaranteed with all the existing approaches. To this end, we further propose a random jamming scheme (RJS) and a random precoding scheme (RPS), respectively. To solve the introduced convex/non-convex problems in an efficient manner, we propose an iterative algorithm for the convex ones based on the Karush-Kuhn-Tucker (KKT) conditions, and deal with the non-convex ones by resorting to Taylor expansions. Simulation results show that all proposed schemes outperform the existing works in secrecy performance, and that the proposed algorithm improves the computation efficiency significantly.

中文翻译:

MISO窃听通道中的安全干扰利用预编码:高效解决方案的破坏性区域重新定义

在本文中,我们将重点放在针对 $ K $ 用户的多输入单输出(MISO)窃听通道存在恶意窃听者的情况,我们针对不同类型的窃听者提出了几种干扰利用(IE)预编码方案。具体来说,在一个普通的窃听者直接对信号进行解码并且在发射器处有夏娃的全信道状态信息(CSI)的情况下,我们表明通过重新设计发射器的“破坏性区域”可以进一步降低所需的发射功率。星座图,用于符号级预编码并重新构造功率最小化问题。我们进一步研究了分别具有完整,统计和无Eve CSI的派生“完全破坏性区域”的SINR平衡问题,并表明SINR平衡问题变得无统计或无Eve CSI的凸。另一方面,在存在使用最大似然(ML)检测的智能窃听程序的情况下,无法使用所有现有方法来保证安全性。为此,我们进一步分别提出了随机干扰方案(RJS)和随机预编码方案(RPS)。为了有效解决引入的凸/非凸问题,我们提出了一种基于Karush-Kuhn-Tucker(KKT)条件的凸算法的迭代算法,并通过泰勒展开来处理非凸问题。仿真结果表明,所提出的所有方案在保密性能上都优于现有的方案,并且该算法大大提高了计算效率。我们还分别提出了随机干扰方案(RJS)和随机预编码方案(RPS)。为了有效解决引入的凸/非凸问题,我们提出了一种基于Karush-Kuhn-Tucker(KKT)条件的凸算法的迭代算法,并通过泰勒展开来处理非凸问题。仿真结果表明,所提出的所有方案在保密性能上都优于现有的方案,并且该算法大大提高了计算效率。我们还分别提出了随机干扰方案(RJS)和随机预编码方案(RPS)。为了有效解决引入的凸/非凸问题,我们提出了一种基于Karush-Kuhn-Tucker(KKT)条件的凸算法的迭代算法,并通过泰勒展开来处理非凸问题。仿真结果表明,所提出的所有方案在保密性能上都优于现有的方案,并且该算法大大提高了计算效率。并通过泰勒展开来处理非凸的 仿真结果表明,所提出的所有方案在保密性能上都优于现有的方案,并且该算法大大提高了计算效率。并通过泰勒展开来处理非凸的 仿真结果表明,所提出的所有方案在保密性能上都优于现有的方案,并且该算法大大提高了计算效率。
更新日期:2020-08-14
down
wechat
bug