Next Article in Journal / Special Issue
Theory and Application of Zero Trust Security: A Brief Survey
Previous Article in Journal
Solar Flare 1/f Fluctuations from Amplitude-Modulated Five-Minute Oscillation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI

1
School of Electrical Engineering, International University, Ho Chi Minh City 700000, Vietnam
2
Vietnam National University, Linh Trung Ward, Thu Duc District, Ho Chi Minh City 700000, Vietnam
3
Department of Electrical, Electronic and Computer Engineering, University of Ulsan, Ulsan 44610, Republic of Korea
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2023, 25(12), 1594; https://doi.org/10.3390/e25121594
Submission received: 18 October 2023 / Revised: 21 November 2023 / Accepted: 23 November 2023 / Published: 28 November 2023
(This article belongs to the Special Issue Information Security and Data Privacy)

Abstract

:
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability under any circumstance. The zero secrecy outage is proved to always be achievable regardless of the eavesdropper’s number of antennas or location when the pair secrecy and codeword rates are chosen properly. The results show that when there is perfect channel state information, the zero-outage secrecy throughput increases with the transmit power, which is important for secrecy design. Additionally, an analysis of the secrecy throughput and secrecy energy efficiency gives further insight into the effectiveness of the proposed scheme.

1. Introduction

Wireless communication has become an indispensable part of the modern world, enabling the connection and exchange of information between various devices and networks. As wireless communication continues to develop, the demand for more sophisticated security mechanisms grows, seeking to further protect sensitive data and ensure the privacy and integrity of communication. The demand for security in wireless communication arises from several factors. Firstly, wireless networks are by nature more vulnerable to security threats such as eavesdropping, interception, and unauthorized access compared to wired networks. This makes it essential to employ robust security mechanisms to safeguard transmitted data. Additionally, the continuous advancement and widespread adoption of wireless technologies have expanded the attack surface for potential threats. Traditionally, encryption techniques such as advanced encryption standard (AES) [1] and RSA [2] have been employed to encrypt data packets, making them unintelligible to unauthorized recipients. Encryption safeguards the confidentiality of transmitted data and prevents unauthorized tampering or modification during transmission. However, data encryption has certain disadvantages, such as requiring additional resources and associated setup and maintenance, increasing complexity, and reducing data processing speed.
In the past decades, physical layer security (PLS) has arisen as a propitious solution to improve the overall protection of wireless networks. The demand for PLS stems from the fact that cryptographic methods alone may not be sufficient to address all security challenges in wireless communications. PLS techniques take advantage of various physical properties, such as signal strength, fading effects, noise, and channel characteristics, to establish secure communication links. Wyner laid the foundation for physical layer security (PLS) through the study of the wiretap channel [3]. Building upon this concept, subsequent research focused on studying the secrecy in Gaussian wiretap channel and fading channel models. It was demonstrated in [4] that there exists a non-zero secrecy capacity even when channel conditions are more favorable for the eavesdropper.
More recently, novel approaches aimed at enhancing security have emerged. These include cooperative communication, as discussed in [5], and the introduction of artificial noise (AN) injection, as explored by [6]. Among these solutions, AN receivers have attracted significant attention, particularly in the context of comprehensive three-node systems, as shown in [7,8]. In [7], a secure half-duplex (HD) transmission scheme using AN injection is introduced. In this scheme, the receiver spends the first phase broadcasting AN, which is then processed and combined with the secret message at the transmitter during the later phase. In contrast, Ref. [8] investigates the use of a full-duplex (FD) jamming receiver, which simultaneously receives the desirable message and broadcasts AN to disrupt potential eavesdropping attempts. This approach is particularly effective when the eavesdropper and intended receiver are in close proximity, experiencing higher received AN power. The potential of FD receivers in physical layer security (PLS) has been further examined in subsequent studies, such as [9,10,11], showcasing improvements in secrecy outage probability at the cost of network connection reliability in hybrid FD/HD models with FD jamming receivers. Building on the concepts presented in [7,8], Ref. [12] proposed a secure FD transmission scheme, where the transmitter overlays the secret message with the AN coming from the receiver. Furthermore, additional research efforts have explored the use of FD relays broadcasting AN in decode-and-forward as well as amplify-and-forward relay systems, addressing scenarios with an unknown eavesdropper location [13,14]. Although PLS has been studied for years, it has limits in realistic applications, especially for a powerful eavesdropper which is located close to the transmitter or equipped with an infinite number of antennas. In fact, since the traditional AN is usually transmitted in the null space of the main channel, it will be easily canceled if the eavesdropper is powerful enough and has a large number of antennas [6]. As a result, there is no secrecy anymore, and a novel AN injection strategy is urgently required, in which the AN is transmitted in the same space as the main channel while still being canceled for legitimate receivers but not eavesdroppers by using the strategy of channel state information (CSI) leakage avoidance [15]. Furthermore, because security is required with probability 1 in some scenarios such as credit card number transmission, secrecy outage, or interception by an eavesdropper is required to be zero. As such, PLS or even other layers cannot support security in any circumstance when there is a powerful eavesdropper. Therefore, it is essential to revisit PLS for a novel design that can guarantee zero secrecy outage.
In this paper, we propose a secure transmission model using AN with a multi-antenna transmitter and an eavesdropper under imperfect channel estimation. The numerical results show an achievable zero secrecy outage probability by using a two-phase transmission protocol with channel inversion pre-coding at the transmitter. Furthermore, we also provide analysis for the secrecy throughput and in turn, the secrecy energy efficiency of the scheme.
The contributions of the paper are as follows:
  • Different from conventional schemes, in which AN is transmitted in the null space of the secure signal, the proposed artificial noise injection scheme transmits AN in the same space as the secure signal and uses an extra time slot for only transmitting AN with aid reverse pilot training to achieve noise cancellation capability at legitimate receivers and not at an eavesdropper.
  • Although the proposed strategy wastes one extra time slot, it reduces complexity at the transmitter, which requires one AN vector compared to an AN matrix as in the conventional strategy. This simple strategy can also be extended to apply to many other system networks to efficiently achieve zero secrecy outage.
  • The closed-form formula of the secrecy rate subject to zero secrecy outage is determined. Then, the resulting zero-outage secrecy throughput can always be achieved regardless of how powerful the eavesdropper is, e.g., if it has an infinite number of antennas.
From here on, the paper is structured as follows: Section 2 introduces the system model of the proposed transmission scheme; Section 3 and Section 4 show the formulation of secrecy and connection outage probability, respectively; Section 5 provides analysis for the secrecy throughput and secrecy energy efficiency of the system; finally, numerical results and discussion are given in Section 6.

2. System Model

As depicted in Figure 1, consider a three-node secure transmission model with a transmitter (Alice) sending confidential information to a legitimate receiver (Bob), while an eavesdropper (Eve) attempts to intercept the message. Alice, Bob, and Eve have N A , 1, and N E antennas, respectively. The fading channels are modeled as quasi-static Rayleigh with constant gain for each time slot that changes independently between different slots.
The proposed scheme is under two-phase transmission of a secret message plus artificial noise (AN) and only AN, in two different time slots. Considering the reverse training method, where Bob periodically transmits pilots for Alice to estimate the channel gain [16]. Assuming an imperfect minimum-mean-square-error (MMSE) receiver at Bob, the actual channel at Bob, denoted as h i for i { 1 , 2 } representing two phases of transmissions, is given by [17]
h i = h ^ i + h ˜ i
where h ^ i CN ( 0 , ( 1 β ) σ h 2 I N A × N A ) is the estimated channel gain, and h ˜ i CN ( 0 , β σ h 2 I N A × N A ) is the error part with the estimation error coefficient denoted β . ( CN ( 0 , σ 2 I n × n ) denotes the independent and identical distributed (i.i.d) complex vector where each element has Gaussian distribution with zero-mean and variance σ 2 , and 0 and I n × m denote the zero vector and identity matrix, respectively). We also assume that the background noise at each node has a zero-mean complex Gaussian distribution with variance σ n 2 .
The secure transmission has two phases:

2.1. Phase 1

In the first phase, Alice attempts to protect the confidential information by sending a secret message along with a superimposed AN. The secure message at Alice is transmitted with an allocated power fraction, denoted as α in the range ( 0 , 1 ) , along with the AN as
x 1 = h ^ 1 * h ^ 1 2 ( α u + 1 α v ) ,
where u and v denote the secret message and the AN signal, respectively, and are i.i.d zero-mean complex Gaussian with variance σ u 2 .
Due to error estimation, Bob receives
y b , 1 = h 1 T x 1 + n b , 1 = ( α u + 1 α v ) + h ˜ 1 T h ^ 1 * h ^ 1 2 ( α u + 1 α v ) + n b , 1 ,
while assuming perfect CSI at Eve, it receives,
y e , 1 = G 1 x 1 + n e , 1 = G 1 h ^ 1 * h ^ 1 2 ( α u + 1 α v ) + n e , 1 ,
respectively, where G 1 denotes the channel gain at Eve in phase 1 with each element being i.i.d zero-mean complex Gaussian with variance σ g 2 . n b , 1 and n e , 1 denote the background noise at Bob and Eve, respectively.

2.2. Phase 2

In phase 2, only artificial noise is transmitted as
x 2 = h ^ 2 * h ^ 2 2 v ,
which yields Bob’s and Eve’s received signals,
y b , 2 = h 2 T x 2 + n b , 2 = v + h ˜ 2 T h ^ 2 * h ^ 2 2 v + n b , 2
and
y e , 2 = G 2 x 2 + n e , 2 = G 2 h ^ 2 * h ^ 2 2 v + n e , 2 ,
respectively, where G 2 denotes the channel gain at Eve in phase 2, where each element is i.i.d complex Gaussian with zero-mean and variance σ g 2 . n b , 2 and n e , 2 denote the background noise at Bob and Eve, respectively.
The total transmit power based on the channel inversion strategy can be computed from (2) and (5) as a function of h ^ 1 and h ^ 2 [18]:
P ( h ^ 1 , h ^ 2 ) = E ( | | x 1 | | 2 ) + E ( | | x 2 | | 2 ) = σ u 2 ( | | h ^ 1 | | 2 + | | h ^ 2 | | 2 ) ,
which yields the average total transmit power, denoted P, of
P = E h ^ 1 , h ^ 2 P ( h ^ 1 , h ^ 2 ) = 2 σ u 2 ( 1 β ) σ h 2 ( N A 1 ) .
Therefore, we obtain
σ u 2 = ( 1 β ) σ h 2 P ( N A 1 ) / 2 .

3. Secrecy Outage Probability

From Eve’s perspective, it is impossible to acquire G 2 h ^ 2 * / h ^ 2 2 phase shift in phase 2 based on the received signal in (7) as it is only noise. We see that when Eve does not experience any channel noise, the phase shift of y e , 2 is determined by the phase difference between v and G 2 h ^ 2 * / h ^ 2 2 . Since v is defined as a complex Gaussian AN vector independent of the channel phase, the signals y e , 2 and G 2 h ^ 2 * / h ^ 2 2 are also independent. As we obtain the entropy equality,
H G 2 h ^ 2 * / h ^ 2 2 y e , 2 ) = H G 2 h ^ 2 * / h ^ 2 2 ,
the received signal cannot give any information on the CSI, meaning that the eavesdropper can only process the secret message using (4). The SINR at Eve is given as
γ e = G 1 h ^ 1 * 2 h ^ 1 4 α σ u 2 G 1 h ^ 1 * 2 h ^ 1 4 1 α σ u 2 + σ n 2
= g 2 h ^ 1 2 α σ u 2 g 2 h ^ 1 2 1 α σ u 2 + σ n 2
where g : = G 1 h ^ 1 * h ^ 1 CN ( 0 , σ g 2 I N e × N e ) . The capacity at Eve is given as
C e = 1 2 log 2 ( 1 + γ e )
where the factor 1/2 indicates that Eve only obtains information in the first phase.
Assume that Alice employs the wiretap code transmission scheme [3] to secure the information from Eve. The scheme uses codeword and secret rate parameters, R b and R s , with R b > R s . The positive difference between R b and R s is the cost of securing the confidential information. Since g 2 X 2 N E ( 0 , σ g 2 / 2 ) ( X 2 N ( σ 2 / 2 ) denotes Chi-square distribution with 2 N degrees of freedom and common variance σ 2 / 2 ), the secrecy outage probability for given transmissions is given by [19]
P s o = P r C e > R b R s = P r γ e > 2 2 ( R b R s ) 1 = P r g 2 > h ^ 1 2 ( 2 2 R b R s 1 ) σ n 2 / σ u 2 ( α 1 α ( 2 2 R b R s 1 ) ) + σ u 2 = 0 x N A 1 e x ( 1 β ) σ h 2 Γ ( N E , Φ x ) d x ( ( 1 β ) σ h 2 ) N A Γ ( N A ) = Γ ( N A + N E ) N A Γ ( N A ) ( Φ ( 1 β ) σ h 2 ) N E 1 + Φ ( 1 β ) σ h 2 N A + N E 2 F 1 1 , N A + N E ; N A + 1 ; 1 1 + Φ ( 1 β ) σ h 2 ,
where
Φ = ( 2 2 R b R s 1 ) σ n 2 / ( σ u 2 σ g 2 ) ( α 1 α ( 2 2 R b R s 1 ) ) + ,
( . ) + max ( 0 , . ) and 2 F 1 ( · ) denotes the hypergeometric function [20].
Special case: When Eve has an unlimited number of antennas ( N E ) or is located close to Alice ( σ g 2 ), we obtain from (15) that the secrecy outage probability converges to
P s o ( h ^ 1 ) 1
if α 1 α ( 2 2 R b R s 1 ) > 0 , and, otherwise, is equal to 0 regardless of transmit power P and channel gain | | h ^ 1 | | 2 . This indicates that the secrecy is guaranteed only if the pair of codeword rates ( R b , R s ) is designed such that α 1 α ( 2 2 R b R s 1 ) 0 , or, equivalently,
R s R b 1 2 log 2 1 + α 1 α ,
which yields the zero secrecy outage probability regardless of Eve’s number of antennas and location. It is also noted that the equality of (18) is called the zero-outage secrecy rate.

4. Connection Outage Probability

Since the AN is received in both phases, Bob can remove it by simply processing y b , 1 1 α y b , 2 to obtain
y b = y b , 1 1 α y b , 2 = α u + h ˜ 1 T h ^ 1 * h ^ 1 2 ( α u + 1 α v ) h ˜ 2 T h ^ 2 * h ^ 2 2 1 α v + ( n b , 1 1 α n b , 2 ) .
Then, the SINR at Bob, viewing the second and third terms of (19) as noise, can be obtained by [17]
γ b = α σ u 2 h ˜ 1 T h ^ 1 * h ^ 1 2 σ u 2 h ^ 1 2 + h ˜ 2 T h ^ 2 * h ^ 2 2 ( 1 α ) σ u 2 h ^ 2 2 + ( 2 α ) σ n 2 ,
and then, the capacity at Bob is given by
C b = 1 2 log 2 ( 1 + γ b ) ,
where the 1/2 multiplier represents the two-phase operation. Under a fixed codeword rate R b , an outage event happens when the channel capacity at Bob falls below the target rate R b [18]. The probability of connection outage can be obtained from (20) and (21) as
P c o = P r C b < R b = P r h ˜ 1 T h ^ 1 * h ^ 1 2 1 h ^ 1 2 > k h ˜ 2 T h ^ 2 * h ^ 2 2 ( 1 α ) h ^ 2 2
Since it follows from Appendix A that the cumulative density function (CDF) and probability density function (PDF) of | h ˜ i T h ^ i * / h ^ i 2 | 2 is given by
F ( x ) = 1 1 1 + x ( 1 β ) / β N A , f ( x ) = N A ( 1 β ) / β 1 + x ( 1 β ) / β N A + 1 ,
we can obtain the connection outage probability as
P c o = 1 0 k / ( 1 α ) F ( k x ( 1 α ) ) f ( x ) d x , = 0 k 1 α N A ( 1 β ) d x / β 1 + ( k x ( 1 α ) ) 1 β β N A + 1 1 + x 1 β β N A
+ 1 1 + k ( 1 β ) / ( ( 1 α ) β ) N A ,
where
k = α 2 2 R b 1 ( 2 α ) σ n 2 σ u 2 .
For P c o δ , where δ indicates the reliability constraint, it can be obtained from (25) that
R b R b * ,
and R b * can be obtained by numerically searching for R b , which results in P c o ( R b ) = δ . It should be noted that the exhaustive search is offline and the data value of R b * will be stored according to the system parameters. Therefore, it is not being computed online, which would yield latency in real wireless systems.

5. Zero-Outage Secrecy Throughput and Energy Efficiency

The zero-outage secrecy throughput, denoted by η , is defined as the amount of information securely received at Bob subject to zero secrecy outage and quality of service, which is
η = max R s R s × 1 δ s . t . P c o δ P s o 0 .
It follows from (18) and (27) that the zero-outage secrecy throughput can be found as
η = R b * 1 2 log 2 1 + α 1 α + × ( 1 δ ) .
Then, the corresponding energy efficiency of the system is defined as the zero-outage secrecy spectral efficiency per power consumption [21], which is
ζ = B × η ( N A P A + P B ) × 2 + P / μ ,
where P A and P B are the power consumption of each transmitter and receiver antenna, respectively, B is the bandwidth, and μ is the power amplifier coefficient. It should be noted that double circuit power in the denominator of (30) indicates two-phase transmissions.

6. Numerical Results and Discussion

In this section, we provide the numerical results of the analytical sections. Consider the GSM-1900 standard for a micro-cell model, which defines [21,22]: circuit powers with P A = 0.36 W and P B = 0.24 W , noise power of σ n 2 = N f N 0 B with N 0 = 174 dBm/Hz, N f = 3 dB, and bandwidth B = 200 kHz, and channel variance σ h 2 = 10 ( 3.45 + 3.8 log 10 ( d B ) ) , with the distance d B = 1 km between Alice and Bob.
From Figure 2 and Figure 3, one can see that zero-outage secrecy can always be achieved when the secrecy and codeword rate, i.e., R s and R b , are designed properly to force the equivocate rate ( R b R s ) to be larger than a threshold, as in (18). One can also see that the secrecy outage probability increases with increasing Eve’s number of antennas and with a closer distance to Alice. These results show that the noise injection scheme can help to guarantee secrecy with probability 1, which is crucial in real scenarios to prevent thieves from eavesdropping on credit card numbers under any circumstance. Furthermore, the secrecy outage probability is shown to increase with an increasing number of the transmitter antennas, as illustrated in Figure 4.
Figure 5 and Figure 6 depict the zero-outage secrecy throughput of the system versus α and P (dB), respectively. One can see that there exists an optimum ratio between the secret message and AN powers to maximize throughput, and the optimal power ratio increases when the transmit power increases. One can also see that when optimal α is applied, the secrecy throughput converges to a constant. This convergence of the secrecy throughput is due to the interference from estimation error.
Figure 7 and Figure 8 depict the SEE versus the average total transmit power P (dB) for different numbers of transmit antennas, N A , and estimation error coefficient, β , at Alice. There exists an optimal P to maximize energy efficiency and that energy efficiency increases as the estimation error decreases. Furthermore, there also exists an optimal N A to maximize energy efficiency, as in Figure 9, depicting the SEE versus Alice’s numbers of transmit antennas for different transmit powers P (dB). This is because increasing the transmit power or number of transmit antennas significantly increases the total power consumption while the secrecy throughput stays constant (as shown in Figure 6), hence reducing the energy efficiency.

7. Conclusions

A new artificial noise (AN) injection method for MISOME systems was proposed. We proved that zero-outage secrecy can be always achieved in any circumstance. The numerical results showed the scheme can achieve zero secrecy outage with a trade-off in the secrecy rate and half-time transmissions. The results also showed that with perfect CSI, the zero-outage secrecy throughput increases with the transmit power, which is important in secrecy design. The results also showed the existence of an optimal transmit power and the number of transmitter antennas to maximize energy efficiency. As an extension of this work, antenna selection to reduce the complexity as well as increase energy efficiency will be considered. Also, this type of transmission strategy can be applied to multi-user scenarios, providing zero secrecy outage to the whole network with one simple artificial noise injection transmission.

Author Contributions

Formal analysis, H.Q.T., L.C. and H.O.; Investigation, H.Q.T., L.C. and H.O.; software, H.Q.T., L.C. and H.O.; Writing—original draft, H.Q.T., L.C. and H.O. All authors have read and agreed to the published version of the manuscript.

Funding

This result was supported by “Regional Innovation Strategy (RIS)” through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (MOE) (2023RIS-003).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The cumulative and probability density function (CDF and PDF) of
X i = h ˜ i T h ^ i * h ^ i 2 1 h ^ i 2
for i { 1 , 2 } is derived in this appendix. Since | h ˜ i T h ^ i * / h ^ i | 2 has an exponential distribution with mean of β σ h 2 , and h ^ i 2 has a chi-squared distribution with 2 N A degrees of freedom and common variance of ( 1 β ) σ h 2 / 2 , we have
F ( x ) = P r X i < x = 1 P r | h ˜ i T h ^ i * / h ^ i | 2 > x h ^ i 2 = 1 0 e x t β σ h 2 t N A 1 e t / ( ( 1 β ) σ h 2 ) ( N 1 ) ! ( ( 1 β ) σ h 2 ) N A d t = 1 0 t N A 1 e t x β σ h 2 + 1 ( 1 β ) σ h 2 d t ( N 1 ) ! ( ( 1 β ) σ h 2 ) N A = 1 1 1 + x ( 1 β ) / β N A
and
f ( x ) = d F ( x ) / d x = N A ( 1 β ) / β 1 + x ( 1 β ) / β N A + 1 .

References

  1. Heron, S. Advanced encryption standard (AES). Netw. Secur. 2009, 2009, 8–12. [Google Scholar] [CrossRef]
  2. Milanov, E. The RSA Algorithm; RSA Laboratories: Bedford, MA, USA, 2009; pp. 1–11. [Google Scholar]
  3. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  4. Barros, J.; Rodrigues, M.R.D. Secrecy Capacity of Wireless Channels. In Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 356–360. [Google Scholar] [CrossRef]
  5. Wang, H.M.; Xia, X.G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015, 53, 47–53. [Google Scholar] [CrossRef]
  6. Goel, S.; Negi, R. Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  7. He, B.; She, Y.; Lau, V.K. Artificial noise injection for securing single-antenna systems. IEEE Trans. Veh. Technol. 2017, 66, 9577–9581. [Google Scholar] [CrossRef]
  8. Zheng, G.; Krikidis, I.; Li, J.; Petropulu, A.P.; Ottersten, B. Improving physical layer secrecy using full-duplex jamming receivers. IEEE Trans. Signal Process. 2013, 61, 4962–4974. [Google Scholar] [CrossRef]
  9. Zheng, T.X.; Wang, H.M.; Yuan, J.; Han, Z.; Lee, M.H. Physical layer security in wireless ad hoc networks under a hybrid full-/half-duplex receiver deployment strategy. IEEE Trans. Wirel. Commun. 2017, 16, 3827–3839. [Google Scholar] [CrossRef]
  10. Zheng, T.X.; Wang, H.M.; Yang, Q.; Lee, M.H. Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers. IEEE Trans. Wirel. Commun. 2017, 16, 278–292. [Google Scholar] [CrossRef]
  11. Wang, H.M.; Zhao, B.Q.; Zheng, T.X. Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks. IEEE Trans. Commun. 2019, 67, 1254–1267. [Google Scholar] [CrossRef]
  12. Guo, Y. Application of full duplex guarantees secure wireless communication. J. Commun. Networks 2017, 19, 105–113. [Google Scholar] [CrossRef]
  13. Cao, Z.; Ji, X.; Wang, J.; Zhang, S.; Ji, Y.; Li, Y.; Wang, J. Security-Reliability Trade-Off Analysis of AN-Aided Relay Selection for Full-Duplex Relay Networks. IEEE Trans. Veh. Technol. 2021, 70, 2362–2377. [Google Scholar] [CrossRef]
  14. Li, B.; Zhang, M.; Rong, Y.; Han, Z. Artificial Noise-Aided Secure Relay Communication With Unknown Channel Knowledge of Eavesdropper. IEEE Trans. Wirel. Commun. 2021, 20, 3168–3179. [Google Scholar] [CrossRef]
  15. Liu, T.Y.; Lin, P.H.; Lin, S.C.; Hong, Y.W.P.; Jorswieck, E.A. To avoid or not to avoid CSI leakage in physical layer secret communication systems. IEEE Commun. Mag. 2015, 53, 19–25. [Google Scholar] [CrossRef]
  16. Zhou, X.; Lamahewa, T.A.; Sadeghi, P.; Durrani, S. Two-way training: Optimal power allocation for pilot and data transmission. IEEE Trans. Wirel. Commun. 2010, 9, 564–569. [Google Scholar] [CrossRef]
  17. Hassibi, B.; Hochwald, B.M. How much training is needed in multiple-antenna wireless links? IEEE Trans. Inf. Theory 2003, 49, 951–963. [Google Scholar] [CrossRef]
  18. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  19. Zhou, X.; McKay, M.R.; Maham, B.; Hjorungnes, A. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective. IEEE Commun. Lett. 2011, 15, 302–304. [Google Scholar] [CrossRef]
  20. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Elsevier/Academic Press: Amsterdam, The Netherlands, 2007. [Google Scholar]
  21. Ta, H.Q.; Kim, S.W. Adapting rate and power for maximizing secrecy energy efficiency. IEEE Commun. Lett. 2017, 21, 2049–2052. [Google Scholar] [CrossRef]
  22. Wang, A.Y.; Sodini, C.G. On the energy efficiency of wireless transceivers. In Proceedings of the 2006 IEEE International Conference on Communications, Istanbul, Turkey, 25–28 June 2006; Volume 8, pp. 3783–3788. [Google Scholar]
Figure 1. Two-phase transmission model: (a) Alice transmits noise-injected message in phase 1. (b) Alice transmits only AN in phase 2.
Figure 1. Two-phase transmission model: (a) Alice transmits noise-injected message in phase 1. (b) Alice transmits only AN in phase 2.
Entropy 25 01594 g001
Figure 2. Secrecy outage probability, P S O , versus R b R s for different values of N E ; α = 0.8 , N A = 2 , and σ g 2 = σ h 2 .
Figure 2. Secrecy outage probability, P S O , versus R b R s for different values of N E ; α = 0.8 , N A = 2 , and σ g 2 = σ h 2 .
Entropy 25 01594 g002
Figure 3. Secrecy outage probability, P S O , versus R b R s for different eavesdropper distance d E ; α = 0.8 , N A = 2 , and N E = 2 .
Figure 3. Secrecy outage probability, P S O , versus R b R s for different eavesdropper distance d E ; α = 0.8 , N A = 2 , and N E = 2 .
Entropy 25 01594 g003
Figure 4. Secrecy outage probability, P S O , versus R b R s for different values of N A ; α = 0.8 , N E = 2 , and σ g 2 = σ h 2 .
Figure 4. Secrecy outage probability, P S O , versus R b R s for different values of N A ; α = 0.8 , N E = 2 , and σ g 2 = σ h 2 .
Entropy 25 01594 g004
Figure 5. Secrecy throughput, η , versus α for different number of transmit power P (dB); β = 0.1 , δ = 0.1 , and N A = 2 .
Figure 5. Secrecy throughput, η , versus α for different number of transmit power P (dB); β = 0.1 , δ = 0.1 , and N A = 2 .
Entropy 25 01594 g005
Figure 6. Secrecy throughput, η , versus P when the optimal α is applied for a different number of transmit antennas N A ; β = 0.1 and δ = 0.1 .
Figure 6. Secrecy throughput, η , versus P when the optimal α is applied for a different number of transmit antennas N A ; β = 0.1 and δ = 0.1 .
Entropy 25 01594 g006
Figure 7. Secrecy energy efficiency, ζ , versus P for a different number of transmit antennas N A when optimal α is used; β = 0.1 and δ = 0.1 .
Figure 7. Secrecy energy efficiency, ζ , versus P for a different number of transmit antennas N A when optimal α is used; β = 0.1 and δ = 0.1 .
Entropy 25 01594 g007
Figure 8. Secrecy energy efficiency, ζ , versus P for different number of β when the optimal α is applied; N A = 2 , N E = 2 , and δ = 0.1 .
Figure 8. Secrecy energy efficiency, ζ , versus P for different number of β when the optimal α is applied; N A = 2 , N E = 2 , and δ = 0.1 .
Entropy 25 01594 g008
Figure 9. Secrecy energy efficiency, ζ , versus N A when optimal α and optimal power P is used; β = 0.1 and δ = 0.1 .
Figure 9. Secrecy energy efficiency, ζ , versus N A when optimal α and optimal power P is used; β = 0.1 and δ = 0.1 .
Entropy 25 01594 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ta, H.Q.; Cao, L.; Oh, H. Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI. Entropy 2023, 25, 1594. https://doi.org/10.3390/e25121594

AMA Style

Ta HQ, Cao L, Oh H. Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI. Entropy. 2023; 25(12):1594. https://doi.org/10.3390/e25121594

Chicago/Turabian Style

Ta, Hien Q., Lam Cao, and Hoon Oh. 2023. "Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI" Entropy 25, no. 12: 1594. https://doi.org/10.3390/e25121594

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop