Next Article in Journal
Design and Control of a Three-Level Rectifier in LCC/S-Compensated IPT for Wide Output Voltage Regulation over Various Magnetic Couplings
Next Article in Special Issue
Joint Beamforming and Trajectory Design for Aerial Intelligent Reflecting Surface-Aided Secure Transmission
Previous Article in Journal
Stochastic Optimal Strategy for Power Management in Interconnected Multi-Microgrid Systems
Previous Article in Special Issue
Secrecy Enhancement for SSK-Based Visible Light Communication Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient MIMO Signal Predistortion for Secrecy-Enhancing

Division of Electronics Engineering, IT Convergence Research Center, Jeonbuk National University, Jeonju 54896, Korea
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(9), 1425; https://doi.org/10.3390/electronics11091425
Submission received: 25 March 2022 / Revised: 25 April 2022 / Accepted: 27 April 2022 / Published: 28 April 2022

Abstract

:
Massive machine type communications or internet of things (IoT) over wireless systems have invoked attention in terms of security problems, especially for multi-input multi-output (MIMO) schemes. In this paper, we propose efficient physical layer security (PLS) enhancing methods for space-time block coding (STBC), as well as spatial multiplexing (SM) schemes. The proposed methods pre-distort the transmit signals by using the phase information of the legitimate MIMO channel, and, as a result, the illegal eavesdropper cannot extract any information. The proposed predistortion for the STBC schemes is done so that the channel matrix at the receiver is a real-valued one, which results in full-rate and full-diversity gain for more than two transmit antennae. Therefore, compared to the conventional schemes, the proposed scheme eventually leads to the higher performance gain and lower detection complexity in addition to the high security protection. By extending the principle of the proposed method for STBC, a predistortion scheme is also proposed for SM by using the phase information of the column space of the channel matrix. The simulation results investigated in this paper reveal that the proposed methods can achieve enhanced error rate performances, as well as high security protection.

1. Introduction

The multi-input multi-output (MIMO) scheme is one of the most representative technologies in modern wireless communication systems, including wireless LAN as well as 4G to beyond 5G systems. To date, most of the physical layer technologies for MIMO systems have prioritized performance and capacity issues over security protection. However, dramatically increasing traffic demands, especially of machine-type communications, require more secure communication for privacy protection. Therefore, a number of studies have emphasized the importance of physical layer security (PLS) schemes for modern wireless communication systems [1,2], and there have been many proposals concentrating on the signal design for MIMO systems [3,4,5,6,7,8,9,10,11].
Techniques to add artificial noise (AN) have been considered as an effective means to protect the legitimate channel [3,4,5,6,7,8]. A typical design principle of AN is to make it orthogonal to the legitimate channel, so that it can be null to the legitimate receiver, while serving as interference to the illegal receiver [3]. Then, this idea of adding AN was applied to spatial modulation and space time block coding (STBC) schemes in [4,5,6,7,8], respectively, for PLS. However, adding AN obviously requires additional energy, which decreases the energy efficiency. Because of this, a recent study proposed the idea of adding artificial interference (AI), which can be considered as the channel dependent re-distribution of signal power, and this, therefore, accomplishes security protection without requiring any additional energy [9]. All of these ideas of adding AN or AI utilize the addition or re-distribution of channel-dependent power at the transmitter, which results in a seriously high peak-to-average power ratio (PAPR) problem.
To avoid the high PAPR problem, ideas that involve distorting the phase of the complex signal have been proposed [10,11]. For example, a phase rotation method has been applied to the STBC schemes to enhance secrecy [10], but the randomness of the phase distortion to the eavesdropper is only guaranteed by the additional secret key exchange between the legitimate transmitter and receiver. Meanwhile, a phase rotation technique was applied to the spatial modulation scheme to increase secrecy performance without risking any PAPR problem [11]. In these schemes, the secrecy protection capability is limited by the number of antennae and the modulation order employed.
In this paper, we propose novel secrecy enhancing methods for MIMO schemes. We consider that full-rate orthogonal STBC (O-STBC) schemes exist for instances employing more than two transmit antennae when real-numbered signals are used [12]. The proposed scheme first forms a full-rate non-orthogonal STBC encoding matrix, and then applies signal distortion for PLS in such a way as to make the channel matrix at the receiver fully orthogonal. Therefore, we can have a full-rate encoding matrix at the transmitter and a fully orthogonal channel matrix at the receiver. In addition to high secrecy protection, this leads to high performance gain due to higher diversity gain than the conventional methods. By extending this to the spatial multiplexing (SM) MIMO scheme, we design a new predistortion scheme.
The main contributions of this paper compared to the conventional schemes can be summarized as follows:
  • Compared to the conventional AN or AI-aided schemes [3,4,5,6,7,8,9], the proposed methods distort the phase of the transmit signal, and they therefore avoid the PAPR problem and do not require additional energy for AN.
  • Compared to the conventional phase-distortion based schemes [10,11], the proposed methods do not require an additional secret key exchange and have no limit on the secrecy protection capability.
  • Compared to the conventional STBC schemes [12,13,14,15], the proposed scheme not only provides better bit error rate (BER) performance at the same rate (or can achieve the same performance at a higher rate), but it can also achieve high security protection. In addition, the complexity of the detection process can be reduced due to the use of the real-numbered channel matrix.
This paper is organized as follows. Following this introduction, Section 2 reviews the related works. After presenting the concept of PLS schemes with AN and AI, the concept of O-STBC for real-numbered signals is introduced. Section 3 describes the proposed scheme. Section 4 presents the simulation results and discussions, and finally, Section 5 draws the conclusion.
Notation: Bold lower and upper case letters represent vectors and matrices, respectively. A T and A H represent the transpose and Hermitian transpose of a matrix A , respectively. For a column vector, a, diag(a) returns a square diagonal matrix with the elements of vector a on the main diagonal. For a modulated signal, x denotes a real-numbered signal while z denotes a complex-numbered signal. | | z | | and z * denote the absolute value and conjugate of a complex number z, respectively.

2. Related Works

2.1. Adding AN to STBC MIMO Schemes for Secrecy Enhancing

We consider a multi-input-single-output (MISO) wiretap channel, which includes a transmitter Alice with N T transmit antennae, a legitimate receiver Bob, and a passive eavesdropper Eve. Let h = h 1 h 2 h N T T and g = g 1 g 2 g N T T respectively denote the channel state information (CSI) vectors of Bob and Eve, where h k and g k represent the complex channel gains for the k-th transmit antenna from Alice to Bob and Eve, respectively. The perfect CSI is assumed to be available at both Bob and Eve, but Alice only shares the CSI with Bob. It is also assumed that the channel states of h k and g k are independent of each other. For the purpose of employing AN [7], the 2 × 1 Alamouti scheme is adopted with the following encoding matrix, Z A [13],
Z A = z 1 z 2 z 2 * z 1 * ,
where z 1 and z 2 are the signals transmitted during the two symbol periods. Prior to transmission, Alice adds the following AN, W , to Z A :
W = α 11 ν α 12 ν ( α 21 ν ) * ( α 22 ν ) * ,
where ν is the complex Gaussian AN with zero-mean and unit variance and α i k s are the coefficients of the ν for the i-th time slot at the k-th antenna, which are designed to be nulled at Bob. Therefore, one of the possible coefficients sets can be α 11 = h 2 , α 12 = h 1 , α 21 = h 2 * , and α 22 = h 1 * [7].
Then, Alice transmits ( Z A + W ) and the received signal vectors at Bob and Eve during the two symbol periods, y b and y e can, respectively, be expressed by:
y b = ( Z A + W ) h + n b , = Z A h + n b , y e = ( Z A + W ) g + n e ,
where n b and n e are additive white Gaussian noise (AWGN) vectors at Bob and Eve, respectively. Since the AN is designed to be nulled out at Bob, Bob received y b as if Alice transmitted without any AN. Meanwhile, since the channel gains h k and g k are independent of each other, Eve cannot retrieve any signal due to uncancelled W .
Because this method requires additional energy for AN, a new method was proposed that does not require any additional energy for secrecy protection. The idea of this proposed method is to utilize the quasi-orthogonal STBC (QO-STBC) scheme with linear detection capability, called linear decoding QO-STBC (LD-QO-STBC) [15], and to re-allocate the signal power across the transmission time and antennae [9].

2.2. O-STBC for Real-Numbered Signals

Even though the full-rate O-STBC scheme for complex-numbered signals only exists for the two transmit antennae system [13], it is well known that it can be designed for more than two transmit antennae for real-numbered signals, such as pulse-amplitude modulation (PAM) [12]. The encoding matrices of the full-rate O-STBC schemes for p time periods and N T transmit antennae, X N T of size p × N T , can be found in the literature [12]; here we provide the following examples for N T = 4 and 8:
X 4 = x 1 x 2 x 3 x 4 x 2 x 1 x 4 x 3 x 3 x 4 x 1 x 2 x 4 x 3 x 2 x 1 ,
X 8 = x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 2 x 1 x 4 x 3 x 6 x 5 x 8 x 7 x 3 x 4 x 1 x 2 x 7 x 8 x 5 x 6 x 4 x 3 x 2 x 1 x 8 x 7 x 6 x 5 x 5 x 6 x 7 x 8 x 1 x 2 x 3 x 4 x 6 x 5 x 8 x 7 x 2 x 1 x 4 x 3 x 7 x 8 x 5 x 6 x 3 x 4 x 1 x 2 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 ,
where x 1 , , x p are real-numbered signals. It is clear that the X N T s in (4) and (5) are orthogonal matrices. In addition, they achieve the full rate, i.e., R = 1 , because they are constituted by the transmit signal vector x = x 1 , , x p with p symbols over p time periods. Therefore, they can offer the full-diversity of N T due to the orthogonality as well as full-rate [12].
Assuming the signal vector x is transmitted using X N T via N T transmit antennae, the received signal vector can be expressed as:
y = X N T h + n ,
where h k is the complex channel gain from the k-th transmit antenna to the receiver and n is an AWGN vector. Then, the above (6) can be equivalently expressed by:
y = H C , N T x + n ,
where H C , N T is a complex-numbered channel matrix and is therefore not an orthogonal matrix. For example, the H C , 4 corresponding to the encoding matrix, X 4 of (4) can be given by:
H C , 4 = h 1 h 2 h 3 h 4 h 2 h 1 h 4 h 3 h 3 h 4 h 1 h 2 h 4 h 3 h 2 h 1 .
Even though the above H C , N T with complex elements does not have full-orthogonality, a linear decoding can be performed for real number signal detection as follows:
x ^ = 1 k = 1 N T | | h k | | 2 H C , N T H y = 1 k = 1 N T | | h k | | 2 ( H C , N T H H C , N T x + H C , N T H n ) ,
where x ^ is the estimated result of x . This is because the diagonal elements of the Gram matrix, H C , N T H H C , N T , are pure real numbers, while the off-diagonal elements are pure imaginary numbers which do not affect the real number signal detection.

3. The Proposed Methods

3.1. Secrecy Enhancement for STBC Schemes

Motivated by the fact that a full-rate O-STBC scheme can be achieved for real-numbered signal transmission through the use of more than two transmit antennae [12], we propose an efficient PLS scheme for STBC.
In the proposed scheme, we first form a non-orthogonal full-rate encoding matrix for complex-numbered signals by inserting complex signals into X N T . Then, the proposed scheme transforms the encoding matrix using a phase distortion matrix which represents the null space of the phase of the channel gain. During the transmission, the channel phase will be nulled out, and eventually only the amplitude component of the channel gain will arrive at the receiver. Therefore, we can have a full orthogonal real-numbered channel matrix at the receiver. Even though the encoding matrix with complex numbered signals is not orthogonal, the proposed scheme can achieve performance equivalent to that of the scheme with full-rate and full-diversity. It can also achieve high secrecy protection.
Here, we detail the operational principle of the proposed scheme. At the transmitter, Alice first generates a complex signal vector z = z 1 , , z p T for p time periods and constructs a non-orthogonal encoding matrix Z N T by inserting complex signals into X N T . For example, the following Z 4 can be found for a system with four transmit antennae.
Z 4 = z 1 z 2 z 3 z 4 z 2 z 1 z 4 z 3 z 3 z 4 z 1 z 2 z 4 z 3 z 2 z 1 .
Note that Z N T keeps full-rate but is not orthogonal.
Next, the transmitting signals are predistorted so as to null out the phase of the channel gain. To this end, we form a phase-distorting vector, p , as follows:
p = e j h 1 e j h 2 e j h N T T ,
where h k represents the phase of h k . The next step is to determine the encoding matrix with the predistortion capability, Z N T , as follows:
Z N T = Z N T diag ( p ) = z 1 z 2 z N T e j h 1 0 0 0 e j h 2 0 0 0 e j h N T = e j h 1 z 1 e j h 2 z 2 e j N T z N T ,
where z k is the k-th column vector of Z N T . Note that multiplying e j h k to z k will lead to nulling of the phase of the complex channel gain for z k at Bob.
Finally, the received signal vector at Bob for p time periods can be represented by:
y b = Z N T h + n b = e j h 1 z 1 e j h 2 z 2 e j N T z N T h 1 h 2 h N T + n b = | | h 1 | | z 1 + | | h 2 | | z 2 + + | | h N T | | z N T + n b ,
because h k = | | h k | | e j h k and | | h k | | e j h k e j h k z k = | | h k | | z k . Further, y b can be equivalently expressed by using a channel matrix as follows:
y b = H R , N T z + n b ,
where the channel matrix H R , N T results in a real-numbered orthogonal matrix. For example, when we apply the Z 4 of (10), the corresponding H R , 4 results in:
H R , 4 = | | h 1 | | | | h 2 | | | | h 3 | | | | h 4 | | | | h 2 | | | | h 1 | | | | h 4 | | | | h 3 | | | | h 3 | | | | h 4 | | | | h 1 | | | | h 2 | | | | h 4 | | | | h 3 | | | | h 2 | | | | h 1 | | .
Because the H R , N T is a real-numbered matrix and has full-orthogonality, the complex signal detection at Bob can be easily performed by multiplying the transpose of H R , N T . This will eliminate any complex inversion operation of the matrix, and it will lead to the following simple real-numbered matrix multiplication to obtain the recovered signal at Bob, z ^ b :
z ^ b = 1 k = 1 N T | | h k | | 2 H R , N T T y b , = 1 k = 1 N T | | h k | | 2 ( H R , N T T H R , N T z + H R , N T T n b ) .
Note that the Gram matrix in (16), H R , N T T H R , N T , is a diagonal matrix, and thus there is no interference term for signal detection.
On the other hand, the received signal at Eve can be represented by:
y e = Z N T g + n e = e j h 1 z 1 e j h 2 z 2 e j N T z N T g 1 g 2 g N T + n e = g 1 e j h 1 z 1 + + g N T e j h N T z N T + n e .
Because Z N T contains distortion factors that cannot be nulled out at Eve, the non-diagonal Gram matrix of Eve results in signal detection that cannot be performed properly. Although we have shown the example of a 4 × 1 system, the proposed idea can be applied to Z N T obtained from X N T for systems with more than two transmit antennae.

3.2. Secrecy Enhancement for Spatial Multiplexing

We consider a wiretap SM MIMO system with N T transmit antennae at Alice as well as N R receive antennae at Bob and Eve, respectively. In this system, Alice transmits spatially multiplexed N T × 1 complex signal vector z = z 1 z 2 z N T T via the N T antennae for each time period. Then, z is transmitted through the N R × N T channel matrices of H = h 1 h 2 h N T and G = g 1 g 2 g N T at Bob and Eve, respectively, where h k and g k respectively denote the k-th column vectors of H and G . We propose a new PLS scheme for this environment.
By considering that the k-th signal component of z , z k will be transmitted through h k to Bob, the proposed PLS scheme applies phase distortion to z k by using the sum of the channel phases of h k . For this purpose, the phase distorting vector, q , is first found as follows:
q = θ 1 θ 2 θ N T T ,
where
θ k = e j i = 1 N R h i k ,
and h i k and h i k are the complex channel gain from the k-th transmit antenna to the i-th receive antenna and its phase, respectively.
Next, the pre-distorted signal vector at Alice, z , can be found as follows:
z = diag ( z ) q = z 1 0 0 0 z 2 0 0 0 z N T θ 1 θ 2 θ N T = θ 1 z 1 θ 2 z 2 θ N T z N T T .
Then, the received signal at Bob can be represented by:
y b = H z + n b = h 1 h 2 h N T θ 1 z 1 θ 2 z 2 θ N T z N T + n b = θ 1 z 1 h 1 + + θ N T z N T h N T + n b = H z + n b ,
where the resulting channel matrix can be represented by:
H = θ 1 h 1 θ 2 h 2 θ N T h N T .
Therefore, the signal detection can be achieved by using various well known detection methods, as follows:
z ^ b = F y b ,
where F is a detection matrix, e.g., F = ( H H H ) 1 H H for zero forcing (ZF) detection and F = ( H H H + σ 2 I ) 1 H H for minimum mean square error (MMSE) detection, where σ 2 is the noise variance and I is the N T × N T identity matrix. On the other hand, the received signal at Eve is represented by:
y e = G z + n e = θ 1 z 1 g 1 + + θ N T z N T g N T + n e .
As in the previous case for STBC schemes, z contains H -dependent distortion, and as a result, Eve cannot retrieve any information on the signal.

4. Simulation Results

We estimate the performance simulation results of the proposed schemes over a Rayleigh fading environment in comparison to the conventional STBC and SM schemes. In the simulations, we assume that the power of the modulation symbols was normalized to one. Figure 1 shows a comparison of the signal constellation change in the QPSK modulation scheme, when PLS schemes are applied for STBC schemes. If AN or AI is used to enhance secrecy [7,9], the amplitude of the signal varies greatly, which will lead to a high PAPR problem at the transmitter. On the other hand, due to its phase distortion characteristics, the proposed scheme maintains constant amplitude value, and it will therefore not suffer from a high PAPR problem.
Figure 2 shows the BER performance comparison for various STBC schemes with QPSK modulation. Without any secrecy enhancing schemes, Bob and Eve are expected to achieve exactly the same BER performance. The conventional secrecy enhancing scheme with the Alamouti scheme can achieve excellent security protection by making the BER at Eve so bad that it is almost impossible for Eve to extract information [7]. However, this scheme involves sacrificing a power loss of 3 dB for AN to obtain high secrecy protection from Eve. We also note that these AN (or AI)-aided PLS schemes involve a trade-off between the power allocated to AN (or AI) and secrecy protection.
On the other hand, the proposed scheme maintains high secrecy protection, and it also achieves BER performance comparable to that of the conventional full-rate or full-diversity scheme without any additional power allocation. The BER performance of the proposed 4 × 1 scheme shows exactly the same performance as the half rate 4 × 1 O-STBC scheme, indicating that it achieves full diversity, even with R = 1 . In addition, the BER performance at Eve with the proposed scheme shows that the proposed scheme does not allow any information leakage to Eve.
To evaluate the performance of the SM schemes, we use the 4 × 4 MIMO systems with QPSK and 16-QAM, respectively. Figure 3 shows the BER performance comparison with the ZF and MMSE detection schemes. As in the previous case, the conventional schemes without any secrecy enhancing capability lead to the same BER performance at Bob and Eve. The BER performance of the proposed scheme at Bob shows exactly the same performance as the conventional schemes, while the BER performance at Eve is highly deteriorated, indicating that it is almost impossible for Eve to properly extract information.
We also investigate the influence of channel estimation error on BER performance. At this time, signals are transmitted through the channel with h = 1 ρ 2 h ^ + ρ 2 e , where h ^ is an estimated channel gain, e is the estimation error, and ρ 2 is the variance of estimation error [16]. Figure 4 shows the BER performance changes for various STBC schemes according to ρ 2 . As can be seen in the figure, as ρ 2 increases, the proposed method for rate one STBC shows worse performance than the conventional O-STBC scheme with rate 1/2. This is because the phase distortion cannot be perfectly nulled out at the receiver in the proposed scheme, which results in a non-orthogonal channel matrix. Nevertheless, the proposed scheme still shows better performance than the conventional QO-STBC scheme with the same rate, and it also provides high security protection. On the other hand, Figure 5 shows the proposed method for SM achieves the same performance behavior as the conventional schemes. The results confirm that the proposed methods are not particularly vulnerable to channel estimation error relative to other conventional methods.
To compare a security capability of PLS schemes, the secrecy capacity has usually been investigated in the previous studies [3,9,17]. Here we first present the equations for the secrecy capacities of the proposed and conventional PLS schemes. The secrecy capacity C s can be defined as follows:
C s = C B C E ,
where C B and C E are the capacities at Bob and Eve, respectively. For conventional AN (or AI)-aided schemes [7,9], the capacity at Bob, C A , B can be represented as:
C A , B = log 2 1 + | | Z A h | | 2 / N T σ b 2 ,
where σ b 2 represents the variance of AWGN at Bob. On the other hand, Eve suffers from the noise effect of uncanceled W as well as AWGN, that is,
y e = Z A g Signal + W g AN + n e AWGN ,
and thus, W g should be treated as noise in addition to AWGN. The capacity at Eve for AN (or AI)-aided schemes, C A , E , can be estimated as follows:
C A , E = log 2 1 + | | Z A g | | 2 / N T | | Wg | | 2 / N T + σ e 2 ,
where σ e 2 represents the variance of AWGN at Eve.
In the case of the proposed method, the detector at Eve cannot discriminate signal components inside y e in (17), since the signal is distorted by unknown phase information at Alice. That is,
y e = g 1 e j h 1 z 1 + + g N T e j h N T z N T Noise to Eve + n e AWGN ,
and thus there is no pure signal component inside y e . Therefore, the capacities at Bob and Eve for the proposed method can be represented as follows:
C P , B = log 2 1 + | | Z N T h | | 2 / N T σ b 2 , C P , E = log 2 1 + 0 | | Z N T g | | 2 / N T + σ e 2 .
This eventually leads to C P , E of 0, and this can be confirmed from the BER simulation results shown in Figure 2b. The result shows that BER at Eve is 0.5 regardless of signal to noise ratio (SNR) values, showing no information leakage to Eve.
We evaluate the capacities of various PLS schemes by using the above derived equations, and Figure 6 presents the capacity comparisons of PLS schemes at Bob and Eve. Since the proposed method does not consume any additional power for PLS, the capacity of the proposed method at Bob accomplishes the highest, while the capacity of the proposed method at Eve is the lowest that is always zero. The capacity of the existing AN method at Bob shows about 3 dB power loss compared to the proposed method because of the power consumption for AN. On the other hand, the existing AI method barely consumes extra energy, and thus it achieves almost the same capacity as the proposed method at Bob. Nevertheless, Eve also can accomplish better capacity performance with the AI method since the energy consumed for AI is much less than that for AN. This can also be confirmed in Figure 2b, where the BER performance of the AI method is better than that of AN, at Eve.
Figure 7 shows the secrecy capacity comparison of the proposed and AN (or AI)-aided PLS schemes. It reveals that the secrecy capacity of the proposed method shows the best performance due to the best and worst capacities at Bob and Eve, respectively, as shown in Figure 6. On the other hand, the conventional AN scheme should sacrifice secrecy capacity due to additional power consumption. We note that the AN method achieves better secrecy capacity than the AI method. This is because the difference in capacities between Bob and Eve is smaller in the AI method compared to that in the AN method.

5. Conclusions and Discussion

This paper proposed efficient PLS schemes for STBC and SM-based MIMO systems. Compared to the conventional AN-based PLS scheme, the proposed schemes neither require additional power nor have a PAPR problem, because they distort the phase of the complex signals. The performance simulation results showed that, in addition to high security protection, the proposed scheme for the STBC-based MIMO system achieves BER performance approximating those of the conventional schemes with full rate or full orthogonality. The proposed scheme for the SM-based MIMO system also showed almost no information leakage to the illegal eavesdropper.
The proposed scheme requires accurate CSI at both the transmitter and the receiver, which may not be the common assumption for the STBC-based MIMO systems. The future work should focus on other alternative methods which do not require CSI at the transmitter, by considering STBC as a transmit diversity technique. In addition, we investigated the effect of CSI estimation error by using a commonly used model, but the estimation error accumulation effect may impact further on the performance of the proposed SM-based MIMO scheme. Hence, future work should focus on detailed investigation on the effect of imperfect channel information, leading to more efficient PLS schemes.

Author Contributions

Conceptualization, H.L. and S.C.; methodology, H.L. and S.C.; validation, H.L. and S.K.; formal analysis, H.L.; investigation, H.L.; writing—original draft preparation, H.L.; writing—review and editing, S.K.; supervision, S.K.; project administration, S.K.; funding acquisition, S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2021R1A2C1003121).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

AIartificial interference
ANartificial noise
AWGNadditive white Gaussian noise
BERbit error rate
CSIchannel state information
IoTinternet of things
LD-QO-STBClinear decoding QO-STBC
MIMOmulti-input multi-output
MISOmulti-input-single-output
MMSEminimum mean square error
O-STBCorthogonal STBC
PAMpulse-amplitude modulation
PAPRpeak-to-average power ratio
PLSphysical layer secrecy
QO-STBCquasi-orthogonal STBC
SMspatial multiplexing
SNRsignal to noise ratio
STBCspace-time block coding
ZFzero forcing

References

  1. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  2. Sanenga, A.; Mapunda, G.A.; Jacob, T.M.L.; Marata, L.; Basutli, B.; Chuma, J.M. An Overview of Key Technologies in Physical Layer Security. Entropy 2020, 22, 1261. [Google Scholar] [CrossRef] [PubMed]
  3. Negi, R.; Goel, S. Secret Communication using Artificial Noise. In Proceedings of the VTC-2005-Fall, 2005 IEEE 62nd Vehicular Technology Conference, Dallas, TX, USA, 28 September 2005. [Google Scholar]
  4. Yang, P.; Qiu, X.; Mu, F. Artificial Noise-Aided Secure Generalized Spatial Modulation for Multiuser Transmission. IEEE Wirel. Commun. Lett. 2020, 24, 2416–2420. [Google Scholar] [CrossRef]
  5. Shang, P.; Yu, W.; Zhang, K.; Jiang, X.-Q.; Kim, S. Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise. Entropy 2019, 21, 626. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Allen, T.; Tajer, A.; Al-Dhahir, N. Secure Alamouti Multiple Access Channel Transmissions: Multiuser Transmission and Multi-Antenna Eavesdroppers. IEEE Wirel. Commun. Lett. 2019, 8, 1510–1513. [Google Scholar] [CrossRef]
  7. Shang, P.; Kim, S.; Jiang, X.-Q. Efficient Alamouti-Coded Spatial Modulation for Secrecy Enhancing. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 16–18 October 2019. [Google Scholar]
  8. Fakoorian, S.A.A.; Jafarkhani, H.; Swindlehurst, A.L. Secure space-time block coding via artificial noise alignment. In Proceedings of the 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Montreal, CQ, Canada, 6–9 November 2011. [Google Scholar]
  9. Shang, P.; Lee, H.; Kim, S. Waveform Design for Space–Time Coded MIMO Systems with High Secrecy Protection. Electronics 2020, 9, 2003. [Google Scholar] [CrossRef]
  10. Allen, T.; Cheng, J.; Al-Dhahir, N. Secure Space-Time Block Coding without Transmitter CSI. IEEE Wirel. Commun. Lett. 2014, 3, 573–576. [Google Scholar] [CrossRef]
  11. Jiang, X.-Q.; Wen, M.; Hai, H.; Li, J.; Kim, S. Secrecy-Enhancing Scheme for Spatial Modulation. IEEE Commun. Lett. 2018, 22, 550–553. [Google Scholar] [CrossRef]
  12. Tarokh, V.; Jafarkhani, H.; Calderbank, A.R. Space-time block codes from orthogonal designs. IEEE Trans. Inform. Theory 1999, 45, 1456–1467. [Google Scholar] [CrossRef]
  13. Alamouti, S.M. A simple transmit diversity technique for wireless communications. IEEE J. Sel. Areas Commun. 1998, 16, 1451–1458. [Google Scholar] [CrossRef]
  14. Tirkkonen, O.; Boariu, A.; Hottinen, A. Minimal nonorthogonality rate 1 space-time block code for 3+ Tx antennas. In Proceeding of the 2000 IEEE Sixth International Symposium On Spread Spectrum Techniques and Applications, Parsippany, NJ, USA, 6–8 September 2000. [Google Scholar]
  15. Lee, Y.; Uh, M.; Chang, S. Comments and Corrections on “A Novel QO-STBC Scheme With Linear Decoding for Three and Four Transmit Antennas”. IEEE Commun. Lett. 2016, 20, 1908–1909. [Google Scholar] [CrossRef]
  16. Rezki, Z.; Khisti, A.; Alouini, M.-S. On the Secrecy Capacity of the Wiretap Channel with Imperfect Main Channel Estimation. IEEE Trans. Commun. 2014, 62, 3652–3664. [Google Scholar] [CrossRef] [Green Version]
  17. Oggier, F.; Hassbii, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory. 2011, 57, 4961–4972. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Signal constellation comparison at the transmitter.
Figure 1. Signal constellation comparison at the transmitter.
Electronics 11 01425 g001
Figure 2. BER performance comparison for various STBC schemes. (a) without PLS. (b) with PLS.
Figure 2. BER performance comparison for various STBC schemes. (a) without PLS. (b) with PLS.
Electronics 11 01425 g002
Figure 3. BER performance comparison for various SM schemes.
Figure 3. BER performance comparison for various SM schemes.
Electronics 11 01425 g003
Figure 4. BER performance comparison of various STBC schemes with channel estimation error.
Figure 4. BER performance comparison of various STBC schemes with channel estimation error.
Electronics 11 01425 g004
Figure 5. BER performance comparison of various SM schemes with channel estimation error.
Figure 5. BER performance comparison of various SM schemes with channel estimation error.
Electronics 11 01425 g005
Figure 6. Capacity comparison of various PLS schemes at Bob and Eve.
Figure 6. Capacity comparison of various PLS schemes at Bob and Eve.
Electronics 11 01425 g006
Figure 7. Secrecy capacity comparison of various PLS schemes.
Figure 7. Secrecy capacity comparison of various PLS schemes.
Electronics 11 01425 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lee, H.; Chan, S.; Kim, S. Efficient MIMO Signal Predistortion for Secrecy-Enhancing. Electronics 2022, 11, 1425. https://doi.org/10.3390/electronics11091425

AMA Style

Lee H, Chan S, Kim S. Efficient MIMO Signal Predistortion for Secrecy-Enhancing. Electronics. 2022; 11(9):1425. https://doi.org/10.3390/electronics11091425

Chicago/Turabian Style

Lee, Hyein, Satya Chan, and Sooyoung Kim. 2022. "Efficient MIMO Signal Predistortion for Secrecy-Enhancing" Electronics 11, no. 9: 1425. https://doi.org/10.3390/electronics11091425

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop